https://github.com/guardianproject/PixelKnot/issues/6
Very nice finds.
So yes, the filenames are reversed, and perhaps the images are as well.
Try flipping the images horizontally before trying to extract the data from them.
As for what the passwords are.. try the filename without any number appended to the end, both regular and reversed.
Let me know if that works for you… I still haven't found a way to test these out on my own computer.. MacOS.
Anyone know of a way? If so then I can help.
Actually I'm not sure if flipping the image changes the ability to extract data from it or not - that would be the first thing to test with an image we already know has data and already know the password to.
Thank you anon I will set things up in a few hours and try and see if I can get anything out of these images.
I'll report back with any important findings.
Alright I am testing now.
I can confirm that flipping a test image horizontally (or doing anything to it) breaks the stenography. But putting it back in place, or back the right way even after saving makes it work again.
So flipping the images could be the right way to go.
Another thing I found online:
mention of f5 in clinton emails
https://archive.4plebs.org/pol/thread/159001495/
"nf weder 1 noch 3"
its in the source code for huffman
https://github.com/abronte/f5-steganography/blob/master/src/net/f5/ortega/HuffmanDecode.java
This pixelknot stuff might be bigger than we know.
Alright guys I played around with it more. I learned that if you get near the actual password with f5.jar, it starts spitting out some bytes of data and extracting some stuff instead of giving nothing.
With this attached image (I flipped it horizontally) and a password of BwlDP I was able to extract some nonsense data. I think it means we are getting close, but I don't have pixelknot in order to try actually getting the real message out.
I'm not able to get a clean file out that says "pixelknot v1.0 password required" etc.
Will update.
Can someone with pixelknot give me more test images with known passwords to experiment with?
Thank you anon.
found this while broswing online
dunno if it helps