layout: default



With the challenge we get this JPEG image:


The challenge name and the challenge description clearly indicates that we need to use [Jsteg](https://github.com/lukechampine/jsteg) this is a tool used for hiding data in the least segnificant bit (LSB) of the bytes in the image

> The image is actually an image of the creator of the tool (luke),


## DOH

A image was given and seriously what techniques was to be used I used [Steghide](http://steghid.sourceforge.net/download.php) to get the flag and no passphrase was required for this.


steghide extract -sf doh.jpg


This was the flag : **JCTF{an_annoyed_grunt}**

## Beep Boop


An audio file was given and after listening to it I was sure that this are [DTMF](https://en.wikipedia.org/wiki/Dual-tone_multi-frequency_signaling) tones so I used this [dialabc](http://dialabc.com/sound/detect/index.html) to get the numbers.


After some observation I found it a decimal to hex converion :


and then hex to ascii




we were just give a .docx file.

**FLAG : flag{oof_is_right_why_gfxdata_though}**

I first analyzed the file through binwalk, and got so many zipped files.


Then extracted it , and bruteforced to get the flag.


Original writeup (https://github.com/noob-atbash/CTF-writeups/blob/master/nahamcon-20/stego/stego.md#beep-boop).