1.f5 picture steganography first I looked at it with Binwalk.-d= Type-e decompression zip, etc.
Determined that there is no back door, according to the tip of the topic, in addition to refer to the writeup of P God, refreshing the health should be F5, that is, F5 hidden writing.
git clone https://github.com/matthewgao/F5-steganography
Download the F5 Stealth decryption algorithm from this GitHub website.
CD F5-steganographyjava Extract. /123456.jpg-p 123456
Call Extract.java decryption in the F5-steganography folder.
Locate the output file and use the Cat command to see flag. 2.OutGuess Implicit writing
Enter a outguess yourself will show its usage, see such a bar
-r retrieve message from data
So to answer this question, just run the following statement in the directory where the Angrybird.jpg is located:
Outguess-r angrybird.jpg Outfile.txt
Picture steganography (Updated ...).....)