White Hat Institute

“Defend the Web” write-up (Squashed image / Stego)

“Defend the Web” write-up (Squashed image / Stego — cracking steganography)

This challenge is very similar to the previous one. You can find more information about it by visiting the article published on “Purple Team” on the Medium platform.

Let’s dive into it right away.

Let’s dive into it right away.

In this example, we are presented with the image and a login form. Right-click on the image and download it to inspect further. Once you downloaded it, open it with a WordPad application and look for strings.

Defend the Web - Squashed image-2

Scroll down to the bottom of the page and you should find the credentials. Copy this information and use them on the login page to pass the challenge.

Defend the Web Squashed image 3

This is an extremely weak steganographic technique and can be reversed instantaneously. If in any case, you need to use a steganography method for concealment scenarios, we suggest you use a stronger method with at least double or triple encryption techniques implemented.

For more information on steganography please visit the articles below.

Data concealment using steganography

Conceal Any Data with OpenStego