Tags: misc
Rating:
## Hydra (Misc)
## Description:
![hydra](./img/hydra1.png)
## Difficulty:
Not so Ez :P
## Writeup:
Just another chall from another CTF. A png (a big one) was given to start with.
![hydra1](img/hydra2.png).
So the first hunch was to look for the embedded data.
I used foremost to extract the data. Got a png and a GIF.
![hydra2](img/hydra3.png)
So I started analysing the GIF first. Looked for more embedded files in the GIF. Got a long list of files inside such a small file.
![hydra3](./img/hydra4.png)
With Binwalk I extracted the files indside the GIF. But got nothing. Then I moved to PNG which looked pretty fishy .
![hydra4](./img/hydra5.png)
Strings had some exif data. So I used exiftool to view the metadata. And Found this rotted string.
![hydra5](./img/hydra6.png)
```
frps{Fj0eqs15u_sy4t_u1qq3a_1a_z3g4}
```
But this wasn't our flag. So I unrotted it (ROT-13) using :
```
echo "frps{Fj0eqs15u_sy4t_u1qq3a_1a_z3g4}" | tr 'A-Za-z' 'N-ZA-Mn-za-m'
```
Output:
```
secf{Sw0rdf15h_fl4g_h1dd3n_1n_m3t4}
```
That's our Flag();