0x00 Preface
today in the experiment, see a picture of the hidden topic, using the stegslove and winHex Analysis of a discovery and there is no effective information. Read the comment area big guy's hint said to use the F5 hidden Writing tool, so Baidu Tutorial used a bit, found that really solved the problem.
Problem Solving Links: http://www.shiyanbar.com/ctf/1938
0x01 F5 Download Installation
F5 implicitly writes the full name f5-steganography, enter the following codeon the kail system command side:
git clone https://github.com/matthewgao/F5-steganography
The above information indicates that the download is complete. After downloading is a folder, such as:
The use of the 0x02 F5 hidden writing tool
I use the image of the experiment to write the picture as an example . F5 Tools.
on the kail command side input:wget http://ctf5.shiyanbar.com/stega/123456.jpg get the picture.
found in folder, downloaded F5 Toolkit, double-click Open, and then right click in the blank to open with terminal.
Enter Java extract/root/123456.jpg-p 123456 in the command window
The resolution is now complete. you can find the FLG directly in the output file in the F5 Toolkit.
F5 steganography Tool Use