forensicsProhard
Evil Matryoshka
taipanbyte
Task: JPEG file with FFC steganography containing 72 nested archives (ZIP and AES-256 encrypted 7z). Solution: Decrypt FFC payload, automate extraction with GPU-accelerated password cracking using John the Ripper 7z-opencl format.
$ ls tags/ techniques/
steganographyzippassword_crackingjohn_the_rippernested_archivesrar7zffcfree_file_camouflagegpu_crackingopenclmatryoshka
nested_archive_extractionffc_decryption7z_hash_extractiongpu_password_cracking7z_opencl_crackingautomated_solver
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [forensics][Pro]Матрешка (Matreshka)— hackerlab
- [reverse][Pro]Matryoshka— duckerz
- [forensics][Pro]Матрешка 2 (Matryoshka 2)— hackerlab
- [forensics][Pro]ZipLock— hackerlab
- [stego][Pro]Новогоднее поздравление (New Year Greeting)— hackerlab