HackDay - Stegano & Forensic
Forensic Challenge - Hidden Flag Extraction Link to heading
In this challenge, we have a ZIP file containing a log file and two images.
Step 1: Log File Analysis Link to heading
I began by analyzing the log file and found five encoded words. I used dcode.fr to decode them:
ercbafr(ROT13) → reponse

c29sdXRpb24=(Base64) → solution

636c6566(Hexadecimal to ASCII) → clef

0110001011111011011000110110100001100101(Binary to text) → bûche

KDFNGD\~dPbCbiU6H→ Unknown
For this last string, dcode.fr couldn’t decode it, so I used CyberChef with a ROT47 brute force, which revealed:
KDFNGD\~dPbCbiU6H → HACKDAY{aM_@_fR3E

Step 2: Image Analysis with Aperisolve Link to heading
Next, I analyzed both images using Aperisolve.
Analysis of Image 1 Link to heading
Findings:
HACKDAY{08139b20df9f789b7763}securepassword

Analysis of Image 2 Link to heading
Findings:
secure password-@LbaRT0s5}

Step 3: Reconstructing the Flag Link to heading
Using the extracted data, I reconstructed the second part of the flag:
Final Flag:
HACKDAY{aM_@_fR3E-@LbaRT0s5}