file
command first. exiftool [filename]
command. binwalk [filename]
on the file. They may hide another file in the file.binwalk -e
. binwalk -D 'png image:png' [filename]
. binwalk --dd='.*' [filename]
.foremost -v [filename]
command. Foremost support all files.strings
command to that file.grep -i [any strings you want to filter]
from the strings
command output.grep -i "flag{"
to filtering the flag format only. -i
option to unable case sensitive.md5hash
. If you found same image but have a different md5 hash, it may probably have been altered.imagemagick
command tool to do image manipulation.steghide --extract -sf <filename>
. Try find the password with your own-self. Maybe, the organizer will give hints or the password may in another file.pngcheck <filename.png>
command.issuing zsteg -a <filename.png>
.stegcracker <filename> <wordlist>
tools Steganography brute-force password utility to uncover hidden data inside files.tesseract
to scan text in image and convert it to .txt file.zsteg
.zipdetails -v
command to display details about the internal structure of a Zip file.zipinfo
command to know details info about Zip file.zip -FF input.zip --out output.zip
attempt to repair a corrupted zip file.fcrackzip -D -u -p rockyou.txt filename.zip
7z2hashcat32-1.3.exe filename.7z
. Then john --wordlist=/usr/share/wordlists/rockyou.txt hash
binwalk
first. They may embedded something in the file.