image.png

Disco-3 is a forensic ctf to find the flag

Download the disk image from the site: https://play.picoctf.org/practice/challenge/507?difficulty=2&page=1

Use the following commands to extract the flag from disk images

Step 1:

┌──(kaliॐKurukshetra)-[PICOCTF] └─$ ls disko-3.dd

We can see the folder is present here

Step 2:

┌──(kaliॐKurukshetra)-[PICOCTF] └─$ file disko-3.dd disko-3.dd: DOS/MBR boot sector, code offset 0x58+2, OEM-ID "mkfs.fat", Media descriptor 0xf8, sectors/track 32, heads 8, sectors 204800 (volumes > 32 MB), FAT (32 bit), sectors/FAT 1576, serial number 0x49838d0b, unlabeled

File command

Tells you what type of file you're dealing with.

Step 3:

┌──(kaliॐKurukshetra)-[/media/sf_PICOCTF] └─$ binwalk -e disko-3.dd

Once the binwalk complete the extraction of flag go to folder

Scans files for embedded files or data, often used in firmware or forensic analysis.