HackDay - Stegano & Forensic


Forensic Challenge - Hidden Flag Extraction Link to heading

In this challenge, we have a ZIP file containing a log file and two images.


Step 1: Log File Analysis Link to heading

I began by analyzing the log file and found five encoded words. I used dcode.fr to decode them:

  • ercbafr (ROT13) → reponse

Screenshot

  • c29sdXRpb24= (Base64) → solution

Screenshot

  • 636c6566 (Hexadecimal to ASCII) → clef

Screenshot

  • 0110001011111011011000110110100001100101 (Binary to text) → bûche

Screenshot

  • KDFNGD\~dPbCbiU6HUnknown

For this last string, dcode.fr couldn’t decode it, so I used CyberChef with a ROT47 brute force, which revealed:

KDFNGD\~dPbCbiU6HHACKDAY{aM_@_fR3E

Screenshot


Step 2: Image Analysis with Aperisolve Link to heading

Next, I analyzed both images using Aperisolve.

Analysis of Image 1 Link to heading

Findings:

  • HACKDAY{08139b20df9f789b7763}
  • securepassword

Screenshot

Analysis of Image 2 Link to heading

Findings:

  • secure password
  • -@LbaRT0s5}

Screenshot


Step 3: Reconstructing the Flag Link to heading

Using the extracted data, I reconstructed the second part of the flag:

Final Flag: HACKDAY{aM_@_fR3E-@LbaRT0s5}