 This challenge from Ryan Nicholson CTF is called Stenography. I'm assuming this is supposed to be Stegonography, whatever. That's okay. We'll let it pass. It says find the hidden flag in this attached image file. So we can go ahead and download this. I will double you get it into our location in the command line. Did not copy, fail. I was probably just hitting the end button, whatever. So we can EOG this hacker file and view it if we particularly wanted to. It is just some dude staring at a computer screen. So maybe there's some interesting stuff hidden in different colors in this. So we can use some of our own regular Stegonography techniques to take a look at this file. ZSteg, we can pass to it. However, it is a JPEG file, which ZSteg does not have support for. So what I like to do is actually run StegSolve on it, which is a JAR file you can find online if you particularly want to use this tool. It's pretty awesome and a really good go to like low hanging fruit technique for actually viewing anything that may be Stegonography. You can go through it and actually look at different planes or however specific bit in a specific color like the green pane or blue plane, the zero bit like whatever. Maybe if you get at least significant bit or actually view it as an X or inverted colors and any alpha characters etc. So that's a good tool for some challenges. However, it's not doing it for us in this one. So what I actually tried at some point was just running strings on this file. And I noted at the very, very bottom there is a base 64 line. You can tell us base 64 because of the random capitalizations and numbers. Also the two equal signs give it away in egregious manner because equal signs at the very end tell us it's base 64 for padding. We can pass this to base 64 attack D and we simply get the flag just like that. There are a couple extra spaces in this. So I will rev this to actually cut out the limiter get the first one and then rev it back. And then we have our flag. So we can take this code or this command and take note of that as our get flag scripts and include our Shabang line and we have a documented solution. Great. So now we can mark that challenge as complete and we can submit that for points and move on. So good thing to know when you're doing secondography. I don't really consider this secondography because maybe this is forensics. There's a string embedded or hidden in the file. It's not in the actual color or pixels or images in the picture itself. But still cool challenge. Good to submit that and learn about it. So hey, I want to give a special shout out to my supporters, people that love me on Patreon. Thank you. I love you. I was going to start singing Barney for a second there. That was weird. Hey, $1 a month on Patreon will give you a special shout out just like this at the end of every video. $5 a month on Patreon will give you early access to everything that released on YouTube. And I'll hopefully get more incentive soon. If you did like this video, please do press that like button, maybe comment, maybe subscribe. And if you're willing to, come check us out on Discord. Hang out with us in there and support me on Patreon. That would be super cool. Links in the description. See ya.