_
___| |_ ___ _ __ ___ ___ _ __ __ _ _ __ ___
/ __| __/ _ \ '_ \ / _ \/ __| '_ \ / _` | '_ ` _ \
\__ \ || __/ | | | (_) \__ \ |_) | (_| | | | | | |
|___/\__\___|_| |_|\___/|___/ .__/ \__,_|_| |_| |_|
|_|
Simple tool for automating basic checks when doing stenography CTF challenges.
To install the various tools used you can git clone the project and run the setup.sh script.
git clone https://github.com/a9sk/stenospam
cd stenospam
sudo bash setup.sh
To create a symlink to the code and be able to run the script from any point in your file system run the symlink.sh script.
sudo bash symlink.sh
NOTE: after creating the symlink do not remove the directory or the symlink will not work.
To run the script you can then use the command stenorun from your terminal
stenorun <filename> -fF <flag format>
Usage: stenorun <filename> -fF <flag format>
Flag Format
-fF <flag format> to set the flag format (i.e. if -fF is set to 'abc' the flag format will be abc{flag_goes_here})
Miscellaneous
-h show this message and exits
The prebuilt tools used are:
- Strings for strings enumeration;
- Exiftool to read metadatas from images, audio, videos and PDFs;
- Exiv2 to read images metadata;
- Binwalk for searching a given binary image for embedded files and executable code;
- Zsteg to detect data in PNG and BMP files.
See the LICENSE file for license rights and limitations (MIT).
To report bugs, request new features, or ask questions, contact the project author:
- Email: [email protected]
- GitHub: @a9sk