当前位置:网站首页>CTF steganography
CTF steganography
2022-06-24 01:11:00 【ruochen】
#ctf Some personal summaries of steganography
One 、 File separation
1.binwalk binwalk -e sim.jpg Separate files
2.foremost foremost file name -o Output directory name
3.dd dd if= Source file of= Destination filename bs=1 count= A few pieces skip= Number of bytes to begin separation Parameter description : if=file Output file name of=file Output file name bs=bytes At the same time, set the read-write block size to bytes, May replace ibs and obs skip-blocks Skip from the beginning of the input file blocks Start copying after blocks
4. File merge : cat gif01 gif02 gif03 > 1.gif md5sum 1.gif see 1.gif Of MD5 Check value
Two 、 Picture steganography
1.zsteg xxx.png testing lsb Steganography
2.wbstego encryption bmp
3.TwwakPNG testing crc Check value
4.bftools stay Windows Of cmd Next , Decrypt the encrypted picture file
Format : bftools.exe decode braincopter The name of the picture to decrypt -output Output file name
5.stegdetect The tool detects the encryption method Mainly used to analyze peg file
stegdetect xxx.jpg
stegdetect -s Sensitivity xxx.jpgex
6.<img src="https://img-blog.csdnimg.cn/20200828231104472.png?x-oss-process=image/watermark,type_ZmFuZ3poZW5naGVpdGk,shadow_10,text_aHR0cHM6Ly9ibG9nLmNzZG4ubmV0L3RhbnN0eV96aA==,size_16,color_FFFFFF,t_70#pic_center" alt=" Insert picture description here "> 7.<img src="https://img-blog.csdnimg.cn/20200828231122421.png?x-oss-process=image/watermark,type_ZmFuZ3poZW5naGVpdGk,shadow_10,text_aHR0cHM6Ly9ibG9nLmNzZG4ubmV0L3RhbnN0eV96aA==,size_16,color_FFFFFF,t_70#pic_center" alt=" Insert picture description here ">
3、 ... and 、 Pseudo encryption of compressed files
I won't say the principle , Just use the simplest way Use ZipCenOp.jar Directly crack the pseudo encryption
1. java -jar ZipCenOp.jar e xxx.zip encryption 2. java -jar ZipCenOp.jar r xxx.zip Decrypt 3. java -jar ZipCenOp.jar r LOL.zip
rar File pseudo encryption : The first 24 individual 16 The mantissa of the hexadecimal number is changed to 0
Four 、 Traffic Forensics
wireshark Filter command :
1. Filter IP, Ruyuan IP Or the goal x.x.x.x ip.src eq x.x.x.x or ip.dst eq x.x.x.x 2. Filter port tcp.port eq 80 or udp.port eq 80 tcp.dstport ==80 Display only tcp The target port of the protocol is 80‘ tcp.srcport ==80 Display only tcp The source port of the protocol is 80 tcp.port >=1 and tvp.port <=80 3.http Mode filtering
<img src="https://img-blog.csdnimg.cn/20200828231341468.png?x-oss-process=image/watermark,type_ZmFuZ3poZW5naGVpdGk,shadow_10,text_aHR0cHM6Ly9ibG9nLmNzZG4ubmV0L3RhbnN0eV96aA==,size_16,color_FFFFFF,t_70#pic_center" alt=" Insert picture description here "> Tracking flow
common HTTP Stream key content : 1、HTML Contains important information directly 2、 Upload or download file content , Usually contains the file name 、hash Value and other key information , Commonly used POST Request upload 3、 In a word, Trojans ,POST request , It contains eval, Content to use base64 encryption
wireshark Data Extraction file – Export object
Wireless traffic packet :
1.aircrack-ng Check cap package : aircrack-ng xxx.cap 2. use aircrack-ng Run the dictionary to crack the handshake package aircrack-ng xxx.cap -w pass.txt
边栏推荐
- 股票网上开户安全吗?需要满足什么条件?
- CVPR2022 | 可精简域适应
- Map data types in golang
- Cross domain and jsonp
- Server performance monitoring: Best Practices for server monitoring
- Law / principle / rule / rule / theorem / axiom / essence / Law
- 数据管理:业务数据清洗,落地实现方案
- CVPR2022 | 可精简域适应
- Shardingsphere-proxy-5.0.0 implementation of capacity range partition (V)
- Use recursion to form a multi-level directory tree structure, with possibly the most detailed notes of the whole network.
猜你喜欢

跨域和JSONP
![[CVPR 2022] high resolution small object detection: cascaded sparse query for accelerating high resolution smal object detection](/img/79/7dfc30565ddee0769ef5f1bc239b5d.png)
[CVPR 2022] high resolution small object detection: cascaded sparse query for accelerating high resolution smal object detection

paddle使用指南

ARM学习(7) symbol 符号表以及调试

Real time computing framework: Flink cluster construction and operation mechanism

C language: on the right shift of matrix

The concept of TP FP TN FN in machine learning

对抗训练理论分析:自适应步长快速对抗训练

13 `bs_ duixiang. Tag tag ` get a tag object

一次 MySQL 误操作导致的事故,「高可用」都顶不住了!
随机推荐
Solve the problem that Base64 compressed files are extracted with spaces after post request
Basic usage of setfacl command
[technical grass planting] take you to Tencent cloud's private cloud disk in ten minutes
Shengdun technology joined dragon lizard community to build a new open source ecosystem
一次 MySQL 误操作导致的事故,「高可用」都顶不住了!
Real time computing framework: Spark cluster setup and introduction case
【osg】OSG开发(04)—创建多个场景视图
ICML'22 | ProGCL: 重新思考图对比学习中的难样本挖掘
js输入输出语句,变量
Sockfwd a data forwarding gadget
股票网上开户安全吗?需要满足什么条件?
Installation and use of winscp and putty
[OSG] OSG development (04) - create multiple scene views
Map design
Use recursion to form a multi-level directory tree structure, with possibly the most detailed notes of the whole network.
Force buckle deletes duplicates in the sort array
【小程序】相对路径和绝对路径的表示符
Efficient integration of heterogeneous single cell transcriptome with scanorama
[planting grass by technology] 13 years' record of the prince of wool collecting on the cloud moving to Tencent cloud
Zhongshanshan: engineers after being blasted will take off | ONEFLOW u