- Image
- Audio Files
file image.png
strings image.png |grep flag or something related
exiftool image.png Exiftool Commands
binwalk -e image.png
Check hidden data embeded
There are two methods
-
- You know password - steghide extract -sf image.png
-
- Dont know password - stegcracker image.png
hexedit image.png
- a normal png header is
00000000 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 |.PNG........IHDR|
- a JFIF header is
0x FF D8 FF E0 xx xx 4A 46 49 46 00
Check Hidden between Images
zsteg image.png
A txt file is given with paragraphs here stegsnow might help to retrive flag
mp3 wav file you can use audacity