diff --git a/Hardware/Wired_SPI_Exfil/README.md b/Hardware/Wired_SPI_Exfil/README.md index 12fa35d..7f0db2f 100644 --- a/Hardware/Wired_SPI_Exfil/README.md +++ b/Hardware/Wired_SPI_Exfil/README.md @@ -42,6 +42,8 @@ and XOR-decrypt the data with key `WIRED_SPI` to recover the flag. --- ## Solution +![flashrom SPI dump and strings extraction](https://git.espilon.net/Eun0us/ESPILON-CTF-2026-Writeups/raw/branch/main/screens/spi_flash.png) + ### Step 1 — Connect and assert chip select