Skip to content

Commit 0f65290

Browse files
authored
fix typo lol
1 parent 78714f4 commit 0f65290

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

forensics/finn-200-points.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ If you get stuck, We also have [this](https://github.com/EasyCTF/easyctf-2017-pr
99

1010
We are given a jpg. Looking at the first part of the hint, we know that we have to `binwalk` the file. Running `binwalk -e finn.jpg` gives us what we need.
1111

12-
After we binwalk it, we see that there is a zip file protected by a password. Although the hint says that the password refers to the problem statement, I just used brute force using the `fcrackzip` tool. Running `fcrackzip -v -m zip2 -l 1-8 -u AD3E.zip` and waiting for some gives us the password to the zip file: `2187`.
12+
After we binwalk it, we see that there is a zip file protected by a password. Although the hint says that the password refers to the problem statement, I just used brute force using the `fcrackzip` tool. Running `fcrackzip -v -m zip2 -l 1-8 -u AD3E.zip` gives us the password to the zip file: `2187`.
1313

1414
After extracting the zip file, we see two "identical" images. The hint says we should find the difference in the images. Imagemagick's `compare` tool should do the trick. Running `compare kylo1.png kylo2.png diff.png` gives us a new file which contains a QR code.
1515

@@ -57,4 +57,4 @@ This script outputs `54745270485860306291136282`.
5757
Armed with a message and the key, I simply used an online XOR tool to XOR `636866637e7173347657723c74735c31755d6b32347759384c7f` and `0504070405020700040805080600030006020901010306020802`. Doing so gives us another hex string, `666c61677b737434725f773472735f31735f623335745f3a447d`, which can be converted to text to reveal the flag.
5858

5959
## Flag
60-
>easyctf{st4r_w4rs_1s_b35t_:D}
60+
>easyctf{st4r_w4rs_1s_b35t_:D}

0 commit comments

Comments
 (0)