Steganography ctf tools by Avi.....
Disclaimer: I have collected the following information from different sites, some youtube channels just to done things quickly during steg ctf challenges.
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
file command
eog command
strings <imagename> | grep -i flag
exiftool <image_name>
apt-get install exif
Now decode the hex using the cyber chef tool or you can use the built-in python tool as described below image.
******************************************************************
exiv2 command
******************************************************************
binwalk <image_name>
binwalk -e <image_name>
-e for extract
Using this tool, you can check whether there is a hidden archive
data on that image or not.
How to extract archive data using binwalk.
binwalk -dd=”.*” <image_name>
binwalk -M -dd=”.*” <image_name>
after extraction, it saves under _StegPuzzle3.jpg.extracted
directory.
******************************************************************
foremost <imagename>
******************************************************************
******************************************************************
******************************************************************
******************************************************************
******************************************************************
******************************************************************
zsteg -a <png_image_name>
-a for everything
Png files can be run in this tool.
Png file can be run on, zsteg, eog, stegsolve.jar
jpg file can also be open using eog
******************************************************************
apt-get install steghide
steghide embed -ef secure.txt -cf <image_name>
-ef is embedfile
-cf is coverfile
steghide extract -sf <image_name> (it will then ask for password: if no password then just simply press enter)
-sf is stegfile
******************************************************************
Stegosuite
Apt-get install stegosuite
******************************************************************
dd command:
dd if=sourceimage.jpg bs=1 skip=1972141 of=example.zip
if is input file name from where you want to extract zip
information.
Bs= block size
of is output file
skip is a decimal value. using binwalk command we know where
is our zip file is located inside an image. binwalk command will help you to
find out the hex value and its corresponding decimal value. dd command doesn’t
understand hex value, so we need to put here decimal value.
Outguess:
apt-get install outguess
-d is texts that we want to embed with an image.
Steg_image.jpg is, we will embed the something.txt using this image.
Output_steg_image.jpg is, will be our final output image.
outguess -k password -d something.txt steg_image.jpg
output_steg_image.jpg
-k is for password
outguess -r output_steg_image.jpg output.txt
-r means retrieve
Whatever the text the image contains, that will be
redirected to output.txt files.
******************************************************************
Hex editor command:
xxd for linux
xxd <image_name>
hexeditor <imagename>
hexdump <image_name>
HxD for windows
stegcracker:
apt-get install stegcracker
stegcracker ncd2020.jpg /usr/share/wordlists/rockyou.txt
Stegseek cracker:
Stegseek <image_name> <dictionary file path>
******************************************************************
https://www.youtube.com/watch?v=boqFZY-MaOM
To download stegsolve.jar follow the below link.
https://github.com/eugenekolo/sec-tools/tree/master/stego/stegsolve/stegsolve
To run:
java -jar Stegsolve.jar
png file can be run using this tool.
******************************************************************
jstego:
Download from here:
https://sourceforge.net/projects/jstego/
To run:
java -jar jstego-0.3.jar
When you have large jpg files (most probably two images to compare) then you can use this tool to extract information's from those images.
******************************************************************
ImgStegano
To run:
java -jar ImgStegano.jar
******************************************************************
JPG FFD9 (FF D9)
The terminating byte of a jpg image in hex is FFD9. If you
see after that something start with PK-phill catz
all the way to the end, then it might be a .zip file hiding inside that image.
that .zip file contains the flag. Copy those highlighted text on a new window
in HxD and save it as .zip
Extract it. You might get the flag.
Now let’s see, how you can do the same in kali linux.
We can leverage binwalk and dd command. First use binwalk
command to see where your zip archive data is. Mark that hex value (offset)
0x1E17AD. Now, note that corresponding decimal value of that hex value that is
1972141
Now use dd command.
dd if=example.jpg bs=1 skip=1972141 of=secret.zip
******************************************************************
Magic number of a .png image file:
89 50 4E 47 0D 0A 1A 0A
Use hex editor to edit it.
If a .png file starts with PK-Phill Katz, then it will tell
you it’s a zip archive file when you check it via file command. But, actually
its not.
If you see, the magic hex numbers are not there, put those
there and then try to open the png file.
******************************************************************
Tesseract-ocr
Optical character recognition. If this is a high-resolution
image then my methodology is, convert the image in more bigger format so that we can
extract the image text more efficiently.
Command in kali:
convert ocr_cool.png -scale 300% output.png
A good tool that read the text from an image file is called tesseract.
Apt-get install tesseract-ocr
Tesseract <image file from that we want to read text> <out>
Here out is output text file…
******************************************************************
Pngcsum is our file after extracting it from
pngcsum-v01.tar.gz
./pngcsum <corrupted_file> <newly_correct_generated_file>
if pngsum unable to run then check its file permission.
chmod +x pngsum
******************************************************************
tweakpng:
download the tool from the below link.
http://entropymine.com/jason/tweakpng
******************************************************************
Stegoveritas:
https://github.com/bannsec/stegoVeritas
how to install in kali:
pip3 install stegoveritas
stegoveritas_install_deps
******************************************************************
Online steg tools:
https://www.mcafee.com/enterprise/en-us/downloads/free-tools/steganography.html
https://futureboy.us/stegano/decinput.html
Online barcode reader:
https://online-barcode-reader.inliteresearch.com/
https://zxing.org/w/decode.jspx
both the above tool you will get from this link, https://0xrick.github.io/lists/stego/
https://0xrick.github.io/lists/stego/
https://resources.infosecinstitute.com/topic/steganography-and-tools-to-perform-steganography/
https://ctfs.github.io/resources/topics/steganography/file-in-image/README.html
Virtual punch card reader:
https://www.masswerk.at/cardreader/
Whitespace steganography:
https://neatnik.net/steganographr
Zero width white space steganography
https://neatnik.net/steganographr/
Installing sonic visualizer:
Download .deb package of sonic visualizer from their
website.
sudo dpkg -i <.deb file>
-i for install
or sudo apt install sonic-visualizer
Wavsteg:
github below link is explained how to install.
https://github.com/ragibson/Steganographt#WavSteg
Which can detect digital modification.
Grep command feature for hash or string finding from heystack file:
Main command:
cat grep_practice.txt | grep -e "[0-9a-f]\{32\}"
-w -o | sort -u
Only 32-bit hash will display as output from the below txt file.
root@kali:~/Desktop# cat grep_practice.txt | grep -e
"[0-9a-f]\{32\}"
it will display all the strings that
has character count 32 and 32+
632e1c9b593b0faf778e6de166448d93 (32)
632e1c9b593b0faf778e6de166448d945487343 (32+)
root@kali:~/Desktop# cat grep_practice.txt | grep -e
"[0-9a-f]\{32\}" -w
it will display only string that has
exact character count equal to 32
632e1c9b593b0faf778e6de166448d93
cat haystack.txt | grep -o “flag{[a-z_]\{,16\}}” >
output.txt
-o for an exact match
\{,16\} we don’t know the minimum length that is why,
(comma given); and the maximum length is 16 as said on the hints.
\{ \} means this is not in the part of the regular expression.
Now it is better to save the output in a text file. That
will help you to find the text quickly.
#############################################################################
Deep sound software is windows based software. Using this software you can extract something from an audio (.wav) file. And using sonic visualizer, you can find out if something is written into that audio file by analyzing that audio file's spectrogram.
#############################################################################
Comments
Post a Comment