sheetfoki.blogg.se

Using ez7z
Using ez7z













using ez7z

Honorary mention: I met at BSidesChicago 2013 for the first time. You never know when you might need a helping hand. This is where I can say being nice to people and getting to know your fellow community members is important. Opening ‘image1.jpg’ in Ez7z and Hex Fiend didn’t result in any discoveries. Nothing better than a slap in the face when you think you done good. The end of the file had more clues as you can see from the image below.

using ez7z

The beginning of the ‘hackers.jpg’ file looked kosher because it contained the proper file header ‘JFIF’ on the first line which indicates it’s a JPEG file format.

using ez7z

With hex editors I look at the beginning and end of files to check for changes. Where I got the best clue of what to do next was with Hex Fiend. I ran the file through photo forensic tests, inverted the colors with GIMP, as well as a couple other tests. I kept this information in the back of my mind as possible clues for later on to use as passwords, assuming the file contained concealed writing in the form of steganography.

#Using ez7z movie#

In the challenge description there were vague references to the movie characters names, “Acid Burn”, “The Phantom Phreak”, “Cereal Killer”, and “Lord Nikon”. That being the case, unless they seeded it with false data, Wikipedia is my friend. I heard of the movie “ Hackers“, and can guess what it’s about, but I never saw it. Based on past challenges from the BSJTF, I knew I needed to do a little recon about the movie.















Using ez7z