Alsavaudomila

    • alsavaudomila Writeup
      • About
      • Contact
      • privacy-policy

Tag: jiff

  • Corrupted file picoCTF Writeup

    file, HEX, hexdump, hexedit, jiff, jpg, strings
    2026/2/12

audacity Base64 Burp Suite dd exiftool fdisk ffmpeg file grep HEX hexdump hexedit jiff jpg Low Public Exponent Attack mount pdfdumper PNG pngcheck QR code RSA sox steghide strings Wireshark zbarimg zip2john zsteg

  • ・picoCTF-Cryptography-Easy
  • ・picoCTF-Cryptography-Medium
    • Crack the Power picoCTF writeup
    • Mini RSA picoCTF Writeup
  • ・picoCTF-Forensics-Easy
    • DISKO 1 picoCTF Writeup
    • Corrupted file picoCTF Writeup
    • RED picoCTF Writeup
    • Scan Surprise picoCTF Writeup: The Best Way to Reveal Hidden QR Secrets
    • Ph4nt0m 1ntrud3r picoCTF Writeup
  • ・picoCTF-Forensics-Medium
  • ・picoCTF-General Skills-Easy
  • ・picoCTF-Web Exploitation-Easy
    • Includes picoCTF Writeup
  • ・picoCTF-Web Exploitation-Medium
  • ・tools
    • Disk Image Forensics: Why mount Fails and How to Make the Right Call First
    • pdfdumper in CTF: Extracting PDF Content and Common Challenge Patterns
    • Analyzing ZIP Encryption: When to Act
    • CTF Audio Challenges: A Practical SoX Combat Guide
    • steghide in CTF: How to Hide and Extract Data
    • CTF Forensics Tools: The Ultimate Guide for Beginners
    • pngcheck in CTF: How to Analyze and Repair PNG Files
    • zbarimg in CTF: QR/Barcode Decoding Techniques and Common Challenge Patterns
    • fdisk in CTF: Partition Analysis and Common Challenge Patterns
    • dd in CTF: Disk Imaging, Extraction, and Common Challenge Patterns
    • FFmpeg in CTF: How to Analyze and Manipulate Audio/Video Files
    • Audacity in CTF: Audio Forensics Techniques and Common Challenge Patterns
  • ・uncategorized
Alsavaudomila

Alsavaudomila

  • alsavaudomila Writeup
    • About
    • Contact
    • privacy-policy

Most Important Guide (Corrupted File)