← All Challenges

White_Noise_Protocol

Forensics 100 pts standard
Challenge Description

It’s just noise.

That’s what the junior analyst wrote in the initial report.

During a system acquisition, a single file stood out among thousands of artifacts, transmission.wav.

It plays without error. No metadata anomalies. No embedded files. No readable strings.

And yet, it was transmitted repeatedly to an external endpoint during the intrusion window.

The attacker clearly wanted this file sent.

The question is why?

Listen carefully. Or perhaps… look more closely.

Flag format: HackCTF{...}

Hints
View Hint : Hint

Sometimes the answer isn’t hidden inside the file — it’s hidden in how the file behaves.

Try analyzing the audio visually instead of only listening to it.

View Hint

Audio editing and forensic tools can display signals in different forms.

Spectrogram mode may reveal patterns that are not obvious in waveform view.

View Hint

The transmission uses distinct frequencies to represent data.

Think about how binary information could be encoded using tones over time.

Submit Flag

Login to submit a flag.