β˜•
Doc
  • πŸ‘‹Hi !
  • πŸ“’Documentations
    • πŸ€“Servers
      • πŸ”₯Ξ›rch Linux
      • πŸ’šCheckMk
      • πŸ“ΊZabbix
      • 🎰Google Authenticator
      • πŸš”FiveM
      • 🏎️Assetto Corsa
    • 😈Hacking
      • πŸ‘οΈNMAP
      • πŸ‰Hydra
      • πŸ’‰SQL Injection
      • πŸˆβ€β¬›Hashcat
      • πŸ“ŸShellcode
      • πŸ—ƒοΈLFI / RFI
      • 🐧Linux Password Cracking
      • ‴️Privesc
      • πŸšͺBypassing Antivirus (AV) Detection
      • πŸ’™Discord Tokens
      • πŸ–‡οΈLinks
    • πŸ’»Dev
      • 🌘C/C++
      • πŸ’€Assembly
    • πŸ—ƒοΈCheat Sheet
      • πŸͺƒGIT
      • ❌HTTP Codes and Methods
      • 🐳Docker
      • πŸ“°Regex
      • ⏰Crontab
  • πŸ΄β€β˜ οΈCTF TIPS
    • πŸŒ†Image Steganography
    • 🩻Useful Commands
Powered by GitBook
On this page
  • File
  • Strings
  • Exif
  • Binwalk
  • pngcheck
  • Found a password? (Or not)
  • Aperi'Solve
  1. CTF TIPS

Image Steganography

This page is highly inspired by StegOnline.

File

Just to be sure what file you are facing with, check its type with type file.

Strings

View all strings in the file with strings -n 7 -t x file.png. We use -n 7 for strings of length 7+, and -t x to view- their position in the file. Alternatively, you can view strings on this site once an image has been uploaded.

Exif

Check all image metadata with exiftool file.png.

Binwalk

We use binwalk to check image's for hidden embedded files. My preferred syntax is binwalk -Me file.png. -Me is used to recursively extract any files.

pngcheck

We can use pngcheck to look for optional/correct broken chunks. This is vital if the image appears corrupt.

Run pngcheck -vtp7f file.png to view all info. v is for verbose, t and 7 display tEXt chunks, p displays contents of some other optional chunks and f forces continuation after major errors are encountered.

Found a password? (Or not)

You can extract data by running steghide extract -sf file.png.

Aperi'Solve

Aperi'Solve is an online platform which performs layer analysis on image. The platform also uses zsteg, steghide, outguess, exiftool, binwalk, foremost and strings for deeper steganography analysis. The platform supports the following images format: .png, .jpg, .gif, .bmp, .jpeg, .jfif, .jpe, .tiff...

PreviousCrontabNextUseful Commands

Last updated 10 months ago

If you've found a password, the goto application to check should be . Bear in mind that steghide can be used without a password, too.

If not you can use to brute force the steghide password by running stegcracker file.png [<wordlist>].

πŸ΄β€β˜ οΈ
πŸŒ†
steghide
stegcracker
Aperi'Solve
An all-in-one steg image tool.
Logo