Description
Can you find the flag in file without running it?
Setup
Download the binary named 'strings' from the challenge page.
Solution
Walk me through it- Step 1Extract printable strings and grep for the flagThe strings utility scans any file and prints sequences of consecutive printable characters (default minimum length: 4). Piping the output through grep narrows it to the flag line immediately.bash
strings strings | grep picoCTFLearn more
The strings command scans any binary file - executables, object files, firmware images, documents - and prints every sequence of consecutive printable ASCII characters that meets a minimum length threshold (default: 4 characters). It works by reading raw bytes and outputting runs of printable characters followed by a null byte or non-printable byte.
This is powerful for reverse engineering because compiled programs still contain their string literals in plain form in the binary. Error messages, hardcoded URLs, passwords, flag values, and format strings all appear verbatim in the binary's data section. Running
stringson an unknown binary is often the very first step in any CTF binary challenge or malware analysis session.Useful
stringsflags to know:-n 8- raise minimum length to 8 (reduces noise)-e l- scan for 16-bit little-endian strings (Windows executables)-t x- print the file offset (in hex) of each string-a- scan the entire file, not just loadable sections
In real-world malware analysis,
stringsquickly reveals C2 (command-and-control) server hostnames, mutex names, registry keys, and embedded commands. Security tools like FLOSS (FireEye Labs Obfuscated String Solver) extend the concept to also decode obfuscated and dynamically constructed strings that simplestringswould miss.Where strings live in an ELF binary: compiled C and C++ programs store string literals in the
.rodata(read-only data) section or the.datasection of the binary. Error messages, help text, version strings, and format strings forprintfall end up there verbatim. Thestringscommand does not parse the binary format - it simply scans raw bytes - so it finds text in every section including the stack, BSS, and even the ELF headers themselves.Limitations of the strings approach: sophisticated malware and obfuscated binaries can evade
stringsby XOR-encoding their string constants and decoding them only at runtime. In such cases, the binary will contain no readable C2 addresses or obvious indicators - just garbage bytes. This is why dynamic analysis (running the binary in a sandbox and observing its network traffic and system calls) complements static analysis. Tools like Ghidra, IDA Pro, and Binary Ninja can identify decryption routines and recover the decoded strings through emulation or code analysis.Combining strings with other tools multiplies its value. Piping to
sort -udeduplicates repeated strings. Piping towc -lgives a quick count of how many strings were found. Usingstrings -t x fileand then navigating to those offsets in a hex editor (likexxdorhexedit) lets you examine what surrounds each string - sometimes the context bytes reveal the purpose of a string even when the string itself is ambiguous. In CTF competitions, always runstringsas one of the first steps on any unknown binary challenge file before attempting disassembly.
Flag
picoCTF{...}
The strings utility finds sequences of printable characters in any binary - flags and other secrets embedded in executables are often immediately visible.