Skip to main content
  1. CTF Writeups/

flags are stepic - picoCTF 2025

·132 words·1 min
picoCTF2025 Forensics Python
Miles Handelman
Author
Miles Handelman
A group of underground hackers might be using this legit site to communicate. Use your forensic techniques to uncover their message
Additional details will be available after launching your challenge instance.

Upon launching the instance, we are given a website with mostly country flags.

flags

Further down on the website there’s a flag which isn’t the flag for an actual country.

upanzi

After downloading this flag, we use the python stepic library (as the name of this challenge implies) to decode the challenge flag from the fake flag.

import stepic
from PIL import Image

# Path to the image
image_path = r"C:\Users\Miles\Desktop\picoCTF\upz.png"

# Open the image
try:
    img = Image.open(image_path)
    
    # Decode the hidden message
    decoded_data = stepic.decode(img)
    
    # Print the extracted message
    print("Decoded message:", decoded_data)
except Exception as e:
    print("Error:", e)

flagstepic

Flag: picoCTF{fl4g_h45_fl4g1a2a9157}

Related

Bitlocker-1 - picoCTF 2025
·168 words·1 min
picoCTF2025 Forensics Bitlocker John The Ripper
Event-Viewing - picoCTF 2025
·374 words·2 mins
picoCTF2025 Forensics Event Viewer
Ph4nt0m 1ntrud3r - picoCTF 2025
·232 words·2 mins
picoCTF2025 Forensics Wireshark
RED - picoCTF 2025
·86 words·1 min
picoCTF2025 Forensics Steganography
Based - picoGym
·127 words·1 min
picoGym General Skills Python ChatGPT
Eavesdrop - picoGym
·182 words·1 min
picoGym Forensics Wireshark