Skip to content

Commit 2c91ea7

Browse files
authored
Added issue #17
Added Issue #17 Created "Misc" section Moved miscellaneous items to Misc section Created "References" Section (for issue #17 )
1 parent 4af6bd8 commit 2c91ea7

File tree

1 file changed

+21
-9
lines changed

1 file changed

+21
-9
lines changed

os-agnostic/steganography.md

Lines changed: 21 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,17 +6,17 @@ Hack Responsibly.
66
Always ensure you have **explicit** permission to access any computer system **before** using any of the techniques contained in these documents. You accept full responsibility for your actions by applying any knowledge gained here.
77
{% endhint %}
88

9-
`StegCracker` - [https://pypi.org/project/stegcracker/](https://pypi.org/project/stegcracker/) - bruteforce tool for finding `steghide` passwords and extract \(works well, uses `rockyou.txt` as default wordlist\)
10-
11-
extract files from stego'd files: `binwalk -Me <filename>`
12-
13-
[http://bigwww.epfl.ch/demo/ip/demos/FFT/](http://bigwww.epfl.ch/demo/ip/demos/FFT/) - Fast Fourier Transform online tool. Check this to test stego images that cant be solved with other stuff
14-
15-
[https://0xrick.github.io/lists/stego/](https://0xrick.github.io/lists/stego/) [https://github.com/DominicBreuker/stego-toolkit/blob/master/README.md\#tools](https://github.com/DominicBreuker/stego-toolkit/blob/master/README.md#tools) [https://pequalsnp-team.github.io/cheatsheet/steganography-101](https://pequalsnp-team.github.io/cheatsheet/steganography-101)
16-
179
## Steganography Checklist
1810

19-
[https://georgeom.net/StegOnline/checklist](https://georgeom.net/StegOnline/checklist) - TODO: 5KFB6 properly link everything below, clean up, credit to [Ge0rg3](https://github.com/Ge0rg3) for this great checklist. His site also has custom examples for each situation below.
11+
TODO: clean up steganography CTF checklist (issue [#17](https://github.com/zweilosec/Infosec-Notes/issues/17))
12+
* Properly link all tools and attributions
13+
* Add description for what the checklist is for
14+
* Make sure all tools still exist
15+
* Check author's site for updates
16+
* Add "Resources" section at bottom
17+
* Find link for "feature for randomizing the color palette" (section 10.ii) on author's site
18+
19+
* credit to [Ge0rg3](https://github.com/Ge0rg3) for this great checklist. His site also has custom examples for each situation below.
2020

2121
1. File
2222
1. Just to be sure what filetype you are facing, check with `type <filename>`.
@@ -66,3 +66,15 @@ extract files from stego'd files: `binwalk -Me <filename>`
6666
2. It would be rare to have a case of PVD where you're not explicitly told \(or perhaps hinted at\) that this is the steganographic method, as it's very niche.
6767
3. Related write-ups: TJCTF 2019, MMA-CTF 2015
6868

69+
## Misc
70+
71+
`StegCracker` - [https://pypi.org/project/stegcracker/](https://pypi.org/project/stegcracker/) - bruteforce tool for finding `steghide` passwords and extract \(works well, uses `rockyou.txt` as default wordlist\)
72+
73+
extract files from stego'd files: `binwalk -Me <filename>`
74+
75+
[http://bigwww.epfl.ch/demo/ip/demos/FFT/](http://bigwww.epfl.ch/demo/ip/demos/FFT/) - Fast Fourier Transform online tool. Check this to test stego images that cant be solved with other stuff
76+
77+
[https://0xrick.github.io/lists/stego/](https://0xrick.github.io/lists/stego/) [https://github.com/DominicBreuker/stego-toolkit/blob/master/README.md\#tools](https://github.com/DominicBreuker/stego-toolkit/blob/master/README.md#tools) [https://pequalsnp-team.github.io/cheatsheet/steganography-101](https://pequalsnp-team.github.io/cheatsheet/steganography-101)
78+
79+
## References
80+
* [https://georgeom.net/StegOnline/checklist](https://georgeom.net/StegOnline/checklist)

0 commit comments

Comments
 (0)