![]() ![]() If someone wants to have a look at the hexdump: To extract the metadata one can use various commands, such as exiftool, file, mediainfo or others # file audio.wav audio.wav: RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 48000 Hz # exiftool audio.wav ExifTool Version Number : 11.65 File Name : audio.wav File Size : 1183 kB File Type : WAV MIME Type : audio/x-wav Encoding : Microsoft PCM Num Channels : 2 Sample Rate : 48000 Avg Bytes Per Sec : 192000 Bits Per Sample : 16 Duration : 6.31 s Furthermore, there is a sequence of data bytes. ![]() I will not go much into detail, but out of curiosity I wanted to understand more about the wav file format and found a great source.Ī wave file contains a header containing important information for playing the audio file (such as frames per second, bits per sample, num of channels, etc.). Wohoo yes that sounds very easy, but doing it for the first time, it can get very interesting.īefore I dive into the challenge itself let’s see how the wav format looks like. When I googled for flags or secret texts in audio files, I mostly found recommendations as: (1) Use Audacity or Sonic Visualiser, (2) check the waveform and spectrum for hints, (3) LSB might have been used to hide text or (4) maybe infra- or ultrasound range is used to transmit a secret text.
0 Comments
Leave a Reply. |