TryHackMe - Musical Stego

Box Stats

Box Info Details
Box Name : Musical Stego
Difficulty : Easy
Play : Musical Stego
Recommended : Yes :heavy_check_mark:


Hello, this one was an easy challenge based on audio steganography. Steganography is hiding a file/message inside of another file. Let’s start!

Who remixed the song?

The answer is in front of our eyes. Kilmanjaro

$ ls -lah
total 46M
drwxr-xr-x 2 root root 4.0K Dec 28 15:12  .
drwxr-xr-x 7 root root 4.0K Dec 27 21:40  ..
-rw-r--r-- 1 root root  46M Dec 28 15:09 'Language Arts - DEF CON 27- The Official Soundtrack - 02 Luckiness (Kilmanjaro Remix).wav'

On this one, we’ll use a tool called Sonic Visualizer. Is a tool for analysing the contents of audio files. You can install it by using this command apt install sonic-visualiser.

First open the file.

Then add spectrogram.

There is a QR code, play a bit with the filters so you can scan it.

The scan gives the answer

When we visit the link we see another audio file, it sounds like beep boop that’s morse audio code. Let’s use a morse code audio decoder

We have the answer

What was the found password?

Because link is dead, hint says to use a github link just we have to replace XXXXXX.. with the LZKTB4ET from pastebin.

We have the password S3CR3T_P455

What is the final flag?

Now we just have to use steghide on the first audio file with the password we found before S3CR3T_P455

$ steghide extract -sf Language\ Arts\ -\ DEF\ CON\ 27-\ The\ Official\ Soundtrack\ -\ 02\ Luckiness\ \(Kilmanjaro\ Remix\).wav -p S3CR3T_P455
wrote extracted data to "secret".
$ cat secret

Thank You

Thank you for taking the time to read my writeup. If you don’t understand something from the writeup or want to ask me something feel free to contact me through discord(0xatom#8707) or send me a message through twitter 0xatom

Until next time keep pwning hard! :fire: