visit
If you are interested in
hacking
and ctfs
, then steganography challenges (which come under the broad category of digital forensics) are the easiest to get into. Because you don't need to learn a lot of concepts to solve your first challenge. And once you have solved these, you can go on to learn web exploitation
and other binary exploitation
techniques.In this article, we are going to solve the following steganography problem listed on
defendtheweb.net
– //defendtheweb.net/playground/squashed-image2. Use an app to open the file locally – for example, the
HxD editor
for WindowsEvery file has a few signature bytes that can be used to identify it. And for jpg images, its header bytes are
FF D8
and ending or footer bytes FF D9
. These are hexadecimal numbers, and you can find the corresponding ASCII text in the Decoded text
section.
As you can see in the hex editor below, there is more text after the footer byte. And it clearly reads as
secret.txt
.
user - admin, pass - safe
After the FF D9 bytes, you will see that the next byte translates to PK, which indicates the start of a zip file.
PK is short for Phil Katz
, the co-creator of the zip file format. So we will save these bytes into a new file named secret.zip and extracting it gives us the same username and password. Tools used -- HxD editor, WinZip extractor
Happy Hacking!