K0p1-Git / stacks2020-VoicesInTheHead

A short writeup on STACKS2020 CTF - Voices in the head challenge (Forenisc)

Home Page:https://dev.to/k0p1/stacks-2020-ctf-voices-in-the-head-forensic-1bea

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

[Stacks 2020 CTF] Voices in the Head - Forensic

Challenge Text


challenge-text
Voices in the Head - Challenge Text

Introduction

Voices in the head is a 2000 point forensic challenge. Along with the challenge text and an audio file named forensic-challenge-2.wav a hint was distributed to all teams as a starting point.

Solution

The first thing we did was to open up the WAV file and check out the content. We were immediately rewarded with a loud deafening sound of what seems like birds chirping early in the morning... πŸ˜…

Now based off our limited CTF experience with the forensic challenges, usually, when an audio file is involved, it usually means steganography of some sort. We pulled out the trusty Sonic Visualiser tool and added a Spectrogram to the mix ... lo and behold, *** magic ✨***


sonic-visualiser-1
Enabling Spectrogram in Sonic Visualiser


There you go, we actually found something. The text extracted from the audio reads aHR0cDovL3d3dy5wYXN0ZWJpbi5jb20vakVUajJ1VWI=. Notice the equal sign at the back of this string? Based on past experiences in CTFs, this is a telltale sign which indicates that this string is base64 encoded. To decode this, we simply head over to www.base64decode and decode our string.


base64decode
Online Base 64 Decoder


A Paste Bin link? Alright, let us go check it out ...


pastebin
Secret Paste Bin Site


Oh, what this? We have seen this before! Once again, with our limited CTF experience, we have come across challenges in the past that used this weird programming language / syntax. This language is known as Brain Fuck πŸ€”

Now, if you never saw this before, you can easily copy and paste the symbols into our trusty friend, Google, to find out what the symbols mean. That's how we came to learn about this weird programming language / syntax in the first place.

So to decode this, we can use https://www.dcode.fr/brainfuck-language to decode the message:


brainfuck
Decoding Brain Fuck


What?! After decoding the message, we got the string thisisnottheflag. 🀬 did the challenge just pull one on us? At this point we were quite lost, seeing how all of what we did lead to nowhere...

But a light bulb πŸ’‘ moment came and we realised we had not touched the initial hint that was provided! Xiao wants to help. Will you let him help you? Who is this Xiao, and why would he want to help us? Find out more on the next episode of Dragon Ball-Z ... (we ended up just Googling it)

Based on the hint, we came across a tool called Xiao Steganography, which seemed to fit what we were doing. Another steganography tool πŸ€”


xiao-steg
Xiao Steganography Tool


Running it against our WAV file, it seems that a ZIP file was detected!! We attempted to open up the zip file ... and we got an error? πŸ€·β€β™‚οΈ What?


error
Xiao Steganography Tool


We tried throwing the ZIP file into WinHex and discovered that the magic numbers were all messed up, is this a broken zip challenge?


winhex
Win Hex on extracted ZIP


We can see the magic numbers are all off. Not only that, it seems like the whole zip is messed up. Maybe its not a broken ZIP challenge after all ... now what? πŸ™ƒ

Wait a minute ... could it be password protected? Its at this moment another light bulb appearedπŸ’‘

Remember when we decoded the base 64 string? Where we thought we got trolled, We the obtained string thisisnottheflag.

It is not the flag, but it's the password for this tool ! 🀯🀯


xiao-steg
Xiao Steganography Tool


With that, we now got have a valid ZIP file. Clicking on it now prompts us for another password. What the ... 🀬


new-yes
Proper Zip file but still asking for password !!!


At this point, we thought that it might not actually be encrypted. Perhaps those classic broken ZIP file challenges. So we threw this new ZIP into WinHex and WOAH we found the flag (or so we thought... trolled once again 😭😭😭)


fake-flag
Win Hex - Proper Zip


We submitted the "flag" govtech-csg{Th1sisn0ty3tthefl@g} to the challenge platform, guess what? Tt's fake ...

But wait ... "not yet the flag"? Could this actually be the password for the ZIP?


real-flag
The Real Flag !


And there we go! We solved this challenge and got a clue to the next challenge 🌟

Conclusion

Let us close this writeup with some key takeaways and learning points:

βœ… Play lots of CTFs !! As seen throughout the writeup, we are generally correct when it comes to our guesses (steganography, base64, brainfuck, etc..). By playing lots of CTFs, you will gain new experiences which could prove to be useful for future CTFs.

βœ… Don't give up, throughout this challenge we faced many roadblocks BUT, we believed and we pulled through!

βœ… Have fun! Honestly, we joked a lot about the fake flags, but hey, this challenge was actually pretty fun πŸ˜‰

Special thanks to the members of team Ov3rWr1t3 for pulling through. To those reading till this point, I hope you find this insightful and happy CTF-ing!

Signing off
~K0p1

About

A short writeup on STACKS2020 CTF - Voices in the head challenge (Forenisc)

https://dev.to/k0p1/stacks-2020-ctf-voices-in-the-head-forensic-1bea