π§ CTF Speaker β NNS CTF 2025
Category: Misc
Points: 454
Flag Format: NNS{...}
π Challenge

βI heard some strange sounds at the last CTF I attended, so I got out my analyser. You may need the analyser software from:
Ellisys Better Analysis Toolβ
File provided: ctf-speaker.btt
π Step 1 β Inspecting the Capture
After extracting the archive, I found a .btt file. This format is a proprietary Bluetooth trace used by Ellisys Bluetooth Analyzer.
I opened the file in the Ellisys Better Analysis software and started examining the captured packets.
- Filtering the trace showed AVDTP Media Packets, which corresponds to Bluetooth audio streaming.
- The softwareβs Audio playback feature let me listen to the captured stream.

πΆ Step 2 β Finding Suspicious Audio
Listening through the playback, I noticed that around the 65sβ100s mark there were beeps that didnβt sound like regular audio. These resembled Morse code tones.
Rather than trying to figure out how to export ONLY this segment of the audio in this software (that I had never used before), I just exported the entire audio capture file.
π Step 3 β Audio Processing
To isolate the Morse code section more clearly:
- Loaded the exported full audio into Ableton Live 12 Suite.
- Trimmed the clip down to only the suspicious beeps.
- Verified that the tones were indeed structured enough to be Morse code.
- EQβd the audio so the beeps were more dominant in the audio file.

- Extracted 65s-100s from original audio export to a smaller, more digestible version.
π Step 4 β Decoding the Morse
I uploaded the clipped audio to morsecode.worldβs adaptive decoder.

- At first, the live text decoder produced gibberish (random letters).

- However, scrolling further down, the spectrogram output actually drew letters visually.

- Thereβs the flag! Watching carefully while the audio played, it spelled out the flag in the correct flag format
NNS{...}

π Step 5 β Submit The Flag!
We got it! After typing the flag into a text editor from watching it draw out while listening to the audio on morsecode.worldβs adaptive decoder, I went ahead and submitted the flag.

Thatβs it!
Flag: NNS{5n1ff1ng_HCI_tO_pl4y_sOund}
Key Takeaways
- Bluetooth Forensics: AVDTP (Audio/Video Distribution Transport Protocol) packets can contain hidden messages in audio streams
- Audio Steganography: Morse code can be embedded in audio files as tone patterns
- Multi-Tool Analysis: Sometimes the best approach is combining specialized tools (Ellisys for Bluetooth, Ableton for audio editing, online decoders for analysis)
- Visual Decoding: When automated text decoding fails, visual spectrogram analysis can reveal hidden patterns
I had a great time solving this challenge. Special thanks to my teammates at Lil L3AK and NNS CTF team for putting together some great challenges and overall, a fun and challenging CTF!