Steghide (for JPEGS)
syntax for information and extraction:
steghide info <filename>
steghide extract -sf <filename>
Extract hash: steghide extract -sf [carrier_file.ext] -xf [hash_file.txt]
Once you have the hash you can use John to crack
Options:
embed - allows you to embed data into other files
-ef - lets you set file to embed
-cf - allows you to set cover file
-p - set password for cover file
example:
steghide embed -cf <cover file-any image file> -ef <file to hide in cover file>
Zsteg (for PNGs)
zsteg <filename>
options:
-E - extract data from specific payload
-v - verbose mode
-lsb - least significant bit
-msb - most significant bit
Exiftool - allows you to view and edit metadata
syntax:
exiftool <image name>
Stegveritas -supports nearly all image types
how to install:
pip3 install stegoveritas
stegoveritas_install_deps
syntax:
stegoveritas <file>
Spectograms - hiding image in audio files
tool: sonic visualiser
Usage:
Open audio file, go to "layer" and add spectogram to see hidden image
Stegsolve -fiind hidden message or text
Available on Github
Strings - displays the string variables of files
Very useful command in linux and in CTFs (hidden flags)
Decoding QR:
qrqt - a linux tool
https://zxing.org/w/decode.jspx - online tool
Binwalk
binwalk <filename> - Displays embedded data in the file
binwalk -e <filename> - Displays and extracts data from file
Additional Notes:
From a recent CTF challenge:
You can use cyberchef to render an image. Select the RENDER IMAGE option.
Challenge required: changing the magic number to the correct file format, using XXD (--plain flag) image.png > image.txt
Then change the magic number and save file, using cyber chef, first select the HEX option then the RENDER IMAGE, this gave the flag.