Post

Just Some Avocado Writeup - scriptCTF 2025

My writeup for the "Just Some Avocado" forensics challenge in scriptCTF 2025

Just Some Avocado (302pts)

just an innocent little avocado!

avocado.jpg

Initial Thoughts

We are given an image file, avocado.jpg. Because it is a forensics challenge, the first thing to check is stegonography.

The provided file, "avocado.jpg", which depicts a cartoonish avocado with a light blue background.

Methodology

I uploaded the image into Aperi’solve, and foremost found a zip file.

A screenshot of foremost on Aperi'solve, which says "foundat=justsomezip.zipUT"

Unfortunately, the zip file requires a password.

A screenshot of 7-zip, which says "0% Extracting C:\Users\saanv\Downloads\avocado.jpg" and "Enter password:"

Using zip-password-finder and rockyou, we find the password impassive3428.

A screenshot of a Kali Linux terminal, showing the process of finding the zip password

Unzipping the file shows staticnoise.wav and justsomezip.zip.

A screenshot of 7-zip, showing the files found from unzipping avocado.jpg: justsomezip.zip and staticnoise.wav

Unfortunately, justsomezip.zip is password protected. However, it does seem to contain the flag.

A screenshot of a Kali Linux terminal, showing how the password for justsomezip.zip could not be cracked using rockyou.txt

This means that staticnoise.wav must have the password hidden somehow. The audio is, just as it says, static noise. This means that it’s probably not morse code or garbled text in the audio file itself.

The next thing to check is spectograms. Sometimes audio files have hidden pictures/text “drawn” on the wavelengths that are revealed when you view the spectogram.

I upload staticnoise.wav into Audacity and switch it to spectogram view.

A screenshot of Audacity, showing a hidden stenographic message

This reveals a hidden message of d41v3ron. Using that as the password for justsomezip.zip works.

A screenshot of 7-zip, showing the file found from unzipping justsomezip.zip: flag.txt

Finally, we find flag.txt.

Solution

The flag is scriptCTF{1_l0ve_d41_v3r0n}. This was a relatively simple forensics challenge that combined numerous basic techniques, and I had fun.

This post is licensed under CC BY 4.0 by the author.