Siunam's Website

My personal website

Home About Blog Writeups Projects E-Portfolio

Zoonn Recording

Overview

Background

Dr. Ke is watching pwn video during a Zoonn meeting. Can you find what was pwned in that pwn video?

Attachment: zoonn-recording_010be3c3eae392244bb7390a56118972.zip

Solution: https://hackmd.io/@blackb6a/hkcert-ctf-2022-ii-en-6a196795

Find the flag

In this challenge, we can download an attachment:

┌──(root🌸siunam)-[~/ctf/HKCERT-CTF-2022/Misc/Zoonn-Recording]
└─# unzip zoonn-recording_010be3c3eae392244bb7390a56118972.zip   
Archive:  zoonn-recording_010be3c3eae392244bb7390a56118972.zip
  inflating: 2022-02-02 22.22.22 Zzz 22222222222.mp4

If you look closely, the flag is being reflected on his glass!

Let’s use ffmeg to flip video horizontally:

┌──(root🌸siunam)-[~/ctf/HKCERT-CTF-2022/Misc/Zoonn-Recording]
└─# ffmpeg -i 2022-02-02\ 22.22.22\ Zzz\ 22222222222.mp4 -vf hflip -c:a copy OUTPUT.mp4

Now, we can barely see the flag. (Flag format: hkcert22{.*?})

We can also use ffmeg to extract every frames!

┌──(root🌸siunam)-[~/…/HKCERT-CTF-2022/Misc/Zoonn-Recording/output]
└─# mkdir output;cd output

┌──(root🌸siunam)-[~/…/HKCERT-CTF-2022/Misc/Zoonn-Recording/output]
└─# ffmpeg -i ../output.mp4 '%04d.png'

Now we can view the flag frame by frame:

Conclusion

What we’ve learned:

  1. Leaking Sensitive Information via Bad Operation Security (Physical Security)