Forensics - Tippy Tappies
118 solves | 257 points
Last updated
118 solves | 257 points
Last updated
wow they must be using a really old phone (wrap number in kqctf{} flag wrapper)
My first instinct when given a .wav
file was to run it through the standard steganography tools. The list of tools I tried was:
Binwalk
Exiftool
Strings
Steghide
Wavsteg
Sonic visualizer
By using the command: dtmf -v -t 15 tippytappiesbutmobile.wav
We get the above decoding. Now wrap the numbers in the flag format and we get:
Flag: kqctf{4716097646384761}
Unfortunately, none of these tools gave any lead. So I proceeded to listen to the .wav
file manually to understand what is going on. Turns out, at around 0:20 seconds of the audio file, the caller (presumably) was asked to dial in their credit card number. Reversing the dial tone back to its corresponding number manually proved to be really difficult but fortunately, there's an abundance of Dual tone multi frequency (DTMF) decoder out there to do it for us. The tool that we will use is: