HTB Stego write up for the Senseless Behaviour[MEDIUM] challenge

518 阅读2分钟

Senseless Behaviour

压缩包解压是一个wav文件

root@kali:~/桌面/HTB/Stego# file meow.wav
meow.wav: RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz

并没有发现什么有用的信息

root@kali:~/桌面/HTB/Stego# strings meow.wav | awk 'length($0)>20'
35/*o7Q5p:p7=<,2]<5(d:]
(A$"2P'M<P._@t0Q@B/=A
#"A=)J>O+J6~)o-'$O'L!h!
d+) e-z"(/&$R1V&'4u'k6
'*( :h:66\1T4,&cC9*~?
1*3S7u4(9B5#8x4A3@1H(
>s8aBB9wDf8gC>42@o28;
AP:cBG2I:[:]=[;"<%Aq9$I
#o;;%W@a"YAb V?G"B=R#
1|-.32/752/:60+{4^'p3
4l"[8Q$%:X&39>')4M%2.4#
P^V_L~S29rD`AyR1?JM40D?
.       8&)s36$Q,F)`+#6W27?
0pCD/YCS,8Bi)\BJ'qCF&
"s#~(T!p,        ^*:"   (c$D'# 
C~'C?4&_CN*?ET)oCx"7J
:u1.={. <(*!<H&;<^!,<
6k5w6y8I3]:70S9X..7g.

binwalk分离也无什么有效的信息

root@kali:~/桌面/HTB/Stego# binwalk -e meow.wav

DECIMAL       HEXADECIMAL     DESCRIPTION
--------------------------------------------------------------------------------
12897995      0xC4CECB        MySQL MISAM compressed data file Version 3
20226912      0x134A360       MySQL MISAM index file Version 3
26753717      0x1983AB5       MySQL MISAM compressed data file Version 2
36745260      0x230B02C       MySQL MISAM compressed data file Version 11

接下来用audacity软件看看

仍然没有信息

我们使用steghide

root@kali:~/桌面/HTB/Stego# steghide info meow.wav
"meow.wav":
  format: wave audio, PCM encoding
  capacity: 1.1 MB
Try to get information about embedded data ? (y/n) y
Enter passphrase: 

发现是需要密码的,采用爆破工具尝试

apt-get install stegcracker (慢)

github.com/RickdeJager… (快一点)

stegcracker file
或
stegseek file /usr/share/wordlists/rockyou.txt
root@kali:~/桌面/HTB/Stego# stegseek meow.wav /usr/share/wordlists/rockyou.txt 
StegSeek 0.6 - https://github.com/RickdeJager/StegSeek

[i] Found passphrase: "skittles"         

[i] Original filename: "youfoundme".
[i] Extracting to "meow.wav.out".

爆破出了密码,并且得到了文件youfoundme

同理对文件进行分析,发现是base64编码的,进行解码后发现是一大串数字

root@kali:~/桌面/HTB/Stego# cat meow.wav.out | base64 -d | head -10
89504e470d0a1a0a0000000d49484452000002be0000018b080600000021
d891f60000200049444154789cecddf9539b77b6effb9c5de7ee3a677777
3ab1e324763c308398e741f380f4e8d12c8410420c1642800019638c4166
329e312618134c6ce2398eedcc43cfbbf7bea7ead6adbaffd5fbfef0480f
12e0a9ed74a7cf3e3fac128304b2a0f04b4b9fef5a6f5d585a65fee255c6
130bc44fce309eb8c0d8a9b3c48ecd101b9da5a7ef24c19e517cc1017cc1
01424747880e9d227e728ef1c439e6cfac30bf708df9f955666757484c5f
6532718589a94526a616199fbcc2e8c94b8c8e5f646ce23263534b8c9f5e
2671668d854b3759597fcceaa74f58fdf409cb9f7ccef2da2356d61fb372
e349f2f2292b379eb2baf165b2be61edd36fe5da7cf07bee3ff977ee3ffd

特征很明显,数字最多到f,应该是十六进制,将它转成ASCII码看看

root@kali:~/桌面/HTB/Stego# cat meow.wav.out | base64 -d | xxd -r -p | head -10PNGIHDR�!� IDATx����Sw����]��:gww:��$v<0���A�����,�B
                                                  BcAf21&Ll9���Cϻ����������H���t��>?�����KK��Zo]XZe��U�
                                                                                                            �O0���ة�Ď����$��Q|�|�BGG��"~r���9�Ϭ0p���UfgWHL_e2q���E&������K��_dl2cSK��^&qf��K7YY���OX��       ˟|���#V��rI��)+7����e��a��o��|�{�?�w�?�+����g��-��}��������������p��?s�����m��A���淙un}��_�>�J���/���S

发现是png,直接导出保存成png吧

root@kali:~/桌面/HTB/Stego# cat meow.wav.out | base64 -d | xxd -r -p > youfoundme.png

对文件进行同理分析, 先binwalk发现并没有有效信息,并进行strings查看,也无进展

丢到steg里面,在red plane0中发现了盲文

使用盲文解码工具即可www.dcode.fr/braille-alp…