PicoCTF Disko-3 Full Writeup: Step-by-Step Solution

 Disko-3 Picoctf Full Writeup......


picoctf

  🧩 Challenge Overview


We were given a raw disk image named disko-3.dd and tasked with recovering a hidden file or  flag. The file system appeared to be a FAT32 volume, and no partitions were listed by fdisk.

 

 

🧰 Tools Used

 
1.file - to identify file type 

2.fls (SleuthKit) - to list files, including deleted entries

3.fdisk - a command-line utility used for partitioning hard drives and info 

4.icat (SleuthKit)- to recover files by inode



  

🔍 Step 1 :-  Inspect the Disk Image Type

 

I first checked the image using the file command

 

picoctf

 



🔍 Step 2 :-  List Files and also Deleted 


I used fls to list all files (including deleted ones):


picoctf



I used grep to easy to find specific file.


picoctf



You can see that I found a file maybe it's the flag file. The '+' symbol indicates it is deleted, and 522628 is the inode number.



🔍 Step 3 :-  Recover the Deleted File and Read the flag.


To recover the file, I used icat, then decompress and reveal the flag.

 


picoctf

 


      Thank you for reading this writeup.          





 Read More WriteUp.....



Read More Blog........





0 Comments