Cracking Forensics CTFs 2.0 — picoCTF
文章续写Cracking Forensics CTFs 1.0系列,介绍了picoCTF中基于图片的挑战解法,包括基本检查、查看元数据、使用binwalk提取隐藏文件及steghide提取密码保护内容等方法。 2025-9-18 07:40:4 Author: infosecwriteups.com(查看原文) 阅读量:3 收藏

Swetha

follow up of Cracking Forensics CTFs 1.0 — picoCTF https://medium.com/@swethas274/8b143d12b615

This article is a continuation of the 1.0 version. If you haven’t read that yet i recommend you reading that before reading this

RED

Press enter or click to view image in full size

So, the file extension is .png

Some of the common methodsto solve a image based CTFs

Press enter or click to view image in full size

Basic inspection

Look at metadata:

exiftool image.png
#---- or ------
strings image.png | less

Press enter or click to view image in full size

Check for embedded files (steganography)

  • Use binwalk to see if the image contains hidden archives/files:
binwalk -e image.png
  • Try steghide (if password protected, the challenge may hint at it):
steghide extract -sf image.png

文章来源: https://infosecwriteups.com/cracking-forensics-ctfs-2-0-picoctf-c2ee4c9cb462?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh