>>7911621 pb
my memory is a little fucked up anon
i havent been the same since my liver and kidneys failed
i probably need some ECC chips in my brain.
you'll find it or you'll find the info i misremembered
excellent dig!
>>7911621 pb
my memory is a little fucked up anon
i havent been the same since my liver and kidneys failed
i probably need some ECC chips in my brain.
you'll find it or you'll find the info i misremembered
excellent dig!
probably cured with the patent for the cure filed with the disease
777
fuck i primed and tried with timing!
also you can just echo 'message' >nameofpicture.jpeg
running cat nameofpicture.jpeg and your message is at the end
this is steganography 101
md5 isnt exactly collision or tamper proof though
nixon time capsules and x steganography throughout the presidency
its a massive rabbit hole lads
my brain needs rest.
check in on you lads later
oh shit i thought i saw some old mac books in some pictures
outguess -r a1f228b5cf0af97cb4782fb6e7eb547ac538977989cad88526f07c46d0b0ca69.jpg out
Reading a1f228b5cf0af97cb4782fb6e7eb547ac538977989cad88526f07c46d0b0ca69.jpgโฆ.
Extracting usable bits: 602700 bits
Steg retrieve: seed: 8033, len: 59257
Floating point exception (core dumped)
i get a file thats a bunch of hex data, perhaps someone should flip or lil endian it
ive been down this rabbit hole before
cant post it unknown file
file doesnt work for exif data
binwalk gives nothing
make an outguess bread and ill peep it later if you wanna work on this
Think MX domain names
note to self try stringers with outguess offset