# CTF Recap #1 --- ## Welcome ![](https://i.imgur.com/VF2XKIB.png) ---- ### Tools used: * **file** * classify file * **exiftool** * read metadata * **binwalk** * analyse binary data * **unzip** * extract compressed data ---- ### Tools used: * **base64** * base64 decode data * https://en.wikipedia.org/wiki/Base64 * **strings** * printable characters of file * **stegsolve** * hidden text in img * **gimp** * image manipulation --- ## Magic PNGs ![](https://i.imgur.com/8mKWzT9.png) ---- ### PNG Structure ![](https://i.imgur.com/t50pU05.png) source: http://www.libpng.org ---- ### PNG Chunks ![](https://i.imgur.com/DdcSjA5.png) source: http://www.libpng.org ---- ### PNG Signature ![](https://i.imgur.com/VA9fARb.png) source: http://www.libpng.org ---- ![](https://parsiya.net/images/2018/png1/03-ihdr.png) http://www.libpng.org/pub/png/spec/1.2/PNG-Structure.html ---- ### Used Tools * **google** * PNG structure * **xxd** * binary -> hex * **binwalk -W / colordiff** * compare files * **hexeditor** * make changes to file ---- ### PNG Tools * **pngcheck** * check validity of png * **pnginfo** * png information + errors * **pngchunks** * inspect single chunks ---- ### PNG Information * http://einstein.informatik.uni-oldenburg.de/rechnernetze/png.htm * https://www.w3.org/TR/PNG-Chunks.html * http://www.libpng.org/pub/png/spec/1.2/PNG-Structure.html * http://www.libpng.org/pub/png/book/chapter08.html --- <!-- .slide: data-background="https://media.giphy.com/media/hPrt0zRTMAVaugcgPf/giphy.gif" --> <div style="color: #fff; font-size: 100px;"> Now it's your turn :) </div> ---- Write-up link: https://its.fh-campuswien.ac.at/hackmd/s/HJP-O1jUE#
{"title":"Example Slide","tags":"presentation","slideOptions":{"theme":"serif","previewLinks":true,"transition":"slide"}}