stegomedium

Foreign Body

hackerlab

Task: a clean-looking JPEG with 'YOU HAVE BEEN HACKED!' hides a steghide payload without obvious metadata or appended data. Solution: use stegseek to identify steghide, extract the payload with the empty passphrase, repair a one-byte ZIP header corruption, and read the embedded Python file containing the flag.

$ ls tags/ techniques/
steghide_seed_discoveryempty_passphrase_extractionzip_header_repairpayload_carving_validation

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]