Forensics - Tippy Tappies
118 solves | 257 points
Description
wow they must be using a really old phone (wrap number in kqctf{} flag wrapper)
Downloads
Solution
My first instinct when given a .wav file was to run it through the standard steganography tools. The list of tools I tried was:
Binwalk
Exiftool
Strings
Steghide
Wavsteg
Sonic visualizer
Unfortunately, none of these tools gave any lead. So I proceeded to listen to the .wav file manually to understand what is going on. Turns out, at around 0:20 seconds of the audio file, the caller (presumably) was asked to dial in their credit card number. Reversing the dial tone back to its corresponding number manually proved to be really difficult but fortunately, there's an abundance of Dual tone multi frequency (DTMF) decoder out there to do it for us. The tool that we will use is: https://github.com/KFSPC8/dtmf-decoder
By using the command: dtmf -v -t 15 tippytappiesbutmobile.wav

We get the above decoding. Now wrap the numbers in the flag format and we get:
Flag: kqctf{4716097646384761}
Last updated