imaginaryCTF 2023 - Rev
by Eth007
I guess reversing deserved a challenge after all.
Attachments: rev.zip
Solution
This zip file contains two RAID metadata files. I was unsure what could be done with these until I came across this post. Using this knowledge, I XOR’d the two images together to form one recovered image. I then binwalked the file which contained a linux filesystem:
I extracted the file system, then ran strings on it to display the entire file system:
Once I was able to see the file system, I came to the conclusion that we could likely just extract the files from this filesystem utilizing the hex dump and the “dd” command. Knowing this, I found the location of a PNG header signature inside the hex dump, converted it’s hex location to decimal, then extracted the PNG file: