Greeting! Welcome to another THM challenge write up Today, we are going to finish off the easy steganography challenge. This room is created by me but the challenge was ported from challenge land. I hope you enjoy the write-up.
Download the image and start our very first stego task.
Like I said before, this challenge is a little bit unique. In order to complete this task, we need to do a reverse image search using TinEye.
Look like we have plenty of similar image on the internet. Simply download an image and we are going to compare the original with the image with stego text.
Are you able to distinguish the difference?
Download the image and you get a similar image as stego 1.
Well, we have an image file within an image file. To extract all the contents within the file, I’m going to use binwalk with the following command.
$ binwalk --dd='.*' image2.jpeg
A hidden message inside the image. The flag is the message.
You get a similar picture.
This one easy, use strings command and finish off the challenge.
I guess I don’t need to say anything about this.
Similar to task 2 but a little bit advance. Extract all the files and read the XML using strings command. You will eventually locate the following flag.Image
That’s all for the quick and simple steganography challenge. Hope you like it. Until next time.