đź§ What I Practiced/Learned/Discovered
- Discovered
steghidewhich is a tool that extract hidden data from an image. - Every details is important so make sure to be careful to everything. (I was staring at the solution for too long without knowing it)
đź”§ Tools used
Linux shell
base64exiftoolsteghide
Steps
- Open the picture in a visualizer to see if there is any visual evidence
- Open the image with
exiftool img.jpgto see if there is helping metadata - Found a
base 64pattern in the comment. - Decoded it with
echo "" | base64 -d - Found another
base 64pattern, and run againecho "" | base64 -d - It showed pAzzword.
- At that point I wasn’t quite sure what to do with it
- I didn’t really realisez that “steghide was something important”
- Search on internet “ctf i have an image and a password” lol
- 1st link was about steghide
- I ran
steghide extract -sf img.jpg -p pAzzword- It returned :
wrote extracted data to "flag.txt". - I
cat flag.txtand I got the flag.
- It returned :