[Hacking walkthrough] Basic steganography

[Hacking walkthrough] Basic steganography

Another day, another tryhackme room challenge. Today, we are going for a simple steganography challenge. If you are really in love with stego challenge, you can try rootme or hackthissite. For your information, stego is hiding something which can be in the form of text, audio, image, and video into another form of file. There are numerous tools used to extract data from a stego file, you can check this and this. For this challenge, we are going to try 5 different ways to extract the information from a stego file. Without further ado, let’s start the walkthrough

Task 1: Simple stego

Something is hiding inside the image, can you find it?

I had tried the following ways to extract the data from this image. Let’s see the result.

ToolSuccess/failureRemark
stringsFailureAll information is gibberish
exiftoolFailure Nothing is hiding inside the metadata
zstegFailure File header error
binwalkFailure Can’t detect the hidden file
steghideSuccess

The figures below show the output of each scanning tool.

Look like we strike a goal by using the steghide. To extract the data using steghide, use the following command without any passphrase.

$ steghide extract -sf Challenge1.jpg

You just get your first flag. However, the next challenges gonna take you a long time to solve it, how about listening to a song?

Answer: flag{###NeverGonnaGiveYouUp###}

Task 2: Cracking the password

In the previous task, we have successfully extracted the flag using steghide. How about this one?

Once again, launch your steghide without the passphrase.

Oops, look like we need the passphrase to extract the flag within it. After searching across the stego tool list, I come across with a steghide password cracker called stegcracker. We are going to crack the password by using rockyou.txt wordlist. Enter the following command to crack the password.

$ stegcracker Challenge2.jpeg rockyou.txt

Now, take a break, have a coffee or watch a movie. This cracking process takes 2 to 3 hours for my Intel-i3 gen-2 laptop. If everything runs smoothly, you should get the following result.

The passphrase for the file is Passp0rt. Yup, the time and electricity I spent is definitely worth it.

Answer: flag{###ICanHazPasswordSkillz###}

Task 3: Crack and decode

Can you find the flag?

Similar to the previous task, you need to crack the password in order to extract the flag from the image file. This time, it took less than 10 seconds to crack the password. Huh… something not right.

What a simple password. Next, punch in the password and get the flag.

For your information, this is an encoding flag using a type of base. It can be base58, base64, base85 or even base91. Which one could it be?

Is a base64. However, something still not right. The flag is unreadable! Look like we have the mess with the alphabet order. Time to call the all-mighty Ceasar. (Cough), is Ceasar cipher.

A Ceasar cipher +16 solved the challenge.

Answer: flag{###14mSup3r1337B0i###}

Conclusion

That’s all for the basic steganography, cracking and decoding challenges. Hope you learn something today and see you later ;).

Share the knowledge

Leave a Reply