You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: os-agnostic/steganography.md
+21-9Lines changed: 21 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,17 +6,17 @@ Hack Responsibly.
6
6
Always ensure you have **explicit** permission to access any computer system **before** using any of the techniques contained in these documents. You accept full responsibility for your actions by applying any knowledge gained here.
7
7
{% endhint %}
8
8
9
-
`StegCracker` - [https://pypi.org/project/stegcracker/](https://pypi.org/project/stegcracker/) - bruteforce tool for finding `steghide` passwords and extract \(works well, uses `rockyou.txt` as default wordlist\)
10
-
11
-
extract files from stego'd files: `binwalk -Me <filename>`
12
-
13
-
[http://bigwww.epfl.ch/demo/ip/demos/FFT/](http://bigwww.epfl.ch/demo/ip/demos/FFT/) - Fast Fourier Transform online tool. Check this to test stego images that cant be solved with other stuff
[https://georgeom.net/StegOnline/checklist](https://georgeom.net/StegOnline/checklist) - TODO: 5KFB6 properly link everything below, clean up, credit to [Ge0rg3](https://github.com/Ge0rg3) for this great checklist. His site also has custom examples for each situation below.
11
+
TODO: clean up steganography CTF checklist (issue [#17](https://github.com/zweilosec/Infosec-Notes/issues/17))
12
+
* Properly link all tools and attributions
13
+
* Add description for what the checklist is for
14
+
* Make sure all tools still exist
15
+
* Check author's site for updates
16
+
* Add "Resources" section at bottom
17
+
* Find link for "feature for randomizing the color palette" (section 10.ii) on author's site
18
+
19
+
* credit to [Ge0rg3](https://github.com/Ge0rg3) for this great checklist. His site also has custom examples for each situation below.
20
20
21
21
1. File
22
22
1. Just to be sure what filetype you are facing, check with `type <filename>`.
2. It would be rare to have a case of PVD where you're not explicitly told \(or perhaps hinted at\) that this is the steganographic method, as it's very niche.
67
67
3. Related write-ups: TJCTF 2019, MMA-CTF 2015
68
68
69
+
## Misc
70
+
71
+
`StegCracker` - [https://pypi.org/project/stegcracker/](https://pypi.org/project/stegcracker/) - bruteforce tool for finding `steghide` passwords and extract \(works well, uses `rockyou.txt` as default wordlist\)
72
+
73
+
extract files from stego'd files: `binwalk -Me <filename>`
74
+
75
+
[http://bigwww.epfl.ch/demo/ip/demos/FFT/](http://bigwww.epfl.ch/demo/ip/demos/FFT/) - Fast Fourier Transform online tool. Check this to test stego images that cant be solved with other stuff
0 commit comments