Challenge Description
You’re a spy who found a picture of a suspicous dog, suspicious_doggo.jpg
, but it’s hiding a secret message!
You will need to use the steghide
tool to find the flag hidden in this image file.
Step one is to find a passphrase hidden in the secret.txt
file.
When data is embedded in a file, it sometimes uses a password to protect that hidden data.
You will need to search through secret.txt
to find the password used to embed data in suspicious_doggo.jpg
.
(Hint: search for the filename!)
steghide
steghide
is a command-line tool used for steganography, which means hiding data within other files.
With this tool, you can embed or extract hidden data from a file. For our purposes, you will only need to extract secret data.
If you run steghide --help
, you will see all of the different options available.
Listed below are the most helpful options for this challenge:
--extract
: used to extract secret information from a file - saves it to a file
-p {passphrase}
: lets you enter the password needed to extract the data correctly (the password you found in secret.txt
)
-sf {filename}
: lets you choose the "stego file", the file with hidden data in it
-xf {filepath/filename}
: lets you choose where the extracted file is saved to
All together, it will look something like:
steghide --extract -p {password} -sf {suspicious_file} -xf /home/hacker/temp_flag.txt
Important: use -xf
to change the output file to /home/hacker/temp_flag.txt
. Just trust us, it will make your life easier.
This output file contains your temporary FLAG{...}
!
Challenge Steps
- Navigate to the
/home/ubuntu/Secret-Message-in-Photo
directory
- Find the password in
secret.txt
- Use
steghide
and the password you found to extract the hidden data from suspicious_doggo.jpg
and save it to /home/hacker/temp_flag.txt
- Move back to your home directory (
cd
), and run cat temp_file.txt
to find your temporary FLAG{..}
- Run
/challenge/verify
, enter your temp flag, and receive your official pwn.college{...}
flag!