diff --git a/Hardware/NAVI_I2C_Sniff/README.md b/Hardware/NAVI_I2C_Sniff/README.md index a827645..43e7c8a 100644 --- a/Hardware/NAVI_I2C_Sniff/README.md +++ b/Hardware/NAVI_I2C_Sniff/README.md @@ -41,6 +41,8 @@ Use the key to decrypt the EEPROM contents and recover the flag. --- ## Solution +![sigrok I2C decode output showing flag bytes](https://git.espilon.net/Eun0us/ESPILON-CTF-2026-Writeups/raw/branch/main/screens/i2c_sniff.png) + ### Step 1 — Connect