EOF{hidden_among_bananananananana}The word banana being repeated and the reference to peels suggested that the data might be hidden in the file's metadata or text strings rather than deep frequency analysis.
The challenge was in the Steg category, so the first step was to extract readable text.
I decided to use the strings command — a simple yet effective tool to extract printable characters from binary files:
strings banananana.wav | grep EOF
This command looks for any lines containing the keyword EOF, which is often used in CTF challenges to denote hidden messages or flag formats.
The output revealed the following lines:
EOF_BEC
;EOF{hidden_among_bananananananana}
Clearly, the flag was right there, hidden among the extracted text — just as the challenge hinted.
Flag: EOF{hidden_among_bananananananana}
Hidden among the bananas, just like the challenge description suggested! 🍌
strings - Extract printable strings from binarygrep - Search for EOF pattern# Method 1: View all strings
strings banananana.wav | less
# Method 2: Save strings to file
strings banananana.wav > output.txt
cat output.txt | grep "EOF"
# Method 3: Use hexdump
hexdump -C banananana.wav | grep -i "eof"
| Step | Action | Result |
|---|---|---|
| 1 | Analyzed the .wav file |
Contained hidden data |
| 2 | Used strings with grep EOF |
Found embedded text |
| 3 | Extracted flag in EOF{} format |
Success! |
The challenge cleverly uses the banana theme:
A fun, straightforward steganography challenge that teaches the importance of basic forensic tools! 🍌