Skip to main content

Write-Up Rflag HTB

·1 min·
WriteUp HTB Challenge rtl_433 Cyberchef Hardware
Table of Contents

In this writeup I will show you how I solved the Rflag challenge from HackTheBox. The challenge is an easy hardware challenge. Let’s start!

Initial Analysis
#

After downloading and unzipping the file we can see that it is a .cf32 file. This was the first time I encountered this type of file so I did some research about it. I found out that it is a file that contains complex 32-bit floating point samples. I also found out that we can use rtl_433 to decode this file. So let’s install it .

rtl_433
#

Since I’ve never used this tool before I had to do some research about it. I found out that we can use the -A flag to decode the file. So let’s try it out.

rtl_433 signal.cf32 -A

This is what the output looks like. In the last line we can see that we have some hex values. Let’s try to decode them using CyberChef . Our guess was right. We have a flag.

Marco Campione
Author
Marco Campione
MSc. Cybersecurity Student @KTH