Problem

Solution
I’m going to start by saying I disliked this challenge - it felt like more of a “gotcha” than anything.
The first thing I did was search the Internet for “stepic” as I had never heard/seen that word before, and apparently neither has DuckDuckGo because I found nothing relevant. No big deal, I’ll figure something out. It takes but a few moments to find the PNG that stands out from the list, upz.png:

I tried some basic tools on this file: strings, xxd, binwalk, and exiftool. I found nothing. I consulted a few sites that list different image forensics tools 123, and tried the following:
- zsteg: Crashes
- pngcheck: Returns “OK”
- stegoveritas: Crashes
- openstego: Crashes
- stegseek: Crashes
- stegpy: Outputs- ERROR! No encoded info found!
- stegsolve: Finds nothing
- convert: Crashes
- scalpelCrashes
- foremost: Finds nothing
- xortool: Finds nothing
I wasted hours trying different things. I still didn’t know what “stepic” even meant. I eventually tried searching on Google, and came across a really old pip package named stepic with the description “Python image steganography”. Are you fr?
Running stepic -d -i upz.png spits out the flag.
I suppose this is the nature of forensics - scarcely glamorous, often tedious - yet, I can’t help but feel this problem was a bit cheap.