# Challenge Overview: Nowhere on the Road **Category:** Forensics / Steganography **Event:** L3m0nCTF 2025 **Role:** Challenge Author > πŸ› οΈ **Author Note** > This challenge was authored by me for **L3m0nCTF 2025**. > The following explanation describes the **intended analysis path**. ## Intended Analysis Path The challenge was designed to test: - recognition of when spatial-domain analysis is insufficient - rejection of metadata and pixel-based assumptions - understanding that images can carry information in non-spatial domains - familiarity with frequency-domain representations of images All visible and file-level inspection techniques were intentionally ineffective. image ## Analysis Phase 1 β€” Eliminating Spatial-Domain Techniques Files : [NowWhereOnTheTheRoad.tar.gz](https://github.com/rozariyomartin/L3m0nCTF2025-Writeups/blob/main/Forensics/NowhereOnTheRoad/NowWhereOnTheTheRoad.tar.gz) The problem statement explicitly rules out common approaches: - No visible data in the image - No corrupted structure - No metadata-based hiding - No spatial-domain manipulation reveals anything This immediately implies that the flag is **not present in the pixel domain**. The line > *β€œIf the answer were written on the image, this would already be over”* confirms that the information exists, but **not in a directly observable form**. ## Analysis Phase 2 β€” Identifying the Correct Domain If an image contains information that: - Is invisible, - Is not localized, - And survives standard image operations, then the information likely exists **outside the spatial domain**. A standard representation of images beyond pixels is the **frequency domain**. This makes frequency analysis a justified next step. ## Analysis Phase 3 β€” Frequency-Space Inspection Steps performed: 1. Convert the image to grayscale 2. Apply a 2D Fast Fourier Transform (FFT) 3. Shift the zero-frequency component to the center 4. Visualize the magnitude spectrum using log scaling ## Analysis Phase 4 β€” FFT Visualization The frequency-domain representation was visualized using an external FFT tool (ImageJ). In that application load the file and go to Process->FFT->FFT you will get your FFT image where the flag is present. The resulting FFT magnitude spectrum reveals the embedded information. image ## Analysis Phase 5 β€” Interpreting the Frequency Artifacts In the FFT magnitude spectrum: - Structured, non-random patterns appear - These patterns are not present in the original image - The shapes form readable text - The road image acts purely as a carrier This confirms that the flag is embedded **in frequency space**, not pixel space. ## Final Output L3m0nCTF{77T_mu5t_b3_t4k3n_4_c0nc3rn} --- ## Conclusion This challenge is not about finding something hidden *on* the image β€” it is about looking at the image in the **correct domain**. > The absence of evidence was never the absence of information β€” > it was the absence of perspective.