Investigate image metadata

  • Use command file image.png

  • Use command exiftool image.png

  • Use command xxd image.png

  • Use command strings image.png

  • Use tool binwalk to search binary images for embedded files and executable code: binwalk image.png

    • To extract the file: binwalk -e image.png

  • Use command: steghide extract -sf image.png

  • Bruteforce the password and extract contents of an image:

stegseek -sf image.png /path/to/wordlist
# Then if it extracts something do
file whatever.file # to know what is it
  • Now set the scale to dB^2 and the colour to White on Black

  • Try with the tool outguessarrow-up-right when you have an image

    • Also there is this other project (manteined) outguessarrow-up-right

    • Then, install it with: ./configure && make

    • Then, try the command: ./outguess -r /file/to/analyze /path/to/the/output

  • If you find a corrupted image (checking the file header of the image which should be \x89x50\x4Ex47), the try this command:

  • If you have two strings in different formats, try this python script:

  • Use it with: java -jar stegsolve.jar

  • You might also need to search for a web in WaybackMachinearrow-up-right

  • Open .pcap files with wireshark and analyze them

Last updated