Skip to main content

picoCTF WriteUp | DISKO 1

R4shSec
Author
R4shSec
I like it when things work how they’re not supposed to.
Table of Contents

Introduction
#

Task PicoCTF

Hey everyone 👋 — In this Capture The Flag (CTF), we are given a task to find a flag in a disk image.

Analyzing The Disk Image
#

The disk image is in a .dd format after extracting it. We could utilise strings to extract the human-readable data.

Strings

Viola! We’ve found the flag just like that. Easy isn’t it?

Notepad

Flag 🚩
#

picoCTF{1t5_ju5t_4_5tr1n9_c63b02ef}