Description
Can you find the flag in this disk image?
Setup
Download and decompress the disk image.
Mount the image and explore the git repository inside.
gunzip disk.img.gzsudo mount -o loop disk.img /mnt/diskSolution
Walk me through it- Step 1Decompress and quick strings checkExtract the disk image, then run strings as a fast pre-check for an obvious flag.bash
gunzip disk.img.gzbashstrings disk.img | grep picoCTFLearn more
Running
strings disk.img | grep picoCTFis always the first triage step for a disk image challenge. If the flag is stored in plaintext anywhere in the image (inside a file, in git object data, in filesystem metadata, or even in unallocated slack space) this one-liner finds it instantly without requiring mounting or filesystem parsing.stringslooks for sequences of at least 4 consecutive printable ASCII characters by default. You can lower the threshold with-n 3or raise it with-n 8. For UTF-16 strings (common in Windows artifacts) usestrings -e l. The tool ignores file structure entirely, which means it finds text even in compressed sections, inside binary headers, and in deleted-but-not-overwritten file content. - Step 2Detect partition layout and mountUse mmls to find the correct partition offset, then mount it.bash
mmls disk.imgbashsudo mount -o loop,offset=$((512*<start_sector>)) disk.img /mnt/diskbashls /mnt/diskLearn more
mmlsis part of The Sleuth Kit (TSK), a widely used open-source digital forensics toolkit. It reads MBR and GPT partition tables and displays each partition's slot number, type, start sector, end sector, length, and description. This is faster and more forensically reliable thanfdisk -l, which is designed for live disks rather than raw image files.Disk images often contain multiple partitions: a small EFI system partition, a swap partition, and the main Linux ext4 data partition. You need to mount the correct one. The data partition is typically the largest and is usually type
0x83(Linux) in MBR layouts or has a matching GUID in GPT layouts.mmlsoutput includes aDescriptioncolumn that helps identify it.After mounting, the filesystem is accessible under the mount point just like any other directory. You can use standard file tools (
ls,find,cat) to explore it. Mounting with-o ro(read-only) is best practice to avoid accidentally modifying the evidence. - Step 3Copy the git repositoryLocate and copy the .git directory to a writable path.bash
find /mnt/disk -name '.git' -type dbashcp -r /mnt/disk/<repo_path> /tmp/repobashcd /tmp/repoLearn more
The
.gitdirectory is the heart of any git repository. It contains all objects (blobs, trees, commits, tags), all refs (branches, tags, HEAD), the stash, notes, reflog, and configuration. An entire repository's history is fully recoverable from just this directory: the working tree files are simply checked-out copies of objects already in.git/objects/.Copying the repository to a writable location is necessary because git commands write to the repository (updating the reflog, for example) and the mounted filesystem may be read-only or owned by root. Working in
/tmpavoids permission issues. The copy is an exact duplicate: all objects, refs, and configs are preserved, so all git forensics commands work identically on the copy. - Step 4Comprehensive git history searchWalk every hiding place. Don't concatenate lost-found blobs - cat them per-file with a header so you can identify the source. Iterate every tag rather than peeking at only the first one.bash
git log --all -p | grep -A2 picoCTFbashgit branch -abashgit stash list && git stash show -pbashfor tag in $(git tag -l); do echo "=== $tag ==="; git show "$tag"; donebashfor c in $(git log --all --format=%H); do git notes show "$c" 2>/dev/null; donebashgit reflogbashgit fsck --unreachable 2>&1 | grep blobbashgit fsck --lost-foundbashgrep -rB1 picoCTF .git/lost-found/other/Learn more
Git's content-addressed storage means nothing is truly deleted until
git gcprunes unreachable objects. A developer who commits a secret and then removes it in a later commit has only hidden it from casual inspection: the blob containing the secret remains as a dangling object in.git/objects/. The same is true for force-pushed-over commits (visible in the reflog), dropped stash entries, and deleted branches (still in the reflog until expiry).git fsck --unreachablelists every object in the object store that cannot be reached by following any ref. These are the objects thatgit gcwould delete. They include old versions of files, commits on deleted branches, and stash entries that were dropped.git fsck --lost-foundgoes further and writes them into.git/lost-found/other/(blobs) and.git/lost-found/commit/(commits) so they can be read with standard tools.This challenge may hide the flag in any of these locations, requiring you to check all of them systematically. In real security investigations, tools like truffleHog, gitleaks, and git-secrets automate this search across all git history locations and flag any strings matching credential patterns.
- Step 5Extract the flagRead content from whichever location held the flag.bash
git show <commit>bashgit cat-file -p <blob-hash>Learn more
git cat-file -p <hash>prints the raw content of any git object. For a blob (file snapshot) it prints the file content. For a commit it prints the commit message, author, timestamp, and tree reference. For a tree it lists the directory entries. The-pflag means "pretty-print": it automatically detects the object type and formats accordingly.Once you identify a suspicious hash from
git fsck,git reflog, orgit stash list,git cat-file -p <hash>reveals its content without needing to check out any branch or restore any working tree files. This is the most direct way to inspect raw git objects and is an essential technique for both forensics and debugging git corruption issues.For more on the surrounding shell workflow, see Linux CLI for CTF.
Flag
picoCTF{...}
The flag is hidden somewhere in the git history. It may be in a deleted branch, stash, tag, note, reflog entry, or unreachable dangling object.
How to prevent this
How to prevent this
Deleted branches, dropped stashes, and amended commits all leave objects behind. Do not rely on deletion to remove secrets.
- Pre-commit secret scanning (
gitleaks,trufflehog,detect-secrets) is the only intervention that prevents the bug. Deletion after the fact does not help; the blob is already in.git/objects/. - For accidental commits: rotate the secret first, then rewrite history (
git filter-repo) and force-push. Notify anyone who has cloned the repo to re-clone fresh; old clones still hold the secret. - On servers, run
git gc --prune=now --aggressiveafter history rewrites to actually drop unreachable objects. On GitHub/GitLab, the "remove sensitive data" flow is more reliable than gc.