Tags: sleuthkit autopsy 

Rating:

# PicoCTF 2022 Sleuthkit Apprentice writeup

The Problem is the following:

![sleuthkitApprenticeProblem.png](./media/sleuthkitApprenticeProblem.png)

### Download & extract the image

Run the following command:

```shell
wget https://artifacts.picoctf.net/c/336/disk.flag.img.gz
gunzip disk.flag.img.gz
```

a file named `disk.flag.img` should show up at your working directory.

### Finding the flag with autopsy

In the following steps, I will demonstrate how to extract the key with [autopsy](https://www.autopsy.com/), the graphical user interface for [sleuthkit](https://www.sleuthkit.org/). This tool is built into kali linux.

First, run `autopsy` and open `localhost:9999/autopsy`

Use the graphical user interface to open a new case, and click through the default options until "Add A New Image":

fill in the absolute path of the image downloaded(use `pwd` to get your current directory)

![FillImgPath.png](./media/FillImgPath.png)

again, click through the default options until this page:

![mainpage.png](./media/mainpage.png)

After some digging, you'll find that in conducting file analysis in /3/, when you search for the text `flag`, there are two files, one of which is deleted, the other is encoded.

![Searching.png](./media/Searching.png)

Next, click on display Hex value, and you'll find the flag:

![SleuthkitFlag.png](./media/SleuthkitFlag.png)

The flag is: `picoCTF{by73_5urf3r_25b0d0c0}`

Original writeup (https://github.com/JettChenT/CTF/blob/main/pico/2022/sleuthkitApprentice.md).