Digital Forensic - Encore
The only digital forensic in the CTF
It was quite Intersting
Pls note stegsnow may not extract the flag for you considering it works on differently on different OS
I did not have this issue considering Parrot is OP 😎
Solution
First I used binwalk to extract the protected.jpg incase anything was embed in it
Binwalk is a tool for searching a given binary image for embedded files and executable code. Specifically, it is designed for identifying files and code embedded inside of firmware images.
Now Go To The Extracted Folder
Viewing the =.txt file gave us a hint and password
We just stegsnow it 🥶 Stegsnow is a program for concealing messages in text files by appending tabs and spaces on the end of lines, and for extracting messages from files containing hidden messages. Tabs and spaces are invisible to most text viewers, hence the steganographic nature of this encoding scheme.
And That’s A Wrap !!!