Table of Contents
Sonic visualizer is a tool for viewing and analyzing the contents of audio files, however it can be helpful when dealing with audio steganography. You can reveal hidden shapes in audio files. Website
sudo apt-get install sonic-visualiser
flag{iwillbreakyourheart}
Steghide is a steganography program that hides data in various kinds of image and audio files , only supports these file formats : JPEG, BMP, WAV and AU. but it’s also useful for extracting embedded and encrypted data from other files.
It can be installed with apt however the source can be found on github.
steghide extract -sf <filename>
Base64 - ZmxhZ3t3b3d5MHVmMHVuZDF0fQ==
Base64 Decoded - flag{wowy0uf0und1t}
View Source using Web Inspector, Flag is hidden in CSS file.
flag{turnitleaveitstopformatit}
This flag doesn’t have a format and is one word.
Sometimes important stuff is hidden in the metadata of the image or the file , exiftool can be very helpful to view the metadata of the files. You can get it from here
sudo apt install libimage-exiftool-perl
exiftool <filename>
GPS Cordinate data can be found in meta.
On your computer, open Google Maps In the search box at the top, type your coordinates. Here are examples of formats that work: Degrees, minutes, and seconds (DMS): 41°24'12.2"N 2°10'26.5"E Degrees and decimal minutes (DMM): 41 24.2028, 2 10.4418 Decimal degrees (DD): 41.40338, 2.17403 You'll see a pin show up at your coordinates.
flag{naalumanikkkattu}
Vigenère KEY : MOVIE
Cipher : rzvo{xts_dvxaixpenzza}
Resource : cyberchef
flag{the_intouchables}
Base64 is a group of binary-to-text encoding schemes that represent binary data (more specifically, a sequence of 8-bit bytes) in an ASCII string format by translating the data into a radix-64 representation. The term Base64 originates from a specific MIME content transfer encoding. Each non-final Base64 digit represents exactly 6 bits of data. Three 8-bit bytes (i.e., a total of 24 bits) can therefore be represented by four 6-bit Base64 digits.
Base64 Cipher : ZmxhZ3tXM19sMHYzX2hhY2tpbmd9
flag{W3_l0v3_hacking}
substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution process to extract the original message.
Alphabetical Substitution-
Cipher : ysau{ekbhm0_ol_sgxt!}
KEY : AZERTYUIOPQSDFGHJKLMWXCVBN
flag{crypt0_is_love!}
Cipher : qbhbh zrmua irddh ljhmw uvh
The settings for the machine are:
Model: G-312
Reflector: UKW 11/26
Rotor 1: 2/12/6
Rotor 2: 1/17/16
Rotor 3: 3/12/1
flag{derflagistpeakyblinders}
Capture the flag cοntest ⅰs a сybersecurⅰty competition
Hide secret messages in your tweets (or any text) with steg-of-the-dump.js. Site
flag{steganoispower}
Strings is a linux tool that displays printable strings in a file. That simple tool can be very helpful when solving stego challenges. Usually the embedded data is password protected or encrypted and sometimes the password is actaully in the file itself and can be easily viewed by using strings It’s a default linux tool so you don’t need to install anything.
strings <filename>
flag{stay_h0m3_stay_saf3}
strings <filename>
flag{da_vinci_cod3}
Morse code is a method used in telecommunication to encode text characters as standardized sequences of two different signal durations, called dots and dashes, or dits and dahs. DataBorder
flag{YOUR FLAG IS OPENSESAME}
PNG embedded in PDF
flag{4023124842131283}
zsteg is a tool that can detect hidden data in png and bmp files.
install
zsteg <filename>
The source can be found on github
zsteg <filename>
flag{3v3rything_aint_cut3}
Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.
Please make sure to update as appropriate.
8bitdev0x8