Rating:

---
layout: default
---
# STEGO

## KSTEG

![](img/ksteg.png)

With the challenge we get this JPEG image:

![](resource/luke.jpg)

The challenge name and the challenge description clearly indicates that we need to use [Jsteg](https://github.com/lukechampine/jsteg) this is a tool used for hiding data in the least segnificant bit (LSB) of the bytes in the image

> The image is actually an image of the creator of the tool (luke),

![](img/l.png)

## DOH

A image was given and seriously what techniques was to be used I used [Steghide](http://steghid.sourceforge.net/download.php) to get the flag and no passphrase was required for this.

![](resource/doh.jpg)

```
steghide extract -sf doh.jpg

```

This was the flag : **JCTF{an_annoyed_grunt}**

## Beep Boop

![](img/bb.png)

An audio file was given and after listening to it I was sure that this are [DTMF](https://en.wikipedia.org/wiki/Dual-tone_multi-frequency_signaling) tones so I used this [dialabc](http://dialabc.com/sound/detect/index.html) to get the numbers.

```
46327402297754110981468069185383422945309689772058551073955248013949155635325

```
After some observation I found it a decimal to hex converion :

![](img/bb1.png)

and then hex to ascii

![](img/bb2.png)

# FORENSICS

## MICROOSOFT

we were just give a .docx file.

**FLAG : flag{oof_is_right_why_gfxdata_though}**

I first analyzed the file through binwalk, and got so many zipped files.

![](img/foren_1.png)

Then extracted it , and bruteforced to get the flag.

![](img/foren_2.png)

Original writeup (https://github.com/noob-atbash/CTF-writeups/blob/master/nahamcon-20/stego/stego.md#ksteg).