stegoPromedium

Imposter

hackerlab

Task: PNG image with Among Us character containing hidden data. Solution: Extract URL from LSB in red channel using inverted bit positions, download second JPG image, bruteforce steghide password with stegseek to get the flag.

$ ls tags/ techniques/
lsb_url_encodinginverted_bit_extractionsteghide_bruteforcemulti_stage_steganography

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups