Forensic

Sunday 29 October 2023, 01:15  #1
Forensic - Capture this challenge
hack_me
  • 1 posts

I have figure out that i have to restore the original image. The screenshot is cropped and on the right side there is probably the password. The problem is that i try multiple tools to restore the original picture. It does not work. Can someone help me or give me a hint?

Thank you.

Monday 15 January 2024, 10:37  #2
Forensic - Capture this challenge
ijnisha
  • 1 posts

Same results ,i tried it by using tools like imagick, i even altered the meta data using bless editor but i got nothing maybe we should write some code

Wednesday 24 January 2024, 10:50  #3
Forensic - Capture this challenge
Passero
  • 5 posts

Hi, I’m also stuck......I mean I found some extra data @ the end of "first "IEND" part of png as reported by "pngcheck" but I didn’t find how to use it and I’m not sure this the right way because among data I red a different img resolution.

pngcheck -v Capture.png
File: Capture.png (581420 bytes)
1298 x 977 image, 32-bit RGB+alpha, non-interlaced
chunk pHYs at offset 0x00042, length 9: 3779x3779 pixels/meter (96 dpi)
additional data after IEND chunk
ERRORS DETECTED in Capture.png

To easily get extra data you can use "https://github.com/sherlly/PCRT" or play with HEX editor.

Wednesday 13 March 2024, 05:17  #4
Forensic - Capture this challenge

Did anyone found clue to this?

Saturday 15 June 2024, 06:54  #5
Forensic - Capture this challenge
NoDopamine
  • 1 posts

So I believe we have to extract the password hash from the kbdx file, but I am unsure if rockyou will have the password for that.

Wednesday 4 September 2024, 02:51  #6
Forensic - Capture this challenge
jayetheus
  • 1 posts

Hi everyone, been doing this challenge for hours now and the clues I got were that you can get the password through steganography (unlikely), the second clue being that there’s a zlib file embedded inside the image file (using binwalk) then extracting that zlib from the image using "binwalk -e image.png"... inside that zlib file there are 7 certificate files... that’s all I’ve got for now. Need help checking the certificate files.

Saturday 5 October 2024, 23:44  #7
Forensic - Capture this challenge
somu
  • 3 posts

Hi jayetheus,

Thanks for your rundown on it, I am able to get zlib file, but extracting certificates from it can you help me.

As for checking certificate files I guess this google search can help you -

https://www.google.com/search?q=check+certificate+files&oq=check+certificate+files&gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIHCAEQABiABDIHCAIQABiABDIICAMQABgWGB4yCAgEEAAYFhgeMggIBRAAGBYYHjIICAYQABgWGB4yCAgHEAAYFhgeMggICBAAGBYYHjIICAkQABgWGB7SAQg0MjcwajBqNKgCALACAQ&sourceid=chrome&ie=UTF-8

Friday 18 October 2024, 16:08  #8
Forensic - Capture this challenge
brunaix
  • 1 posts

I was able to extract the files from the zlib but the data seems encoded. How did you extracted the certificates?

Saturday 2 November 2024, 05:56  #9
Forensic - Capture this challenge
Quang Huy
  • 2 posts

how u extract the zlib file