A well known blogger has came to a hotel that we had good relationships with its staffs.
We tried to capture the sound of his room by placing a microphone inside the desk.
We have recorded the sound about the time that he has typed a text in his blogg. You could find the text he typed in “Blog Text.txt”.
We reduce noises somehow and found that many characters may have the same keysound. Also we know that he use meaningful username and password.
Could you extract the username and password of his blog?
flag is concatenation of his username and password as usernamepassword.
Solved by 16 team(s)
For this challenge we were provided a txt-file containing the blog post, as well as a wav-file containing the barely audible “recording” of the blogger typing his post.
As a first step, I normalized the wav file in Audacity. This makes the file a bit easier to work with.
I suspected that this challenge would require lots of manual labour, such as annotation, so after some browsing I came across Praat, a phonetics toolkit capable of annotating and analyzing waveforms.
It was fairly easy to map the words in the text file we were given to the waveform. The waveform begins with the blogger entering three strings of text, and then starts writing the post. We can assume that these three inputs are URL, username and password.
Looking closer at the waveform, it seems like there’s differences in the peak amplitudes for different characters. I went ahead and wrote down the peak intensities for different input characters, and wound up with the table below:
What’s worth noting here is that the intensity seems to correlate with the
position of the character on the keyboard. Characters on the far left (
w) have lower intensities than those on the far right (
My theory is that this behavior simulates that the right side of the bloggers
laptop is closer to the microphone.
Another thing I noted is that characters on the same keyboard “row” have
indistinguishable intensities. The characters
c are an example of
this. This means that we have to consider each row of characters when trying to
infer the bloggers credentials.
Going back to the credentials input, I came up with the following candidates:
After a few seconds of ocular analysis, it’s clear that the username is admin and the password is something.
This gives us our flag, adminsomething.