当前位置:网站首页>[CTF learning] steganography set in CTF -- picture steganography
[CTF learning] steganography set in CTF -- picture steganography
2022-07-25 04:32:00 【_ PowerShell】
Blogger introduction
Blogger introduction : Hello everyone , I am a _PowerShell , I'm pleased to meet you ~
The main field of study is :【 Penetration field 】【 data communication 】【 Communication security 】【web Security 】【 Interview analysis 】
Like comments collection == Develop habits ( One key, three links )
Welcome to study and discuss together ️ Progress together, there are colored eggs at the end of the text
The author's level is limited , You are welcome to point out , Learn from each other and make progress !
Catalog
1. Get pictures with hidden files
2. Retrieve other files hidden in the picture file
3. Separate other files hidden in the picture file
1.Foremost The tool separates other hidden files
2. Change the suffix to zip Then extract other hidden files
LSB Steganography introduction
3、 ... and 、 Missing file format &GIF Steganography
Put the picture in 010editor Make repairs
Put the picture in Namo_GIF_gr perhaps Stegsolve Hidden information is found
One 、 Figure type +ZIP
1. Get pictures with hidden files
The so-called image type , Is to use what you want to hide first zip Packaging compression , Then combine it with a normal picture , Achieve the purpose of hiding information .
Here I have prepared a zip.zip And 111000.png Pictures of the .zip The content inside is zip.png


And then in windows Command window input :copy/b 111000.png + zip.zip output.png

Get a picture named output.png The picture file of , It can be opened normally

2. Retrieve other files hidden in the picture file
use binwalk Tools You can easily retrieve other files hidden in image files according to the principle of retrieving matching file headers , Take this picture as an example , stay kali linux Enter commands in the binwalk And then output.png Drag into the command window and press enter to execute
Direct input :binwalk ‘ File path to view ’

3. Separate Other files hidden in the picture file
utilize Linux Under the foremost Tools Can be output.png Hidden in zip Separate the documents , stay kali linux Input from the command line foremost, And then output.png Drag into the command window and press enter to separate , The default output folder is output, In this folder, you can find the separated zip .
1.Foremost Tool separation Other hidden files
Foremost Not found , But you can install it :y

installation is complete , Direct input foremost ‘ File path to be separated ’

Automatic generation output Folder

Drag onto windows Look at the content on the desktop



Successfully separated
2. Change the suffix to zip Then decompress and separate Other hidden files
Of course , There is also a simpler and rougher way : Directly change the suffix of the picture to .zip, Then decompress it ( This method is simple and fast , But it may fail if multiple files are hidden )
First the output The suffix of the picture is changed to zip, obtain output.zip file



Then decompress , Unzip to get our compressed file zip.zip The content of ,zip.png


Successfully separated .
Two 、LSB Steganography
LSB Steganography Introduce
LSB Steganography , That's the least significant bit (Least Significant Bit) Steganography .
The number of images in the picture is generally composed of three colors , Three primary colors , These three primary colors can form other colors , For example, in PNG Picture storage , Each color will have 8bit,LSB Steganography is to modify the lowest number of images 1bit, Write encrypted information , The human eye cannot notice the changes before and after .
Example
Picture links :
https://pan.baidu.com/s/1aQaZj0UH2Xk_rGiYWf6lzg?pwd=30e2
This picture looks like only six green pig heads , But it contains a hidden QR code , We can use tools Stegsolve.jar Open this diagram
Stegsolve.jar Tools to address :
https://download.csdn.net/download/qq_51577576/86246245

Then switch to Gray bits, You can see that the QR code hidden in the channel appears in the upper left corner , Scan the QR code to get flag
csdn It seems that you can't send this QR code map , Here the picture is deleted

3、 ... and 、 Missing file format &GIF Steganography
Picture links :
https://download.csdn.net/download/qq_51577576/86246267
https://pan.baidu.com/s/1Mn7k0FYfmw-x5wuZYFbUXw?pwd=h6zh The following picture is called “ This is a gif picture .gif” The file of , Open and find an error .

