Martin Rozariyo
Back to writeups

CTF_Writeups

Nothing Expected - Writeup

2026/0xfun/Forensics/NothingExpected/Writeup.md

Nothing Expected - Writeup

image

The challenge name “NothingExpected” suggests the file may appear normal but hides something in an unexpected place.

Step 1 — Initial Analysis

Check file type:

image

The image opens normally — nothing suspicious visually.


Step 2 — Steganography Scan

Run zsteg, a common PNG stego tool:

image

Output reveals:

meta application/vnd.excalidraw+json.. file: JSON text data

👉 This is the key clue.

The PNG contains embedded metadata of type:

application/vnd.excalidraw+json

This MIME type belongs to Excalidraw, a diagram-drawing tool.


Step 3 — Understanding Excalidraw PNG Exports

Excalidraw PNG exports embed the original drawing scene inside PNG metadata (usually iTXt chunks).
This allows the image to be reopened and edited later.

So the PNG is not just an image — it contains a hidden drawing.


Step 4 — Failed Extraction Attempts

Typical methods were attempted:

Binwalk

binwalk -eM file.png

image

Only partial zlib data detected — nothing usable extracted.


Strings Extraction

strings file.png > dump.txt

Extracted fragments were truncated and not valid JSON.


Exiftool

exiftool file.png

image

🏆 Step 5 — Intended Solution

Since the data is an embedded Excalidraw scene, the simplest method is:

👉 Open the PNG directly in Excalidraw

  1. Go to:

https://excalidraw.com

  1. Menu → Load → From file

  2. Select file.png


🔥 Step 6 — Revealing the Hidden Content

After loading, the hidden drawing appears.

image

🚩 Flag

0xfun{th3_sw0rd_0f_k1ng_4rthur}