[ / / / / / / / / / / / / / ] [ dir / abdl / bowsu / brit / femdom / hentai / htg / rule34 / sapphic ]

/qresearch/ - Q Research

Research and discussion about Q's crumbs
Name
Email
Subject
Comment *
File
Password (Randomized for file and post deletion; you may also set your own.)
Archive
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Embed
(replaces files and can be used instead)
Voice recorder Show voice recorder

(the Stop button will be clickable 5 seconds after you press Record)
Options

Allowed file types:jpg, jpeg, gif, png, webm, mp4, pdf
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 5 per post.


Welcome Page | Index | Archive | Voat Subverse | Poal Sub | Q Posts | Notables | Q Proofs
Q's Board: /projectdcomms/ | Bakers Board: /Comms/ | Legacy Boards: /CBTS/ /TheStorm/ /GreatAwakening/ | Politics News & Debate: /pnd/

File: 7dbcc2574479c36⋯.png (351.8 KB, 830x711, 830:711, ClipboardImage.png)

File: 3b430c8883c878e⋯.png (965.65 KB, 1042x812, 521:406, ClipboardImage.png)

File: da26e2e0a744a32⋯.png (18.13 KB, 362x204, 181:102, ClipboardImage.png)

File: 440e0298aca90dc⋯.png (16.88 KB, 366x209, 366:209, ClipboardImage.png)

ba8ecc  No.9109149

while most of these cucks are busy chasing after "children in tunnels" and other no-sauce-plain-chicken-nuggets-without-the fucking breading information…. there is actual stuff still to be found.

if you have even a *little bit* of resourcefulness, you should be able to get most of these things up and running. literally follow the directions and you're a 13370 h4cK3r 0f th3 w0r1d now.

back in july 2018 when a bunch of people jumped into the stego stuff, the question was:

A.) is it better to try a list of "every password" on 1 image?

B.) try the same password with every image?

then the squabbling of "how do we know if the image even contains anything? shouldn't we find a good candidate image and then we can better assess?"

(then everyone gave up i guess)

however… you can easily identify F5 (PixelKnot "basis") with stegdetect.

stegdetect -tF image.jpg

(when I say "easily identify"–i mean the task is trivial to accomplish, not that the software is so incredibly robust that it digitally-scoffs at the notion of looking for f5 algo)

grab some flavor of linux, install stegdetect if it's not yet (assuming ubuntu/kali/apt package manager)

sudo apt-get update

sudo apt-get install stegdetect

or build from source:

sudo apt-get update

sudo apt-get git

git clone https://github.com/abeluck/stegdetect.git

cd stegdetect

linux32 ./configure

linux32 make

load a bunch of JPEG images into a folder and run:

stegdetect -tF folder/with/images/*.jpg

it'll spit you out a list of anything looking f5'y.

You can even train stegdetect on new steganography methods as long as you have a set of clean & set of known-steg images. There are many other (free) programs on github that offer machine learning algos for steganography (because stegdetect is like 20 years old).

The one used in the screenshots is called Aletheia.

https://github.com/daniellerch/aletheia

so then how do you go about cracking them once you have images with embeddings?

if you're "experienced", the load up this:

https://github.com/banona/PixelUnknot

a nice anon put that together a couple years ago.

F5 CUDA cracker and non-GPU version as well (plus some other tools, but the cracker is the focus)

a lot of really good research was done, and apparently, PixelKnot really only uses the last 1/3 of the password when encrypting a message. the idea is that would make it far easier to crack….. but then everyone sort of disappeared.

so, for a far easier way to install an F5 cracker was to simply use F5.jar and run a password list with it. not the fastest and most graceful way to do things, but this may lend itself better to trying a handful of passwords on EVERY image.

(make sure java is installed)

java -jar f5.jar x -p password -o output.txt steg-image.jpg

x = extract

p = password to try (we can iterate thru entries from a password list here with some Bash or scripting up a cracking wrapper in Python to plug in passwords & image files to try)

o = output file (if something's found this is what it'll be saved as)

#HappyHunting

____________________________
Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ba8ecc  No.9109208

File: cf939cb152ff15b⋯.png (568.91 KB, 1920x472, 240:59, ClipboardImage.png)

File: 8631e7913c6c985⋯.png (31.39 KB, 617x105, 617:105, ClipboardImage.png)

stegdetect with high sensitivity shows appended data in basically every file.

oddly enough, it *seems* like it's supposed to be another copy of the image embedded into itself.

it's not even that it's the thumbnail–it's just like extra copies.

evening grep'ing for the JPG header bytes FFD8 find it in there multiple times.

there are many other Q pics that do this (especially the flags–you can find multiple instances of IEND in a few of the flag pics)

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ba8ecc  No.9109271

File: 5b2e21dd85911ab⋯.png (26.97 KB, 827x75, 827:75, ClipboardImage.png)

File: bf249a7129d41db⋯.png (406.13 KB, 640x478, 320:239, ClipboardImage.png)

File: 463b440ea7c27e1⋯.png (14.58 KB, 501x140, 501:140, ClipboardImage.png)

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ba8ecc  No.9109577

File: 785afb429f79191⋯.png (18.59 KB, 759x500, 759:500, ClipboardImage.png)

File: fd25bfcfeab4ea5⋯.png (553.34 KB, 881x642, 881:642, ClipboardImage.png)

File: 0cf53c03e18162c⋯.png (44.51 KB, 764x117, 764:117, ClipboardImage.png)

File: 6026263d7786413⋯.png (24.27 KB, 935x45, 187:9, ClipboardImage.png)

2.1mb for a 759x500 pixel PNG?

it should be HALF that size.

numerous sources say "yes, there is something embedded in there"

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ba8ecc  No.9116243

sigh…

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

ae8b98  No.9187915

File: 770f3dc1c2f4d3e⋯.jpg (167.91 KB, 1024x1024, 1:1, 770f3dc1c2f4d3e24c89d13205….jpg)

Looks like theres something in here Pixel Knot present according to Qagg.news It seems to open a message with password left blank but Im not seeing anything (first time Ive used PKnot)

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.



[Return][Go to top][Catalog][Nerve Center][Post a Reply]
[]
[ / / / / / / / / / / / / / ] [ dir / abdl / bowsu / brit / femdom / hentai / htg / rule34 / sapphic ]