Rating:

Challenge: **Image Extraction**

Category: **Forensics**

Points: **150**

Description: **Uncover a jpg file from the given file. The flag is in that image.**

Solution: **analyzing the hex of the file, I used [Hexed](https://hexed.it/) , we could guess that the magic bytes had been changed, in reality it was not a pdf but a zip**

![](https://i.postimg.cc/wjh1gMHc/Screenshot-222.png)

**changing the magic bytes to those of a zip archive, we could export it, extract it and we had the image with numbers: 74 65 78 73 61 77 7B 6F 4E 65 5F 43 75 54 65 5F 43 61 54 21 7D (they are the flag in hex)**

![](https://i.postimg.cc/TY9R94jG/cute-cat-photos-3593441022.jpg)

**at this point it was enough to convert from hex to text, I used [CyberChef](https://gchq.github.io/CyberChef/#recipe=From_Hex('Space')&input=NzQgNjUgNzggNzMgNjEgNzcgN0IgNkYgNEUgNjUgNUYgNDMgNzUgNTQgNjUgNUYgNDMgNjEgNTQgMjEgN0Q)**

![](https://i.postimg.cc/nrW1bkBL/Screenshot-223.png)

flag: **texsaw{oNe_CuTe_CaT!}**