Tags: dotcode forensics qrcode 

Rating:

Find me!

[Download Link](https://github.com/jbzteam/CTF/blob/master/WhiteHatSummer2017/Hue/Hue.zip)

Extracting the archive we got the following:
```
ls
Hue.zip 'my collection' openme.zip
```

`my collection` is a directory and `openme` is a password-locked archive

The directory contains a lot of `png` files with flags of states and some pieces of QRCode, reconstructing it
![QRCode](https://raw.githubusercontent.com/jbzteam/CTF/master/WhiteHatSummer2017/Hue/qrcode.jpg)
scanning it with zbar gave us the password for the archive

```
zbarimg qrcode.jpg
QR-Code:=== Ea5y p4ssw0rd h4h4 ===
scanned 1 barcode symbols from 1 images in 0.15 seconds
```

extracting `openme.zip` with the password gave us the following:

```
[openme.zip] here.png password:
inflating: here.png
inflating: flag.txt
```

`flag.txt` is just a dummy and contains `It's not here ^^`

After some research on the png we found out is `DotCode`

![Here](https://raw.githubusercontent.com/jbzteam/CTF/master/WhiteHatSummer2017/Hue/here.png)

Scanning it with a DotCode Reader gave us:
`flag: d0tc0d3_s0_c00l`

Original writeup (https://jbzteam.github.io/forensics/WhiteHat2017-Hue).