Transmission #2 - Solving the video
http://hackaday.io/project/754/log/1301
Transmission #2 - Server Contents
http://hackaday.io/project/754/log/1303
Transmission #2 - Completing Decryption.
Emerica:
I had spent most of my evening watching Apollo Navigation Computer videos, preparing for possible use of DSKY.
It seemed most people were still stuck on trying to find data in the images and video expecting more, and I was starting to think that it was all just a ploy to side track.
All the video is, in my opinion, is an attempt to gain more attention for the event, and to expose the IP and the AUTH clues.
It was on the site all day/night, bringing much more attention to those who many have missed it.
More help is always good :)
I don't think you can really expect any visual stenography to make it through Youtube's encoding process, with reliability.
Audio is another story, but too complicated in my opinion to try and have the public find it 'easily enough'
Transmission #1 was pretty simple, there is little reason that this
When Ben mentioned the email about the decryption not being complete, I knew that we had to take another look at the transmission 2 image.
I opened it with a hex editor, this gave me a header with Ducky in it, some googling returned this to be an Adobe save for web file. Ok onto the metadata,
<br><span><?xml version="1.0" encoding="UTF-8"?><br></span><span><x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="XMP Core 4.4.0-Exiv2"><br></span><span><rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"><br></span><span><rdf:Description rdf:about="" </span><span>xmlns:xmp="http://ns.adobe.com/xap/1.0/" </span><span>xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" </span><span>xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" </span><span>xmp:CreatorTool="Adobe Photoshop CS6 (Windows)" </span><span>xmpMM:InstanceID="xmp.iid:CF0B160FBE6B11E38995D5ABC046E8AD" </span><span>xmpMM:DocumentID="xmp.did:CF0B1610BE6B11E38995D5ABC046E8AD"> <br></span><span><xmpMM:DerivedFrom </span><span>stRef:instanceID="xmp.iid:CF0B160DBE6B11E38995D5ABC046E8AD" </span><span>stRef:documentID="xmp.did:CF0B160EBE6B11E38995D5ABC046E8AD"/> <br></span><span></rdf:Description> <br></span><span></rdf:RDF><br></span><span></x:xmpmeta></span>
Not much here of use.....that I can gather anyway.
I remembered the other image being a png. This being a jpg, other tools might work.
Well back to google, "xmp jpg stenography"
first result:
OpenPuff - Steganography & Watermarking - EmbeddedSW.net
embeddedsw.net/OpenPuff_Steganography_Home.html
I went back to IRC at this point and the chat log basically explains the rest.
-------------------------------
Everything fit's at that moment, puff was an extra clue or confirmation.
Download Openpuff. It runs in wine, lenient linux folks. I believe lib sources are available as well.
Use the 3 keys from the keyfile as keys A, B, and C
Password check should turn green.
Add status.jpg as your carrier.
Make sure to set Openpuff to 1/2 50% Maximum for Jpeg.
Unhide!
Other images were not successful in decoding....yet?
Nice work team.
Discussions
Become a Hackaday.io Member
Create an account to leave a comment. Already have an account? Log In.
Are you sure? yes | no