AdaniKamal
  • 🇲🇾Selamat Datang
  • CVE-2024-3400 PAN-OS
    • Version Table
    • panos-check.py
  • Script4u
    • Cipher checker
      • CipherChecker.py
    • Nmap & Ciphers
      • nmap-ciphers.py
      • iplist.txt
    • Ping Bulk
      • ping.py
      • hosts.txt
    • Telnet bulk
      • telnet.py
    • purrfect-cipher-scanner
      • cipher-scanner.py
    • speech2text.py
    • SSL Scan
      • ssl-scanner.py
  • Walkthrough
    • CTF - Walkthrough
    • TryHackMe
      • Authentication Bypass
      • HOLO
      • John The Ripper
      • RES
      • ToolsRUs
      • Anonforce
      • RootMe
      • stealthcopter ctf primer1
      • c4ptur3-th3-fl4g
      • Wonderland
      • Bolt
      • CC-Pen Testing
      • CC-Stego
      • CTF collection Vol.1
      • Crack The Hash
      • Easy steganography
      • Web Fundamentals
      • Hydra
      • Lian_Yu
      • NerdHerd
      • OhSINT
      • STEGOsaurus
      • Custom Wordlist
        • Custom Wordlists
        • Custom Wordlists
      • Advent of Cyber 2020
        • Day3 - Evil Elf
        • Day 5 - Ho-Ho-Hosint
        • Day 6 - Data Elf-iltration
        • Day 12 - Elfcryption
        • Day 14 - Unknown storage
    • 3108 CTF 2024 : Kembara Tuah
  • CTF Tool
    • File Header
Powered by GitBook
On this page
  • 1. What's the file name of the second file? With file extension.
  • 2. What's the second flag?
  1. Walkthrough
  2. TryHackMe

STEGOsaurus

image

1. What's the file name of the second file? With file extension.

We use steghide

steghide extract -sf Dogehomemadememe.jpg
image

Answer: 729785.jpg

2. What's the second flag?

image

I try same method as before. But 3rr0r.

image

Maybe another tools?

I try Stegsolve.

GOTCHA!!

image

Answer: SAVE THE PLANET

By AdaniKamal

PreviousOhSINTNextCustom Wordlist

Last updated 10 months ago