Hack this site stego solution
Challenge link here
HINT: This is an encoded message, the only tip you get is '2 null bytes'
Open the picture in a hex editor and search for two null bytes.
converting 16 to binary shows 0 as least significant bit
Binary convertor link here
converting 17 to binary shows 1 as least significant bit
Now replace 16 with 0 and 17 with 1 .As we know that every 8-bit binary digits represent one ASCII character. Therefore, one bit is missing. After some hit and trials, I found that the missing bit is the trailing 0 of the first character. Now, after decoding the binary we get the password.
Binary to ASCII convertor link here
binary | char |
---|---|
00111000 | 8 |
00110011 | 3 |
00110111 | 7 |
01101000 | h |
01100001 | a |
01110011 | s |
00110110 | 6 |
Password = 837has6
Challenge link here
Download file link here
HINT:did I hear that correctly?
Download the audio file.
Audio file consist of whitenoise.
Use Audacity and view the spectrogram of the audio wave.
you will find the password.
Password = jb298abc9qb2
Challenge link here
HINT:Look carefully: it's obvious, just not at first sight
Open the photo in Forensically website.
Forensically link here
Check the principal analysis conponent. you will find the password.
Password = n38f298hsjf
Challenge link here
HINT: I am being hexed!.
Open the picture in a hex editor and scroll down to bottom.
Convert the binary to ascii
Password = p68cq1hb
Challenge link here
HINT:
Password = hgbvZw07
Challenge link here
HINT:
Extract the strings from the picture Check the strings you will find code that looks like it is encoded in Base64
code=Tm90IGxpa2UgaXQncyBoYXJkIHRvICdkZWNyeXB0JyB0aGlzIGh1aD8gVGhlIHBhc3N3b3JkIGlzIGhnYnZadzA3Lg==
Decode this code with Base64 decoder\
Decoded=Not like it's hard to 'decrypt' this huh? The password is hgbvZw07.
Password = hgbvZw07
Challenge link here
HINT:
DOwnload and extract the zip file.
It is a .tif extension.
Open the file in photoshop.You will find three layers of the image.
turn off the first layer you will get the password.
Password = 4aH5CEta
Challenge link here
HINT:
Open the picture in hex editor.
scroll to the middle.
You will find= p��a��s��s��w��o��r��d��=��Y��r��R��o��t��7
Password = YrRot7
Challenge link here
Download file link here
HINT: kiss me alone
Peform spectrum analysis of the song. You will find long and small dashes in the soundtrack.
Spectrum analyser link here
It is morse code .Taking small dash as a dot(.), large dash as (-), small space as space and large space as (/). On decoding, we get the following Morse code.
".---- ----- --... / ..... -.... / .---- ..--- ----- / ....- ---.. / .---- .---- ----. / ..... ...-- / ----. ---.. / ----. ---.. / .---- .---- --... / .---- .---- ...-- "
Decoding the moorse code we get decimal numbers
morse code decoder link here
107 56 120 48 119 53 98 98 117 113
convert the decimal into ascii you will get password
Decimal to ascii converter link here
Password = k8x0w5bbuq
Challenge link :- here
Stego 10
Look at the picture of the words.
encode it yourself, then decode with version 2.
For every bold letter is a B
and
For every not bold letter is a A
The first one I think looks like BAABB = T.
BAABB = T
AABBB = H
AABAA = E
ABBBB = P
AAAAA = A
BAAAA ……..AND SO ON!
answer = thepasswordisnothere
So just use that and its complete: nothere
Done!
Challenge link :- here
This given bitmap has a single row of grey values, with the hint ‘I am the not of a file’. This sounds like the values are the “not” as in, inverse of a file. This python script I wrote will spit out the values of the bitmap:
#!/usr//bin/python
import Image
import sys
im = Image.open(“12.bmp”)
newnumber = 0
oldnumber = 0
counter = 0
width = range(0,123)
hight = range(0,1)
for each2 in hight:
for each1 in width:
it = im.getpixel((each1,each2))
print chr(255-it),
sys.stdout.softspace = 0
print
If you run this you get:
PK???t??8ZJ?Gpass.txt6ae4nt5TBPK????t??8ZJ?G? pass.txtPK???6/
There is something in there… is that a zip file?
$ python decode.py > file
$ file file
file: Zip archive data, at least v2.0 to extract
$ unzip file
Archive: file
extracting: pass.txt
$ cat pass.txt
6ae4nt5TB
So the password is: 6ae4nt5TB