PicoCTF - Matryoshka doll

In a forensic challenge with an image it is common to start with a panel of functions to detect a flag. First of all Exiftool which allows access to the metadata (the additional information of an image) but here we do not get anything very interesting. Strings which allows access to all the legible characters of the image but once again no flag. We can also use another tool to check the layers but the answer lies elsewhere.



The solution :

By using binwalk we access the signature of the file and we can read that the image is a compressed file under zip. So we can unzip the image and get another image of a smaller doll. You must have understood the reasoning you must unzip the image until you get a text file: the flag.

Popular posts from this blog

Mustacchio - TryHackMe

Tech_Supp0rt: 1 - TryHackMe

Juicy Details - TryHackMe