CC: Steganography
Last updated
Last updated
Date: 19, May, 2021
Author: Dhilip Sanjay S
to go to the TryHackMe room.
Steganography(Stego) is the art of concealing something inside something else, for example: A message inside a jpg file, or a binary inside a png.
All needed files can be found inside the included zip file
Steghide is one of the most famous steganography tools.
It is used for hiding a message inside an image.
Works only for jpg image:
A downside of steghide is that it only works on jpgs; however, that means that if you believe there is a hidden message inside a jpg, then steghide is a probable option.
Benefits of stegohide:
It can encrypt data with a passphrase.
Answer: embed
Answer: -ef
Answer: -cf
Answer: -p
Answer: extract
Answer: -sf
Answer: pinguftw
Steps to Reproduce:
zsteg is to png's what steghide is to jpg's. It supports various techniques to extract any and all data from png files.
zsteg also supports BMP files, but it is primarily used for png's.
Answer: --lsb
Answer: --msb
Answer: -v
Answer: -E
Answer: nootnoot
Answer: b1,bgr,lsb,xy
Exiftool is a tool that allows you to view and edit image metadata.
Answer: Hello :)
Steps to Reproduce:
Stegoveritas supports just about every image file, and is able to extract all types of data from it.
It is an incredibly useful tool if you don't know exactly what you're looking for, as it has a myriad of built in tests to extract any and all data.
Stegoveritas has other features as well such as color correcting images.
Answer: -meta
Answer: -steghide
Answer: -extractLSB
Answer: kekekekek
Steps to Reproduce:
Spectrogram stegonography is the art of hiding hidden an image inside in an audio file's spectogram.
Therefore when ever dealing with audio stego it is always worth analyzing the spectrogram of the audio.
Answer: Google
Steps to Reproduce:
Answer: superkeykey
Steps to Reproduce:
Since, it's a jpg image, the key must be hidden using steghide.
But we need a passphrase to extract the data.
So, let's try exiftool first to checkout some of the metadata.
The metadata contains password=admin
.
Now we can run steghide to extract the data!
Answer:
Steps to Reproduce:
We can see the link in the image after spectrogram analysis: https://imgur.com/KTrtNI5
We'll download the image file using wget https://i.imgur.com/KTrtNI5.png
.
It is a png file, hence we can use either zsteg and stegoveritas to find the hidden information.
Answer: killshot
Steps to Reproduce:
It seems like the qrcode cannot be scanned from this image.
Initially I tried to scan it using zbarimg
, which gave the following error:
Remember that stegoveritas has color-correction features too?
So, we'll run stegoveritas for this final challenge:
It color corrected and gave out almost 50 images.
Only 5 out of 50 images were scannable using zbarimg.
We'll check the one with inverted: