Intermediate Track2 hours
Forensics & Steganography
2 guided sections and curated resources to get you contest-ready.
Lesson Playbook
2 sections1
Workflow
A reliable workflow:
- identify file type
- extract metadata
- search strings
- extract embedded files
- decode/decrypt
2
Fast Tools
Start with read-only checks.
file suspicious.bin
exiftool image.jpg
strings -n 8 suspicious.bin | head
xxd -g 1 -l 64 suspicious.bin