Return to Unfiction unforum
 a.r.g.b.b 
FAQ FAQ   Search Search 
 
Welcome!
New users, PLEASE read these forum guidelines. New posters, SEARCH before posting and read these rules before posting your killer new campaign. New players may also wish to peruse the ARG Player Tutorial.

All users must abide by the Terms of Service.
Website Restoration Project
This archiving project is a collaboration between Unfiction and Sean Stacey (SpaceBass), Brian Enigma (BrianEnigma), and Laura E. Hall (lehall) with
the Center for Immersive Arts.
Announcements
This is a static snapshot of the
Unfiction forums, as of
July 23, 2017.
This site is intended as an archive to chronicle the history of Alternate Reality Games.
 
The time now is Sun Nov 17, 2024 7:08 am
All times are UTC - 4 (DST in action)
View posts in this forum since last visit
View unanswered posts in this forum
Calendar
 Forum index » Archive » Archive: The Haunted Apiary (Let Op!) » The Haunted Apiary (Let Op!): Puzzles
[PUZZLE? ILB.com:] Stegged pictures?
View previous topicView next topic
Page 7 of 11 [160 Posts]   Goto page: Previous 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11  Next
Author Message
LilSerf
Veteran

Joined: 25 Jul 2004
Posts: 84

Re: outguess

subatomicsatan wrote:
i have been playing around with outguess on bee2_margaretphoto.jpg and need some advice from those more familiar with the tool than i am.


The stegged data (if it is there) wasn't put in by the outguess package, it was put in using JPHIDE, a different stego program that uses a different algorithm than outguess. JPSEEK is the corresponding retrieval tool for stuff that's been JPHIDden. The confusion arises because the author of outguess is the same guy that wrote stegbreak.

I know I attempted a JPSEEK using "survive evade reveal escape" but I don't know if I tried it without the spaces... it's worth taking a look at, probably.
_________________
"This is the movies, circa 1903. Some of what we are all involved in now is going to be the Future; and some is going to be that thing where they held up big cards while the organ player noodled around." --Sean Stewart

PostPosted: Thu Jul 29, 2004 11:53 am
 View user's profile
 Back to top 
mmdoogie
Veteran


Joined: 28 Jul 2004
Posts: 91
Location: Huntsville, AL

Roc: glad I could help.

Well...
I've tried somewhere near 2 billion distinct keys with length 20 or less,
and nothing yet... thats not even a dent in the 4.42*10^39 total
possible keys...

I'm going to let it keep running, but I think we are going
to need distinct information if we were meant to decrypt this file.
It could just be a false positive too...

--mrm

PostPosted: Thu Jul 29, 2004 12:03 pm
 View user's profile AIM Address
 Back to top 
Paul_G
Boot

Joined: 28 Jul 2004
Posts: 23
Location: Jacksonville FL

Just to keep this discussion from going completely trout:

1. All of the suggestions for passwords that have been suggested here so far have already been tried in many different variations. There is no need to try these passwords again.

2. stegbreak is the fastest way to try to crack JPHIDE files. In essence, it takes all of the words in the dictionary file that you feed it and tries them all as the password. Using JPSEEK to type in passwords by hand is several orders of magnitude slower. In the time it takes to open the file in JPSEEK, you can run tens of thousands of attacks with stegbreak. I have run over 2 million since I started typing this post.

Now some new notes after creating my own steg and doing some experimenting with JPHIDE and stegdetect/stegbreak:

1. The closer the hidden file's size is to the size of the "cover" file, the easier it is for stegdetect to pick up (i.e., bigger hidden files are easier to detect). Default sensitivity seems to pick up "medium" sized files very well. A three-star rating at default sensitivity indicates an extremely strong likelihood that there genuinely is a file buried in the image.

2. As an experiment, I tried JPHIDEing a file with a passcode that had a space in it ("gum bo"), then running a dictionary attack using some of the word lists I tried yesterday. The attack failed. This demonstrates how easy it is to make a password very strong against dictionary attacks, which is one more reason why we should probably cool our heels for now and wait for more info.

I am becoming more convinced that there is something hidden in the picture, but I am also becoming more convinced that we're going to need more information before we can crack it.
_________________
I'm not a real codebreaker, but I play one on TV.

