🔬
CTFs
  • 🚩nitrozeus's CTF Writeups
  • Tutorial
    • Install Windows 10 VM on M1 Mac
  • My Notes
    • Capture-The-Flag
      • Windows Forensics
      • Memory Forensics
      • Base32, Base64
      • Steganography
      • Email Analysis
      • Malware Analysis
      • MD4, MD5 Cracking
      • Social Engineering
      • OSINT
      • Google Dorking
      • Reconnaissance
      • Port Scan (nmap)
  • 2023
    • 🧠BrainHack CDDC 2023
      • Gallery
      • Eazy Network Analysis
      • What the hell happened to the PC?!
      • Audio Steganography
  • 2022
    • 🐱Grey Cat The Flag 2022
      • Parcel
      • Memory Game (Part 1)
      • Too Fast
      • Entry
      • Ghost
      • Firmware
      • Image Upload
      • flappy-js
    • ⛵STANDCON 2022
      • I Sea You (Part 1)
      • Locate Me
      • I Sea You (Part 2)
      • Trolley Trolling
      • A New Gateway
      • Walks like a cat, barks like a dog
      • Shark in the Ocean
      • Atlan Safe P1
      • Gift from Russia
      • Asmuth Shares
      • Memedump
      • Warmup Forensics
    • 🦁STACK the Flags 2022
      • Finding Nyan
      • New Task!
      • Hit you with that
      • Cobalt Struck
      • PyRunner
Powered by GitBook
On this page
  1. 2022
  2. STANDCON 2022

I Sea You (Part 1)

PreviousSTANDCON 2022NextLocate Me

Last updated 2 years ago

After the golden crown was stolen, our team of operatives intercepted unusual sea-radio waves coming from our stronghold. We suspect that there is a double-agent that helped Atlantis steal the crown!

Your Mission: Intercept the message and make contact with the double-agent

For this challenge, we were given a .wav file, and immediately we went to launch . By experience, most challenges that involves audio files are Steganography challenges. An example would be this .

Unfortunately, after opening it in Sonic Visualizer, we did not see anything of interest. We were skeptical

The 7th and 8th at the bottom caught our eye. We decided to extract that portion of the audio by deleting the other portion of the audio and ONLY leaving the Morse Code portion.

Partial Flag: STANDCON22{Y0u_F0uNd_0r

From the looks of it, there is nothing out of the ordinary and so we thought we have hit a dead end.

PS: You couldn't have chosen a better location to store the treasure, my liege! I loved the food so much that I left a review! (As you requested, I am sending this in White at the bottom of the email so as to be as discreet as possible)

The huge hint from the text was "I left a review!". And so we figured that we have to find some sort of a Google Review on Agent Orca's profile.

Final Flag: STANDCON22{Y0u_F0uNd_0rC@'s_SEA_cR3t!}

Challenge Files

We decided to play the audio and listened to it. To our surprise, at the 1 minute mark of the audio, we heard a familiar sound - known as .

We fired up , an audio software, and took a look at the .wav file.

After a bit of Googling, we uploaded our extracted morse code portion to a , and we receive the results in text.

The next thing we did was send an email to ORCA.ATLANTIS@GMAIL.COM and within minutes we got a reply WITH a partial flag!!!

BUT, we saw there was an empty space right after Agent Orca's sign off, after experiencing Grey Cat The Flag's challenge, we immediately highlighted that empty white space!

We used an OSINT tool, called Epios, that helps us find Agent's Orca profile via its email address.

Alternatively, you could use this post/guide to find user's review via Google ID.

Clicking onto the Google Maps link, we went to the Reviews tab and we found the other half of the flag!!

⛵
😲
🎉
🎉
Morse Code
Audacity
Morse Code decoder
Ghost
online
Reddit
🤔
Sonic Visualizer
write-up
91MB
intercepted-audio-sea-waves.zip
archive
.wav file in sonic visualizer
Audacity
export as .wav
morse code decoded
Agent Orca replied!
hidden text
epios
second half of the flag!