Problem
Solution
I’m going to start by saying I disliked this challenge - it felt like more of a “gotcha” than anything.
The first thing I did was search the Internet for “stepic” as I had never heard/seen that word before, and apparently neither has DuckDuckGo because I found nothing relevant. No big deal, I’ll figure something out. It takes but a few moments to find the PNG that stands out from the list, upz.png
:
I tried some basic tools on this file: strings
, xxd
, binwalk
, and exiftool
. I found nothing. I consulted a few sites that list different image forensics tools 123, and tried the following:
zsteg
: Crashespngcheck
: Returns “OK”stegoveritas
: Crashesopenstego
: Crashesstegseek
: Crashesstegpy
: OutputsERROR! No encoded info found!
stegsolve
: Finds nothingconvert
: Crashesscalpel
Crashesforemost
: Finds nothingxortool
: Finds nothing
I wasted hours trying different things. I still didn’t know what “stepic” even meant. I eventually tried searching on Google, and came across a really old pip package named stepic
with the description “Python image steganography”. Are you fr?
Running stepic -d -i upz.png
spits out the flag.
I suppose this is the nature of forensics - scarcely glamorous, often tedious - yet, I can’t help but feel this problem was a bit cheap.