This challenge is very similar to the previous one. You can find more information about it by visiting the article published on “Purple Team” on the Medium platform.
Let’s dive into it right away.
In this example, we are presented with the image and a login form. Right-click on the image and download it to inspect further. Once you downloaded it, open it with a WordPad application and look for strings.
Scroll down to the bottom of the page and you should find the credentials. Copy this information and use them on the login page to pass the challenge.
This is an extremely weak steganographic technique and can be reversed instantaneously. If in any case, you need to use a steganography method for concealment scenarios, we suggest you use a stronger method with at least double or triple encryption techniques implemented.
For more information on steganography please visit the articles below.
Data concealment using steganography