Easy Steganography
First, you need to download the attached file and unzip it
you will end up with 4 images each one contains its flag
Flag 1
if you open this image you will see a normal pic without any interesting info
and if you try to use "ExifTool" or "binwalk" you will get normal information
but if you use to try to take a look with "hexdump" you gonna earn your flag ✌
use : hexdump -C flag1.jpeg | grep S
Flag 2
flag 2 is the same image as flag1 no interesting info so we will use "binwalk" here
use: binwalk flag2.jpeg
as you can see there is another image within the flag2 image so we need to extract it
use: binwalk --dd '.*' flag2.jpeg
as you can see after extracting a new folder came up navigate to that folder and you will see
a new image called 1326F just open it and you will get flag2 ✌
Flag 3
This one is so simple you just need to use strings command to capture the flag ✌
use: strings flag3.jpeg
Flag 4
For this flag, we gonna use "binwalk" again to take a deep look at the content
use: binwalk flag4.jpeg
as we can see there are another image within this image so we will extract it again like the flag two
use: binwalk --dd '.*' flag4.jpeg
after extracting you will see a new folder created for flag 4 navigate to it and you
will find 3 files use strings with 1326F and you will get the flag ✌
use: strings 1326F
Comments
Post a Comment