Writeup in progress
Currently making the solution for Weird Fileand the walkthrough will be published here as soon as it's ready.
Check back soon - or follow our latest updates on the homepage- to be notified when the full writeup goes live.
Currently making the solution for Weird Fileand the walkthrough will be published here as soon as it's ready.
Check back soon - or follow our latest updates on the homepage- to be notified when the full writeup goes live.
Want more picoCTF 2021 writeups?
Use sleuthkit's fls -r -d to list deleted files in the disk image, then recover the flag file's contents with icat using the deleted inode number.
Mount the disk image with mmls to find the partition offset, then search the git repository exhaustively: commit patches, stash, tags, notes, reflog, and dangling objects via git fsck --lost-found.
Mount the disk image with mmls, copy the git repo, and search all eight hiding spots: git log --all -p, branches, stash, tags, notes, reflog, fsck --unreachable, and lost-found blobs.
Four-phase recovery: raw strings search, then mmls + mount, then git fsck/lost-found, then TSK icat for deleted inodes. The deletion routine was interrupted, leaving git objects partially intact.
A suspicious cell tower lurks in captured network traffic. Analyze the PCAP to identify the rogue tower, the compromised device, and recover the exfiltrated flag.