# h1d33n

## <mark style="color:red;">Downloading Challenge Files</mark>

here is the executable file to download

{% file src="<https://1410593648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FYI2noEqPw69jd0hR7Prp%2Fuploads%2FuBEOTc55hsl7QCiJisn9%2Fh1dd3n.rar?alt=media&token=491a5c03-a540-4aad-b189-313fb4954105>" %}

in this challenge we have a wav audio file and we will use audacity to check whether this audio file hides some data inside it you can download this app from google it's free

<div align="left"><figure><img src="https://1410593648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FYI2noEqPw69jd0hR7Prp%2Fuploads%2FeM9G3pIj86mvZoTSUH3E%2Fimage.png?alt=media&#x26;token=d3494027-886b-443f-b9dd-c61cef80eb49" alt=""><figcaption></figcaption></figure></div>

and then select the audio file

<div align="left"><figure><img src="https://1410593648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FYI2noEqPw69jd0hR7Prp%2Fuploads%2F5PP1WxiXqALHhN5Dz56K%2Fimage.png?alt=media&#x26;token=912f70c6-525a-4cce-8939-821d4ce3bbf5" alt=""><figcaption></figcaption></figure></div>

now to see the hidden data we will open the spectogram&#x20;

<div align="left"><figure><img src="https://1410593648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FYI2noEqPw69jd0hR7Prp%2Fuploads%2FP3ecWjQEfNgr496o1d6N%2Fimage.png?alt=media&#x26;token=21ec9a32-68a1-4788-8014-1e3dd7828cc3" alt=""><figcaption></figcaption></figure></div>

and then we can see the hidden data **QRSRAFLF{abvfr\_gung\_znxrf\_frafr}**

<div align="left"><figure><img src="https://1410593648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FYI2noEqPw69jd0hR7Prp%2Fuploads%2FgNw6kE38B4HMF74zCZaw%2Fimage.png?alt=media&#x26;token=d431d420-1a2b-4f0d-8ba4-4edb187d1395" alt=""><figcaption></figcaption></figure></div>

and if we take a look at the readme.txt file we will see that it's giving a hint about rotation so this flag that we have found is rotated so let's decrypt this using cyberchef&#x20;

* [https://gchq.github.io/CyberChef](https://gchq.github.io/CyberChef/#input=UVJTUkFGTEZ7YWJ2ZnJfZ3VuZ196bnhyZl9mcmFmcn0)

<div align="left"><figure><img src="https://1410593648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FYI2noEqPw69jd0hR7Prp%2Fuploads%2FFIT1w12EL0nsA7TqaLly%2Fimage.png?alt=media&#x26;token=39eb8bf3-b7ee-4edd-936d-91c725ab6fd0" alt=""><figcaption></figcaption></figure></div>

<div align="left"><figure><img src="https://1410593648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FYI2noEqPw69jd0hR7Prp%2Fuploads%2FSS0fofQ99pWPAonEYbB4%2Fimage.png?alt=media&#x26;token=cafb3a9c-2a7d-42f4-bed3-a29eb1f63cac" alt=""><figcaption></figcaption></figure></div>

<div align="left"><figure><img src="https://1410593648-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FYI2noEqPw69jd0hR7Prp%2Fuploads%2FBvhGuZKnb2VMgQIgQwba%2Fimage.png?alt=media&#x26;token=1f2074d3-339a-4a67-aad7-ef282a81e146" alt=""><figcaption></figcaption></figure></div>

## <mark style="color:red;">Flag</mark>

**DEFENSYS{noise\_that\_makes\_sense}**

Greetings from[ <mark style="color:blue;">**Sayonara**</mark>](https://github.com/ismail-arame/)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://sayonara.gitbook.io/writeups/ctf/ensa-sics-ctf-2023/forensics-challenges/h1d33n.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