PostPosted: Thu Jul 29, 2004 12:18 pm
 View user's profile
 Back to top 
Roc
Veteran

Joined: 27 Jul 2004
Posts: 81

I've been wondering about stegbreak, so I hid a trivial text file (1k) in a different image. (first 8kb bee img GIS gave me) I then hid a trivial text file in bee2_margaretphoto.jpg

stegdetect gave me a negative result on the result from jphide-ing in the new img, and gave a 'false positive likely' on the result from jphide'ing in bee2_margaretphoto.jpg

I put the passphrase I used: survive evade reveal escape in my dictionary file and removed all the rules except ':' (try the entries 'as is')
stegbreak gave me no hits from either image, yet jpseek directly had no problem spitting out the embedded text when given the right passphrase.

Furthermore, stegbreak said it tried 978 keys, yet my dictionary has 502 lines, and a total of 1107 'words'.

So what's goin on with this tool?

EDIT: clarrification: My intention was for stegbreak to try each line in the dictionary file as a discrete passphrase. Clearly it's not doing that, could anyone tell me how I can make it behave the way I'd like?

PostPosted: Thu Jul 29, 2004 12:23 pm
 View user's profile
 Back to top 
linuxfan
Boot

Joined: 25 Jul 2004
Posts: 15
Location: Denver, CO

Paul_G wrote:
For those curious, after many many runs with SNOW, I can find NO traces of any SNOW stego.


Thanks for trying (since I think Im the one who requested it Wink ) and for the qucik tutorials!
_________________
I can only watch from the shadows, piecing together what I may.

PostPosted: Thu Jul 29, 2004 1:31 pm
 View user's profile MSN Messenger
 Back to top 
Paul_G
Boot

Joined: 28 Jul 2004
Posts: 23
Location: Jacksonville FL

Rules.ini syntax guide
_________________
I'm not a real codebreaker, but I play one on TV.

PostPosted: Thu Jul 29, 2004 1:34 pm
 View user's profile
 Back to top 
Roc
Veteran

Joined: 27 Jul 2004
Posts: 81

Right, so I've removed every phrase from my dictionary, save the known good passphrase for a test jpg that I downloaded and jphid a text file in.

jpseek has no problem extracting this text file from the jpg when given the passphrase.

stegdetect reports
Code:
test.jpg : skipped (false positive likely)

stegbreak with a norules.ini* and dict.txt* runs and reports:
Code:

Loaded 1 files...
test.jpg : negative
Processed 1 files, found 0 embeddings.
Time: 0 seconds: Cracks: 1,      Inf c/s

It properly checked the one crack, but it improperly reported a negative.
so what's up?
Can anyone else use stegbreak to properly open a steg'd file?

*NoRules.ini contains only the following:
Code:
# Wordlist mode rules
[List.Rules:Wordlist]
# Try words as they are
:

*dict.txt contains only the following:
Code:

survive evade reveal escape

the known-good passphrase I jphid with, and can use to jpseek manually.

PostPosted: Thu Jul 29, 2004 1:59 pm
 View user's profile
 Back to top 
Paul_G
Boot

Joined: 28 Jul 2004
Posts: 23
Location: Jacksonville FL

looks like stegbreak truncates lines in the dictionary file to 16 characters, or else can't break passwords that are longer than 16 characters.

breaking a file that had been stegoed with password "surviveevadereve": successful

breaking a file that had been stegoed with password "surviveevaderevea": failed
_________________
I'm not a real codebreaker, but I play one on TV.

PostPosted: Thu Jul 29, 2004 3:01 pm
 View user's profile
 Back to top 
accidentalsuccess
Boot

Joined: 27 Jul 2004
Posts: 31

maybe the hidden file is spyder? hrmmmmm. ... . .

very interesting stuff

PostPosted: Thu Jul 29, 2004 3:30 pm
 View user's profile
 Back to top 
Roc
Veteran

Joined: 27 Jul 2004
Posts: 81

Quote:
looks like stegbreak truncates lines in the dictionary file to 16 characters, or else can't break passwords that are longer than 16 characters


well hell... that's no good...

PostPosted: Thu Jul 29, 2004 4:01 pm
 View user's profile
 Back to top 
halofan
Greenhorn

Joined: 28 Jul 2004
Posts: 8
Location: ilovebees.com

maybe the differences in those recipees hold a clue as to the password?

