Martin Rozariyo
Back to writeups

L3m0nCTF2025-Writeups

Challenge Overview: Nowhere on the Road

Forensics/NowhereOnTheRoad/Readme.md

Challenge Overview: Nowhere on the Road

Category: Forensics / Steganography
Event: L3m0nCTF 2025
Role: Challenge Author

πŸ› οΈ Author Note
This challenge was authored by me for L3m0nCTF 2025.
The following explanation describes the intended analysis path.

Intended Analysis Path

The challenge was designed to test:

  • recognition of when spatial-domain analysis is insufficient
  • rejection of metadata and pixel-based assumptions
  • understanding that images can carry information in non-spatial domains
  • familiarity with frequency-domain representations of images

All visible and file-level inspection techniques were intentionally ineffective.

image

Analysis Phase 1 β€” Eliminating Spatial-Domain Techniques

Files : NowWhereOnTheTheRoad.tar.gz

The problem statement explicitly rules out common approaches:

  • No visible data in the image
  • No corrupted structure
  • No metadata-based hiding
  • No spatial-domain manipulation reveals anything

This immediately implies that the flag is not present in the pixel domain.

The line

β€œIf the answer were written on the image, this would already be over”

confirms that the information exists, but not in a directly observable form.

Analysis Phase 2 β€” Identifying the Correct Domain

If an image contains information that:

  • Is invisible,
  • Is not localized,
  • And survives standard image operations,

then the information likely exists outside the spatial domain.

A standard representation of images beyond pixels is the frequency domain.

This makes frequency analysis a justified next step.

Analysis Phase 3 β€” Frequency-Space Inspection

Steps performed:

  1. Convert the image to grayscale
  2. Apply a 2D Fast Fourier Transform (FFT)
  3. Shift the zero-frequency component to the center
  4. Visualize the magnitude spectrum using log scaling

Analysis Phase 4 β€” FFT Visualization

The frequency-domain representation was visualized using an external FFT tool (ImageJ).

In that application load the file and go to Process->FFT->FFT you will get your FFT image where the flag is present.

The resulting FFT magnitude spectrum reveals the embedded information.

image

Analysis Phase 5 β€” Interpreting the Frequency Artifacts

In the FFT magnitude spectrum:

  • Structured, non-random patterns appear
  • These patterns are not present in the original image
  • The shapes form readable text
  • The road image acts purely as a carrier

This confirms that the flag is embedded in frequency space, not pixel space.

Final Output

L3m0nCTF{77T_mu5t_b3_t4k3n_4_c0nc3rn}


Conclusion

This challenge is not about finding something hidden on the image β€”
it is about looking at the image in the correct domain.

The absence of evidence was never the absence of information β€”
it was the absence of perspective.