St3g0
- Description: Download this image and find the flag.
- Difficulty: Medium
🔎 Solution
The challenge provides an image file as the main artifact for analysis.
To investigate it, I used a tool called zsteg
- a powerful utility designed for detecting hidden data in PNG and BMP files by analyzing pixel color channels and applying various steganographic techniques.
By running zsteg
on the image, I discovered the flag hidden in the b1,rgb,lsb,xy channel - a classic use of least significant bit steganography across all RGB color components.
> zsteg pico.flag.png
b1,r,lsb,xy .. text: "~__B>VG?G@"
b1,rgb,lsb,xy .. text: "picoCTF{7h3r3_15_n0_5p00n_a9a181eb}$t3g0"
b1,abgr,lsb,xy .. text: "E2A5q4E%uSA"
b2,b,lsb,xy .. text: "AAPAAQTAAA"
b2,b,msb,xy .. text: "HWUUUUUU"
b3,r,lsb,xy .. file: gfxboot compiled html help file
b4,r,lsb,xy .. file: Targa image data (16-273) 65536 x 4097 x 1 +4352 +4369 - 1-bit alpha - right "\021\020\001\001\021\021\001\001\021\021\001"
b4,g,lsb,xy .. file: 0420 Alliant virtual executable not stripped
b4,b,lsb,xy .. file: Targa image data - Map 272 x 17 x 16 +257 +272 - 1-bit alpha "\020\001\021\001\021\020\020\001\020\001\020\001"
b4,bgr,lsb,xy .. file: Targa image data - Map 273 x 272 x 16 +1 +4113 - 1-bit alpha "\020\001\001\001"
b4,rgba,msb,xy .. file: Applesoft BASIC program data, first line number 8
🚩Flag
picoCTF{7h3r3_15_n0_5p00n_a9a181eb}