In the context of CTFs steganography usually involves finding the hints or flags that have been hidden with steganography. Most commonly a media file or a image file will be given as a task with no further instructions, and the participants have to be able to uncover the hidden message that has been encoded in the media.
Download this example.jpg file which contains some hidden information.
If you save it to your machine and open it up with an image viewer(e.g. nomacs for linux), you should be presented with a simple jpg image.
Suggested Read: The 12 Best, Must-Have Tools For Steganography
Now let’s extract the hidden data inside from this image with the example of dd command which is very versatile in nature. We know where the location of the zip file is, but dd only takes decimal values, so we convert the hexadecimal location 0x01e17ad from hex to decimal to get 1972141.
Command: dd if=example.jpg bs=1 skip=1972141 of=foo.zip
This takes in the image example.jpg, the ‘in file’ if, reads one block at a time, ‘block size’ bs, skips to block 1972141, skip, and writes it to the ‘out file’ zip we call foo.zip. When this completes you should have a zip file you can easily unzip to access the text file inside.
Here we’ve listed out the best steganography tools which you can easily use while solving up CTF challenges.
|Convert images b/w formats and apply filters
|Shows EXIF information in JPEG files
|Read and write meta information in files
|Image metadata manipulation tool
|Tool for manipulating images
|Universal steganographic tool
|For various analysis related to PNGs
|Used to deblur and fix defocused images
|Tool for stegano analysis written in Java
|Launches brute-force dictionary attacks on JPG image
|Steganography brute-force utility to uncover hidden data inside files
|Detect hidden files and text in images
|Hide data in various kind of images
|Apply various steganography techniques to images
|Python program to steganography files into images using the Least Significant Bit.
|Checks classical steganographical schemes
|A program for concealing messages in text files by appending tabs and spaces on the end of lines
|Firmware Analysis Tool
|Performs statistical tests to find if a stego tool was used (jsteg, outguess, jphide, …).
|Yet another Stego Tool
- How Paraphrase Tool Helps To Optimize Content
- Best 20 Kali Linux Tools for Hacking and Penetration Testing
- Top 25 Open Source Intelligence Tools
- Online Domain Authority (DA) Rank Checker Websites
- Top 50 Hacking and Penetration Testing Tools [Compiled List 2019]
- Top 10 Essential CTF Tools for Solving Reversing Challenges
- Windows and Linux Privilege Escalation Tools – Compiled List 2019
- Subdomain Enumeration Tools – 2019 Update
- Top 10 Most Popular Bruteforce Hacking Tools – 2019 Update
- 13 Must-Have Tools for Search Engine Optimization – 2019 Update