PostPosted: Thu Jul 29, 2004 4:01 pm
 View user's profile
 Back to top 
quackquack
Greenhorn

Joined: 27 Jul 2004
Posts: 6

That's a good idea... i noticed one of the links on the pages reading "hide and seek" led to recipe2.html. Is there a thread anywhere discussing the differences outlined in the wiki? I can't seem to find one.

PostPosted: Thu Jul 29, 2004 4:03 pm
 View user's profile
 Back to top 
AnthraX101
Entrenched

Joined: 18 Mar 2003
Posts: 797

Paul_G wrote:
looks like stegbreak truncates lines in the dictionary file to 16 characters, or else can't break passwords that are longer than 16 characters.

breaking a file that had been stegoed with password "surviveevadereve": successful

breaking a file that had been stegoed with password "surviveevaderevea": failed


You are correct. From stegbreak.c:

Code:
   length = 16;
   [...]
   rules_init(length);


rules.c

Code:
void rules_init(int max_length)
{
   if (rules_max_length) return;

   rules_init_classes();
   rules_init_convs();
   rules_init_length(max_length);

   rules_debug = 0;
   rules_errno = RULES_ERROR_NONE;
}

void rules_init_length(int max_length)
{
   int c;

   memset(rules_length, INVALID_LENGTH, sizeof(rules_length));

   for (c = '0'; c <= '9'; c++) rules_length[c] = c - '0';
   for (c = 'a'; c <= 'z'; c++) rules_length[c] = c - ('a' - 10);
   for (c = 'A'; c <= 'Z'; c++) rules_length[c] = c - ('A' - 10);
   rules_length['*'] = rules_max_length = max_length;
   rules_length['-'] = max_length - 1;
   rules_length['+'] = max_length + 1;
}


You -should- be able to set length to more then 20, but I don't have time to look through the code to be sure no memory is set statically to expect 16 character passwords.

AnthraX101
_________________
VGhlcmUgaXMgbm8gc3Bvb24u
ll----ll--ll--ll----l---ll---llll---ll--l--ll---llll-ll-l-ll-llll--l-.


PostPosted: Thu Jul 29, 2004 4:20 pm
 View user's profile
 Back to top 
Roc
Veteran

Joined: 27 Jul 2004
Posts: 81

Well, the 16 character thing led me to solve 2 frustrations at once.

First, being unable to break my known stegged image.
Second, being unable to get the syntax commands to address characters past the 9th position.
E.g. the rule syntax 'N truncates the given phrase after the Nth character. using '10 throws an error.

Turns out the rules index pass phrase positions in Hex.
If you want to strip all your alphanumeric dictionary terms that are longer than 16 characters, down to 16 characters, you'd have to add the rule:
Code:
<*>F!?X'F

rather than what you'd expect
Code:
<*>15!?X'15


When I use a 16 character passphrase to encrypt my simple text file, stegbreak has no problem with it.
Whether I use 'survive evade re' directly, or 'survive evade reveal escape' and add the truncation rule.

If this passphrase is > 16 characters, I think we're screwed. Unless someone recompiles stegbreak with a fix, but then the syntax rules are out, and we're seriously hampered. And I'm not about to dink around with stegbreak's source (assuming it's in the tarball) unless we 'know' there's something in there.

PostPosted: Thu Jul 29, 2004 4:26 pm
 View user's profile
 Back to top 
Paul_G
Boot

Joined: 28 Jul 2004
Posts: 23
Location: Jacksonville FL

Well, if nothing else, I've taught myself a ridiculous amount info about steganography, JPHIDE/JPSEEK, SNOW, and stegdetect/stegbreak over the past two days Wink

This has also taught me exactly how much difference a "strong" password can make when protecting your data.

I say we concentrate on trying to find passcodes buried elsewhere in the site, since dictionary attacks get very intractable once you have passed a certain number of possible characters. I think that any more effort in that direction will just be a waste.
_________________
I'm not a real codebreaker, but I play one on TV.

PostPosted: Thu Jul 29, 2004 5:33 pm
 View user's profile
 Back to top 
Display posts from previous:   Sort by:   
Page 7 of 11 [160 Posts]   Goto page: Previous 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11  Next
View previous topicView next topic
 Forum index » Archive » Archive: The Haunted Apiary (Let Op!) » The Haunted Apiary (Let Op!): Puzzles
Jump to:  

You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum
You cannot post calendar events in this forum



Powered by phpBB © 2001, 2005 phpBB Group