You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: forensics/serial-300-points.md
+11-5Lines changed: 11 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,8 @@
1
1
# Serial - 300 points
2
2
3
-
## Solution
3
+
I was listening to [this](https://github.com/EasyCTF/easyctf-2017-problems/blob/master/serial/serial.wav) haystack, but I didn't notice anything. What did I miss?
4
+
5
+
### Solution
4
6
5
7
This challenge was pretty fun -- and very very frustrating when I had no
6
8
idea what I was doing or where to go next. *(I'm reminded of that time
@@ -12,7 +14,7 @@ From the title 'Serial', it was pretty likely that this would be a
12
14
stream of serial data, so all I had to do was decode that, right? Super
13
15
easy, right?
14
16
15
-
### Scoping it out
17
+
####Scoping it out
16
18
17
19
I opened the audio file in audacity. This is pretty much always worth
18
20
doing for any sort of forensics-y audio file: often it looks interesting
@@ -38,7 +40,7 @@ which could be better if you're in a hurry.)*
38
40
The wav file stored sounds as 16 bit values, which means they will range
39
41
between roughly -32760 and 32760.
40
42
41
-
### Pulling apart the .WAV file
43
+
####Pulling apart the .WAV file
42
44
43
45
I opened the wav file as raw bytes in python, started from the first
44
46
byte after the header ended, and printed them out to see if I could see
0 commit comments