Tags: forensics 

Rating: 4.0

# File 101
[Original writeup](https://github.com/TheArchPirate/ctf-writeups/blob/main/DEADFACE/forensics/file-101.md)

## Description
- - -
An email, containing a photo of pumpkin, was found in an employee's Gmail inbox. The photo looks normal, but looks can be deceiving sometimes. What secrets could it be holding?

## File
- - -
The image ([email protected]) for this challenge can be found in:

ctf-writeups/DEADFACE/files/forensics

![](https://raw.githubusercontent.com/TheArchPirate/ctf-writeups/main/DEADFACE/files/forensics/[email protected])

## Solution
- - -

I was able to find a download link hidden inside using the `less` command.

![](https://raw.githubusercontent.com/TheArchPirate/ctf-writeups/main/DEADFACE/images/less-dropbox.png)

Going to this [link](https://www.dropbox.com/s/io1kaqznal2c10y/corrupted.zip) we get a download for a zip (corrupted.zip) with an image inside (FOR0x.png). We find out this is password protected.

We can use fcrackzip against this:

`fcrackzip -u -D -p /usr/share/wordlists/rockyou.txt corrupted.zip `

```
fcrackzip -u -D -p /usr/share/wordlists/rockyou.txt corrupted.zip
```

The extracted image FOR0x.png is corrupted. Looking at this is a hex editor (I'm using okteta) we can see that the file header is wrong and does not match that of a png.

![](https://raw.githubusercontent.com/TheArchPirate/ctf-writeups/main/DEADFACE/images/FOR0x-header.png)

To resolve this a jfif image was generated and the header from it was transferred into the hex editor allowing for the image to be opened. _This step was completed by [Quantix](https://github.com/cftad/)._

![](https://raw.githubusercontent.com/TheArchPirate/ctf-writeups/main/DEADFACE/images/FOR0x-jfif.png)

We can now open the image.

![](https://raw.githubusercontent.com/TheArchPirate/ctf-writeups/main/DEADFACE/images/FOR0x-flag.png)

## Flag
- - -

flag{Easy_Right}