Skip to main content

Easy Steganography


Easy Steganography



First, you need to download the attached file and unzip it
you will end up with 4 images each one contains its flag 


Flag 1 

if you open this image you will see a normal pic without any interesting info 
and if you try to use "ExifTool" or "binwalk" you will get normal information 
but if you use to try to take a look with "hexdump" you gonna earn your flag ✌

use : hexdump -C flag1.jpeg | grep S 



Flag 2

flag 2 is the same image as flag1 no interesting info so we will use "binwalk" here 

use:   binwalk flag2.jpeg


as you can see there is another image within the flag2 image so we need to extract it 

use:  binwalk --dd '.*' flag2.jpeg


as you can see after extracting a new folder came up navigate to that folder and you will see 
a new image called 1326F just open it and you will get flag2 ✌



Flag 3

This one is so simple you just need to use strings command to capture the flag ✌

use: strings flag3.jpeg 



Flag 4

For this flag, we gonna use "binwalk" again to take a deep look at the content  

use: binwalk flag4.jpeg 


as we can see there are another image within this image so we will extract it again like the flag two

use: binwalk --dd '.*' flag4.jpeg


after extracting you will see a new folder created for flag 4 navigate to it and you 
will find 3 files use strings with 1326F and you will get the flag ✌

use: strings 1326F 


Done! 


Comments

Popular posts from this blog

Jack-of-All-Trades

Jack-of-All-Trades TryHackMe | Jack-of-All-Trades First of all, this write up is quite long so be patient and stay tunned coz it's a fun box and you may  learn something new so take your notes and let's jump into this machine starting with enumeration we ganna use Nmap for that to see what ports and services are running as we can see there are web service and ssh but both of them running on different ports so keep that in mind  let's go to the website and check this out but first, we need to allow HTTP to run port 22 you need to follow these steps  1- Select and copy the following preference name network.security.ports.banned.override 2- In a new tab, type or paste about:config in the address bar and press Enter/Return. Click the button promising to be careful. 3- In the search box above the list, type or paste ports and pause while the list is filtered If the above-listed preference exists: 4- Double-click it and add a comma to the end of the list followed by the port nu...
HA Joker CTF   TryHackMe | HA Joker CTF this room is medium rated  first of all, as we used to do we will run Nmap scan against our target    as we can see you have three ports open ssh and two HTTP services so let's take a look at web app that is running on port 80   we have here a web page with a lot of joker's quotes  let's take a look at the page source to see if there any interesting info we can find    hmm there is no useful info so let's visit the second service on port 8080 it requires a username and password to access this page ok let's run gobuster against port 80 and what will we find  great we found some directories and some answers also  one of those files you will found contains a username, note it and now we have a username  time to get its password we will use brute force attack to gain access to services on port 8080  but the hint says that this username and password encoded with base64 so let's run burp ...