From Technologia Incognita
Revision as of 01:26, 10 February 2014 by Cool Fire (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search


Freestyle 300 - Illegal Radio

We received a flac audio file which contained the analog recording of a digital WFM radio station.
Using SDR# you we could load in a WAV file and play back the radio station.

Command to convert flac to wav:
 flac -d OLYMPIC-CTF.FM\ -\ 133.37MHz\ -\ IQ_Data.flac

The flag was contained in the text stream that is normally displayed on the radio screen.
SDR# can pick this information up and decode it out of the box.

Screenshot - 08-02-14 - 23-29-31.png

Freestyle 400 - Make similar

We received an audio recording of a fax transmission coming in.
A large part of the problem was just finding some software that would take input from an audio file and process it as a fax. HAMFAX is able to do this but repeatedly crashed when loading the audio file. (HAMFAX only takes 8000 Hz 16 bit pcm WAV files, I converted the original .ogg file using audacity)
I resorted to just playing the file back over a speaker and having HAMFAX decode from the microphone. This produced a fairly poor quality image but sufficient to find a section of text contained within the fax data.
I also tried to do visual analysis on the fax audio file by trying to read the audio samples from the file and assigning a shade of black to a pixel in a BMP for each sample, but this didn't really work out. The data in the file was visible but getting the meta-data stripped out and getting everything aligned just right would likely have taken another day of coding.

The data in the fax image turned out to be an xxencoded file plus some extra information in the form of the filesize it should be and a checksum.

Screenshot - 09-02-14 - 16-07-27.png

After cleaning up the image in GIMP I was able to get a reasonable OCR of the text and with some manual crosschecking got the correct checksum.
The xxdecoded file was returned in a gzip compressed file but failed to extract the .py file it contained for some reason. Using zcat on the file rather than trying to extract it the python script (which also contained the flag) could be read.