STEGO
KSTEG
With the challenge we get this JPEG image:
The challenge name and the challenge description clearly indicates that we need to use Jsteg this is a tool used for hiding data in the least segnificant bit (LSB) of the bytes in the image
The image is actually an image of the creator of the tool (luke),
DOH
A image was given and seriously what techniques was to be used I used Steghide to get the flag and no passphrase was required for this.
steghide extract -sf doh.jpg
This was the flag : JCTF{an_annoyed_grunt}
Beep Boop
An audio file was given and after listening to it I was sure that this are DTMF tones so I used this dialabc to get the numbers.
46327402297754110981468069185383422945309689772058551073955248013949155635325
After some observation I found it a decimal to hex converion :
and then hex to ascii
FORENSICS
MICROOSOFT
we were just give a .docx file.
FLAG : flag{oof_is_right_why_gfxdata_though}
I first analyzed the file through binwalk, and got so many zipped files.
Then extracted it , and bruteforced to get the flag.