Tags: forensics 

Rating:

# Observe Closely
Forensics, 50 point
## Description:
> A simple image with a couple of twists...
## Solution:
The challenge give as a file *Griffith_Observatory.png*.
I run `binwalk` on it and we get::
```bash
binwalk Griffith_Observatory.png

DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
0 0x0 PNG image, 320 x 155, 8-bit/color RGBA, non-interlaced
41 0x29 Zlib compressed data, default compression
127759 0x1F30F Zip archive data, at least v2.0 to extract, compressed size: 2587, uncompressed size: 16664, name: hidden_binary
130500 0x1FDC4 End of Zip archive, footer length: 22
```
So there is an hidden binary in it. We can extract it with `binwalk -e Griffith_Observatory.png` and run the binary in it.
```bash
./hidden_binary
Ah, you found me!
utflag{2fbe9adc2ad89c71da48cabe90a121c0}
```
And we get the flag: `utflag{2fbe9adc2ad89c71da48cabe90a121c0}`