Put the picture in 010editor Make repairs
Picture original unrecognized file , According to the file name “ This is a gif picture .gif” Guess it is gif picture
You can't open the picture directly

Throw the picture to 010editor in ,
010editor Tools to address :
https://download.csdn.net/download/qq_51577576/86246276stay CTF Sometimes we need to repair pictures , This is important for us to understand the file structure of pictures . find gif File format , Then compare the damaged document to repair it .

Find a normal gif Picture drag in 010editor

We will find that it is different from ordinary GIF The picture is different , The head is missing something , Comparing some documents , You will find that there is less GIF8.
We can open it normally by repairing it manually .( Insert GIF8, preservation )


Put the picture in Namo_GIF_gr perhaps Stegsolve Hidden information is found
Found a string of numbers and letters superimposed , Find a way to separate .

Turn the... Of each frame in turn 254 Adjust the bit color bit to one color , preservation . You can see the flashing letters in each frame .
Finally, it is spliced base64 decode , obtain flag.
have access to gif Gadget Namo_GIF_gr Amendment No 254bit Color position
Namo_GIF_gr Tools to address :
https://download.csdn.net/download/qq_51577576/86246260








Get steganography
Eight frames of information are combined :
PASSWORDisY2F0Y2hfdGhlX2R5bmFtaWNfZmxhZ19pc19xdW10ZV9zaW1wbGU=Obviously this is a Base64 code , Then take it to decode and get catch_the_dynamic_flag_is_qumte_simple
Use the carrier to hide information when data is hidden , We often need to analyze where the data is hidden first , That is, what he is using as a carrier , Then we can further analyze whether it is encrypted or encoded . We need to understand the format of a picture , To know what is suspicious , What are the redundant components that can hide information
边栏推荐
- Beijing University of Posts and telecommunications | RIS assisted in-house multi robot communication system joint deep reinforcement learning
- # 1. Excel的IF函数
- Market regulation
- LVGL 8.2 Span
- 5年经验的大厂测试/开发程序员,怎样突破技术瓶颈?大厂通病......
- Construction of data center (I): background of the emergence of data center
- Attack and defense world ----- ics-05
- 开源之夏专访|“00 后” PMC member 白泽平
- Spirng security (VIII) multiple filter chains coexist
- Numpy overview
猜你喜欢

Creativity: presentation of AI oil paintings with high imitation mineral pigments

Open source summer interview | "after 00" PMC member Bai Zeping

Infinite connection · infinite collaboration | the first global enterprise communication cloud conference WECC is coming

DOM event flow

Druid连接池——从0开始坚强的一点点的自学,Druid一点不懂的可以点进来,懂得别点进来,点进来你会嫌我啰嗦的

二、MySQL数据库基础

DNS domain name resolution

LVGL 8.2 Span

Eve-ng lab simulator Cisco, H3C test host alias

Analyze the exploration in high-quality steam Education
随机推荐
PHP Baidu qianqianhua installment API
Network engineering case: integrated network design of CII company
DNS domain name resolution service
Pandora IOT development board learning (RT thread) - Experiment 16 WiFi module experiment (learning notes)
Wechat applet application development (I)
Docker install MySQL 5.7
Digital collections can go further without hype
In the Internet of things market, Bosch sensor has launched a number of new solutions
Open source summer interview | "after 00" PMC member Bai Zeping
After the failure of listing in Hong Kong, tuba rabbit terminated its gem IPO, and the founder responded
一般在进行数仓迁移过程中,是如何进行数据测试的?
盐粒和冰粒分不清
MySQL -- index and transaction isolation level
Debezium series: when there are a large number of DML operations in the record source database, the debezium consumption data time lags behind the data generation time by several hours
阿亚的角度思考
Salt and ice particles cannot be distinguished
GetData table table data join MySQL method
Millet 100W fast charging, 50W wireless charging technology exposure! Oppo Shen Yiren responded: boring!
Day008 select structure (switch statement)
Preparation for Android development in big companies