WeChall Training: Stegano I

here's how to solve Training: Stegano I

Back to the WeChall Guides

Training: Stegano I

Name: Training: Stegano I
Tags: Training, Stegano
Score: 1
Description: This is the most basic image stegano I can think of.

[stegano1.bmp]

Theory

To get the solution, as the description says, we have to get something from this image, and judging by how it says that it's the most basic steganography thing, then it must be something related to getting information from the image whether it's in a comment or just plain text inside of it, so for that we can use some tools like exif and zsteg, they recover information hidden in an image, exif is more about metadata and zsteg is just about everything else.

Solution

So, first we need to download the image:

shukularuni-picoctf@webshell:~$ wget https://www.wechall.net/en/challenge/training/stegano1/stegano1.bmp
--2025-06-19 19:02:44--  https://www.wechall.net/en/challenge/training/stegano1/stegano1.bmp
Resolving www.wechall.net (www.wechall.net)... 5.44.104.158, 2a02:2b80:101:104::92
Connecting to www.wechall.net (www.wechall.net)|5.44.104.158|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 102 [image/x-ms-bmp]
Saving to: 'stegano1.bmp'

stegano1.bmp                                                        100%[=================================================================================================================================================================>]     102  --.-KB/s    in 0s      

2025-06-19 19:02:44 (8.09 MB/s) - 'stegano1.bmp' saved [102/102]

Now let's use exif with the image we just got and see if there's anything here of help:

shukularuni-picoctf@webshell:~$ exiftool stegano1.bmp 
ExifTool Version Number         : 12.40
File Name                       : stegano1.bmp
Directory                       : .
File Size                       : 102 bytes
File Modification Date/Time     : 2015:05:05 19:19:08+00:00
File Access Date/Time           : 2025:06:19 19:02:44+00:00
File Inode Change Date/Time     : 2025:06:19 19:02:44+00:00
File Permissions                : -rw-rw-r--
File Type                       : BMP
File Type Extension             : bmp
MIME Type                       : image/bmp
BMP Version                     : Windows V3
Image Width                     : 4
Image Height                    : 4
Planes                          : 1
Bit Depth                       : 24
Compression                     : None
Image Length                    : 48
Pixels Per Meter X              : 0
Pixels Per Meter Y              : 0
Num Colors                      : Use BitDepth
Num Important Colors            : All
Image Size                      : 4x4
Megapixels                      : 0.000016

And there's nothing that could help us there, let's use zsteg instead, and see if there's anything else here:

shukularuni-picoctf@webshell:~$ zsteg stegano1.bmp 
imagedata           .. text: "Look what the hex-edit revealed: passwd:steganoI"
b3,r,lsb,xY         .. file: MySQL table definition file Version 74
b3,b,lsb,xY         .. file: PGP symmetric key encrypted data -
b4,rgb,msb,xY       .. file: MPEG ADTS, layer III,  v2.5, 144 kbps, 11.025 kHz, 2x Monaural

There we go! That's the solution.

I voted this level as:

Diff: 01
Ed  : 02
Fun : 10

https://wechall.net/en/challenge/training/stegano1/index.php