Training/Intermediate/Forensics & Steganography
Intermediate Track2 hours

Forensics & Steganography

2 guided sections and curated resources to get you contest-ready.

Lesson Playbook

2 sections
1

Workflow

A reliable workflow:

  1. identify file type
  2. extract metadata
  3. search strings
  4. extract embedded files
  5. decode/decrypt
2

Fast Tools

Start with read-only checks.

file suspicious.bin
exiftool image.jpg
strings -n 8 suspicious.bin | head
xxd -g 1 -l 64 suspicious.bin

Further Resources

3 links
← Back to Intermediate pathAdvanced Cryptanalysis