Tags: forensics
Rating: 4.0
# File 101
[Original writeup](https://github.com/TheArchPirate/ctf-writeups/blob/main/DEADFACE/forensics/file-101.md)
## Description
- - -
An email, containing a photo of pumpkin, was found in an employee's Gmail inbox. The photo looks normal, but looks can be deceiving sometimes. What secrets could it be holding?
## File
- - -
The image ([email protected]) for this challenge can be found in:
ctf-writeups/DEADFACE/files/forensics
## Solution
- - -
I was able to find a download link hidden inside using the `less` command.
![](https://raw.githubusercontent.com/TheArchPirate/ctf-writeups/main/DEADFACE/images/less-dropbox.png)
Going to this [link](https://www.dropbox.com/s/io1kaqznal2c10y/corrupted.zip) we get a download for a zip (corrupted.zip) with an image inside (FOR0x.png). We find out this is password protected.
We can use fcrackzip against this:
`fcrackzip -u -D -p /usr/share/wordlists/rockyou.txt corrupted.zip `
```
fcrackzip -u -D -p /usr/share/wordlists/rockyou.txt corrupted.zip
```
The extracted image FOR0x.png is corrupted. Looking at this is a hex editor (I'm using okteta) we can see that the file header is wrong and does not match that of a png.
![](https://raw.githubusercontent.com/TheArchPirate/ctf-writeups/main/DEADFACE/images/FOR0x-header.png)
To resolve this a jfif image was generated and the header from it was transferred into the hex editor allowing for the image to be opened. _This step was completed by [Quantix](https://github.com/cftad/)._
![](https://raw.githubusercontent.com/TheArchPirate/ctf-writeups/main/DEADFACE/images/FOR0x-jfif.png)
We can now open the image.
![](https://raw.githubusercontent.com/TheArchPirate/ctf-writeups/main/DEADFACE/images/FOR0x-flag.png)
## Flag
- - -
flag{Easy_Right}