ghost👻sonofabot-sec:~#

I scan, I map, I exploit .... Ghost is in your shell!!!

View on GitHub

Digital Forensic - Encore

The only digital forensic in the CTF Screenshot_20220516_045840

It was quite Intersting

Pls note stegsnow may not extract the flag for you considering it works on differently on different OS

I did not have this issue considering Parrot is OP 😎

Solution

First I used binwalk to extract the protected.jpg incase anything was embed in it

Binwalk is a tool for searching a given binary image for embedded files and executable code. Specifically, it is designed for identifying files and code embedded inside of firmware images. Screenshot_20220516_043826

Now Go To The Extracted Folder

Screenshot_20220516_044325

Viewing the =.txt file gave us a hint and password

We just stegsnow it 🥶 Stegsnow is a program for concealing messages in text files by appending tabs and spaces on the end of lines, and for extracting messages from files containing hidden messages. Tabs and spaces are invisible to most text viewers, hence the steganographic nature of this encoding scheme.

And That’s A Wrap !!!



Back Home