PicoCTF-2019 Writeup
  • HHousen PicoCTF-2019 Writeup
  • Binary Exploitation
    • L1im1tL355
    • messy-malloc
    • OverFlow 2
    • CanaRy
    • NewOverFlow-1
    • NewOverFlow-2
    • sice_cream
    • seed-sPRiNG
    • leap-frog
    • GoT
    • rop64
    • rop32
    • Ghost_Diary
    • zero_to_hero
    • Challenge Name
    • Heap overflow
    • slippery-shellcode
    • AfterLife
    • SecondLife
    • stringzz
  • Cryptography
    • la cifra de
    • b00tl3gRSA2
    • b00tl3gRSA3
    • AES-ABC
    • john_pollard
    • b00tl3gRSA2
    • waves over lambda
  • Forensics
    • What Lies Within
    • m00nwalk
    • shark on wire 1
    • shark on wire 2
    • Glory of the Garden
    • pastaAAA
    • Investigative Reversing 0
    • Investigative Reversing 1
    • extensions
    • investigation_encoded_1
    • Investigative Reversing 2
    • investigation_encoded_2
    • Investigative Reversing 3
    • like1000
    • Investigative Reversing 4
    • WebNet0
    • B1g_Mac
    • m00nwalk 2
    • WebNet1
    • WhitePages
    • So Meta
    • c0rrupt
  • Web Exploitation
    • Java Script Kiddie 2
    • Empire1
    • Empire2
    • cereal hacker 1
    • Empire3
    • cereal hacker 2
    • Java Script Kiddie
    • JaWT Scratchpad
    • Irish-Name-Repo 1
    • Irish-Name-Repo 2
    • Irish-Name-Repo 3
  • Reverse Engineering
    • Time's Up, Again!
    • Forky
    • droids0
    • Challenge Name
    • droids1
    • droids2
    • droids3
    • reverse_cipher
    • droids4
    • B1ll_Gat35
    • Time's Up
    • Time's Up, For the Last Time!
    • asm1
    • asm2
    • asm3
    • asm4
  • Challenge Name
Powered by GitBook
On this page
  • Problem
  • Solution
  • Flag

Was this helpful?

Edit on Git
  1. Forensics

m00nwalk

PreviousWhat Lies WithinNextshark on wire 1

Last updated 4 years ago

Was this helpful?

Problem

Decode this message from the moon. You can also find the file in /problems/m00nwalk_6_811c5485a374101cc212434dc2601130.

Solution

  1. The hint suggests that this is related to how images from the moon landing were transmitted back to earth. Some research leads to . Note: Originally I solved this challenge using but since then I found an easier way that works within Kali Linux (see next step).

  2. () explains how to convert the audio file to an image.

  3. Install qsstv with apt-get install qsstv

  4. Run pactl load-module module-null-sink sink_name=virtual-cable

  5. Run pavucontrol. A GUI will pop-up, go to the "Output Devices" tab to verify that you have the "Null Output" device.

  6. Run qsstv. The program GUI will pop-up, go to "Options" -> "Configuration" -> "Sound" and select the "PulseAudio" Audio Interface

  7. Back in the pavucontrol GUI, select the "Recording" tab and specify that QSSTV should capture audio from the Null Output

  8. The hint asked "What is the CMU mascot?" - the answer is "Scotty the Scottie Dog". This hinted that we should select "Scottie 1" as QSSTV's "Mode". Select "Auto Slant" as well.

  9. Run paplay -d virtual-cable message.wav to create the image:

  10. Unload the virtual audio cable so audio will play normally:

    $ pactl list short modules | grep null
    25      module-null-sink        sink_name=virtual-cable
    $ pactl unload-module 25

Flag

picoCTF{beep_boop_im_in_space}

Message
SSTV
this program for Windows
This tutorial
Archive
QSSTV finished image