Tags: strings binwalk
Rating:
[All WriteUps for this CTF here](https://github.com/ipv6-feet-under/WriteUps-S.H.E.L.L.CTF21): https://github.com/ipv6-feet-under/WriteUps-S.H.E.L.L.CTF21
![S.H.E.L.L.CTF](https://raw.githubusercontent.com/ipv6-feet-under/WriteUps-S.H.E.L.L.CTF21/main/banner.png)
# Cold Compress Inside
We are given [this image](https://github.com/ipv6-feet-under/WriteUps-S.H.E.L.L.CTF21/blob/main/Forensics/Cold%20Compress%20Inside/COLD_COMPRESS.jpeg?raw=true).
Running `file` on it quickly tells us it's a PNG even though it has .jpeg extension.
As the name suggests already we assume that there is another file hidden inside of it. So we run binwalk on it:
We extracted a o.exe let's just run `string -n 8 o.exe` on it: