TryHackMe | CC: Steganography [write up]

0UR4N05
3 min readJan 10, 2021

Hey guys it’s your boy ouranos again , and today we will solve the challenges in the CC: Steganography room

[steghide]:

To extract the hidden message we need to use this command

┌─[ouranos@parrot]─[~/ctf/thm/ccsteg/spect]
└──╼ $steghide extract -sf jpeg1.jpeg

extract : extract data and put it in a file

-sf : select stego file

[zsteg]:

To find png1.png’s hidden message, and the payload used to encrypt it, you do not need to use any arguments with zsteg.

zsteg png1.png

[Exiftool]

To extract the document name we need to extract metadata using exiftool :

exiftool jpeg3.jpeg

[Stegoveritas]

To find jpeg2.jpeg’s hidden message we run the file as an argument into stegoveritas with no options specified.

┌─[ouranos@parrot]─[~/ctf/thm/ccsteg/spect]
└──╼ $stegoveritas jpeg2.jpeg

You can see that stegovertias found something using steghide and stored it in a bin file

[Spectrograms]

To find the hidden text in the included wav2 file we need to open the wav2.wav in sonic-visualiser

click Layer->Add Spectrogram and you should see the hideen message .

[The final exam]

deploy the machine and open the IP in the browser

— key 1 :

download the image

the first thing to do is get all metadata :

┌─[ouranos@parrot]─[~/ctf/thm/ccsteg/spect]
└──╼ $exiftool exam1.jpeg

we got a password , i think this password is for steghide

and we got the first key

— key2 :

In the second stage we got a wav file download it and open it in the sonic-visualiser and add a Spectrogram layer

the audio lead us to another png file :

i’ts a png so we gonna use the zsteg

and we got our second key

— key 3 :

in this challenge we have a damaged qr code

so we gonna use stegoveritas to change the colors of the qr code to be scannable

┌─[ouranos@parrot]─[~/ctf/thm/ccsteg]
└──╼ $stegoveritas qrcode.png

wait a while and check for the result and scan it then you will get the key

Thanks for reading , happy hacking :)

--

--