Stego 100: Excaliflag
Playing with the blue bits in Steganabara's Bit Mask Filter and you'll get the flag:
Stego 300: 0liver "Imaged"
By looking at the magic bytes in the binary data, it's easy to see that there is a png image appended at the end of the jpg image. Looking at the png image, it's clear that the flag is hidden in the R and G values of the first few lines. Extract the R and G values and you'll get an ELF file that prints out the flag.
Stego 300: We also have memes!
The flag is hidden in the image using an algorithm in which p and offset are unknown. However, they are small enough to be brute-forced. The flag format is 3DS{}, so this is more like a known plain-text attack with the image as the ciphertext.
(to be continued)
Update: not continued because it's been a long time and I don't remember the continuation. Also, I'm busy (and lazy :P)
Haha, I’ve been busy
ReplyDelete