In this writeup I will show you how I solved the Rflag challenge from HackTheBox. The challenge is an easy hardware challenge. Let’s start!
Initial Analysis #
After downloading and unzipping the file we can see that it is a .cf32
file. This was the first time I encountered this type of file so I did some research about it. I found out that it is a file that contains complex 32-bit floating point samples. I also found out that we can use rtl_433
to decode this file. So let’s install it
.
rtl_433 #
Since I’ve never used this tool before I had to do some research about it. I found out that we can use the -A
flag to decode the file. So let’s try it out.
rtl_433 signal.cf32 -A
This is what the output looks like.
In the last line we can see that we have some hex values. Let’s try to decode them using CyberChef
.
Our guess was right. We have a flag.