TexSAW CTF 2026 lostmykey
I can’t find my original house key anywhere! Can you help me find it? Here’s a picture of my keys the nanny took before they were lost. It must be hidden somewhere!
Flag format:
texsaw{flag_here}
Solution
1. Extracting Hidden Files
Using binwalk, we can identify and extract any embedded
files:
1 | ❯ binwalk -e Temoc_keyring.png |
After extraction, we have two similar images:
Temoc_keyring(orig).pngwhere_are_my_keys.png
Checking them with pngcheck confirms they are both
valid, but their file sizes and compression ratios differ.
2. Pixel Comparison
At first glance, the two images appear identical. However, the
difference in file size suggests that data might be hidden in the pixel
values themselves. We can use a Python script with the
Pillow library to compare them:
1 | from PIL import Image |
Running this reveals exactly 131 differing pixels, all located within
the very first row (y = 0).
4. Decoding the Steganography
The pattern of differing pixels suggests a binary encoding. We can treat each pixel in the first row as a bit:
- Bit 1: If the pixels at
(x, 0)are different. - Bit 0: If the pixels at
(x, 0)are identical.
We then group these bits into 8-bit bytes and convert them to ASCII characters to reveal the flag.
Extraction Script:
1 | from PIL import Image |