Anonymous ID: 339ec2 July 26, 2018, 2:26 p.m. No.2301151   🗄️.is 🔗kun

Ok just found this thread today… Can someone explain to me whats going on here? I get the data in image part but what are you using to try to extract data/pw cracking… Something about an app? I have a beast of a pc 16cores. maybe i can brute force it? Give details im on board love this kinda stuff. Thanks

Anonymous ID: 339ec2 July 26, 2018, 5:48 p.m. No.2303556   🗄️.is 🔗kun

trying to set a wordlist attack on the file right now but im not sure if the pass would be in any of the dict. files i have…. may have to rewrite the code to do brute force instead but its gonna take time… anyone use stegdetect yet? does it actually contain data or what?

Anonymous ID: 339ec2 July 26, 2018, 7:17 p.m. No.2304669   🗄️.is 🔗kun

i tried to use pixelknot to encode my data and pass, then use steghide to access the data i created on the file from my PC and it doesn't work were chasing our tails

Anonymous ID: 339ec2 July 26, 2018, 7:25 p.m. No.2304757   🗄️.is 🔗kun

used the f5stegos page yall using and i downloaded the data file but the encoding isnt utf-8 and came up with gibberish

Anonymous ID: 339ec2 July 26, 2018, 7:41 p.m. No.2304970   🗄️.is 🔗kun

I pulled the file into hexedit and checked the hex for the code used to end a jpg image.. FF D9. All jpgs end the file like that.. If there was anything else in there it would appear twice once for the orig. And once for the embed… Only one, that file is bogus guys… No text or extra images… No PK in there so no zip file either…. Even looked for binary once again a dead end.