Forensic - MSB
picoCTF 2023
Catégorie : Forensic
📜Scenario
🔎Solve
First, download the file on your machine
$ file Ninja-and-Prince-Genji-Ukiyoe-Utagawa-Kunisada.flag.png
Ninja-and-Prince-Genji-Ukiyoe-Utagawa-Kunisada.flag.png: PNG image data, 1074 x 1500, 8-bit/color RGB, non-interlaced
$ exiftool Ninja-and-Prince-Genji-Ukiyoe-Utagawa-Kunisada.flag.png
ExifTool Version Number : 12.57
File Name : Ninja-and-Prince-Genji-Ukiyoe-Utagawa-Kunisada.flag.png
Directory : ..
File Size : 3.4 MB
File Modification Date/Time : 2023:03:15 18:49:42+01:00
File Access Date/Time : 2023:04:10 20:43:26+02:00
File Inode Change Date/Time : 2023:04:10 20:43:25+02:00
File Permissions : -rw-r--r--
File Type : PNG
File Type Extension : png
MIME Type : image/png
Image Width : 1074
Image Height : 1500
Bit Depth : 8
Color Type : RGB
Compression : Deflate/Inflate
Filter : Adaptive
Interlace : Noninterlaced
Image Size : 1074x1500
Megapixels : 1.6
$ zsteg Ninja-and-Prince-Genji-Ukiyoe-Utagawa-Kunisada.flag.png
imagedata .. text: "~~~|||}}}"
b1,g,lsb,xy .. file: Common Data Format (Version 2.5 or earlier) data
b1,g,msb,xy .. file: Common Data Format (Version 2.5 or earlier) data
b2,r,lsb,xy .. text: ["U" repeated 8 times]
b2,g,lsb,xy .. file: Matlab v4 mat-file (little endian) \252\252\252\252\252\252\252\252, numeric, rows 4294967295, columns 4294967295
b2,g,msb,xy .. file: Matlab v4 mat-file (little endian) UUUUUUUU, numeric, rows 4294967295, columns 4294967295
b2,b,lsb,xy .. text: ["U" repeated 8 times]
b4,r,lsb,xy .. text: ["w" repeated 8 times]
b4,r,msb,xy .. text: ["U" repeated 12 times]
b4,g,msb,xy .. text: ["w" repeated 16 times]
b4,b,lsb,xy .. text: "\"\"\"\"\"\"\"\"4DC\""
b4,b,msb,xy .. text: "wwwwwwww3333"`
Last chance is to use Aperisolve but nothing here too :/
So make some search on google msb image decoder and find sigBits tool.
According to the chall title we try to extract information from the MSB (Most Significant Bit) so we try the following command
python3 sigBits.py -t=msb Ninja-and-Prince-Genji-Ukiyoe-Utagawa-Kunisada.flag.png
Then check the output file outputSB.txt and grep the flag
Flag : picoCTF{15_y0ur_que57_qu1x071c_0r_h3r01c_f95e852a}