Description
This file seems to be a simple copy and paste from wikipedia. It would be necessary to dig a little deeper…
Good luck!
Format : Hero{} Author : Thibz
Files
Write up
This challenge is an introduction to object-based steganography PDF. A PDF (Portable Document Format) document is composed of various objects that are stored in a tree structure. These objects include text, images, fonts, annotations, and other page elements.
Each object in the PDF document is identified and stored as a separate entity. The objects are categorized into two main types: PDF objects and PDF streams. PDF objects are used to store text, fonts, and page descriptions. PDF streams are used to store images, compressed data, and other types of data.
The PDF document is composed of a sequence of objects. Each object is identified by an object number. The object number is an integer that uniquely identifies the object within the document.
This is very useful for steganography because it is possible to insert images, text or scripts directly into a PDF as an object.
To list all the objects in a PDF, many tools exist, but for my part, I strongly advise the use of peepdf.
|
|
In addition to giving us the list of objects, they contain a system of detection of suspicious elements.
|
|
We realize that object 1 and 110 contain an embedded file.
|
|
We see that there is a reference to the object 111 with the name “script.js”.
|
|
Note the /EF entry, which means the referenced file is embedded (the actual file data are in a separate stream object).
|
|
Finally we find the hidden file!
|
|
Simply apply the reverse operation :
|
|
Flag
Hero{M4L1C10U5_C0D3_1N_PDF}