Ph0wnCTF 2026 Intro

Cospas Sarsat 406 Mhz Emergency Beacon [ pts]

## Challenge Description

We are given a wav file beacon.wav with a document related to COSPAS-SARSAT-406-MHz-Emergency-Beacon, our task is to find the flag with a hint Manchester II.

## Solution

So since this is a signal, I use the Universal Radio Hacker to extract the data from wav file.

For the parameters I applied as below:

To calculate the samples per symbol: samples_per_symbol = sample_rate / symbol_rate Here sample rate = 20 kHz and symbol rate = 400 bps, samples/symbol ≈ 50. Then we switch to Demodulated view to see the square wave. Each square is either a bit 0 or 1.

Photo

As we can see the signal is sent as short burst with a interval like in the photo, which translated as a series of ‘0’ in decoded.

In the document provided, we can see the structure of a beacon signal start with 15 1 bit:

Photo

Switch to Analysis tab, we can see the 15 consecutive 1s in the signal: Photo

In order to extract the flag, which probably located in the offset 40-83 in the signal (Check TABLE III in the document). And since the message are cut and transmitted in 5 burst, we need to separate the signal into 5 parts by 00000000 and extract the data from offset 40 to 83. It was easy since URH’s Analysis tab already provided us with the offset.

Photo

In the end we have 5 parts of the message:

011100000110100000110000011101110110111001111011011000110110000101110110011010010100000001110010010111110111001101100101011000110101010101110010011001010100010001111101

So the flag is ph0wn{cavi@r_secUreD}.