Rating:

#Rabbit hole - Stego

We get an image with an onion on it and first thing we try to do is running steghide command:
> steghide extract -sf rabbithole.jpg

This requires a password and the first thing I tried was onion which worked. The reason I tried this password was because there was an onion on the picture. Then I get a file called address.txt which contains:
> wsqxiyhn23zdi6ia

After trying a lot of tools and comparing picture with original picture without finding anything, I try to google "onion address" and then I find that this could be an onion address in Tor-browser. After downloading Tor, we go to
> http://wsqxiyhn23zdi6ia.onion

which gives us a page that in looks like this at top:

![encoded](https://puu.sh/Bwy2l/ecd7133746.png)

Next step took some time as well and after trying many encodings, base65536 worked. This gave us a zip file that contained an epub file. If we opened this epub file and looked through the pages, the flag was there in cleartext.

IceCTF{if_you_see_this_youve_breached_my_privacy}

Original writeup (https://github.com/liuhack/writeups/blob/master/2018/IceCTF/Rabbithole/README.md).