stegomedium
Foreign Body
hackerlab
Task: a clean-looking JPEG with 'YOU HAVE BEEN HACKED!' hides a steghide payload without obvious metadata or appended data. Solution: use stegseek to identify steghide, extract the payload with the empty passphrase, repair a one-byte ZIP header corruption, and read the embedded Python file containing the flag.
$ ls tags/ techniques/
steghide_seed_discoveryempty_passphrase_extractionzip_header_repairpayload_carving_validation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]