HSF




CSAW High School Forensics


PDF forensic

SO to start with PDF forensic follow the procedure below
1) Run PDFID tool to find all the objects in the pdf python pdfid.py malicious.pdf
2) Now if u found a javascript run pdfextract(an Orgami tool) pdfextract --js malicious.pdf 3) else use peepdf -x for more details and -i interactive and in console run >object id
4) Or use ./pdf-extract malicious.pdf for viewing all contents inside the object



Welp. This is awkward

For this challenge you can solve in 2 ways first rin pdfid which shows it contains 2 js file and to extract it use pdfextrace
Or just use strings and use Octal converter to get the flag !!!!



Steg JPEG

First i tried with all possible analysis in steg but nothing was positive and then i cam to know that JPEG image is the only format supported by steghide and stand
a great chance the it has info hidden using steghide but to confirm it i tried stegdetect (but it resulted negative) i also tried to bruteforce the passphrace
BUt luckilly the passphrase was the chall title and i got my flag !!


We were given a vedio file so i opened it using audacity and spectrogram graph showed flag{} but text was compressed i tried few tools like amplify etc .. nothing
worked out finaly i tried to zoom it it worked !!!!