So as the challenge is more or less cracked;
The steps needed to complete the challenge are as follows ;
> Image data able to be opened with an archive manager (IZarc / WinRar etc)
- 2 files in zipped archive ; "info.txt" && "winning"
> File info.txt appears to be gibberish, however when looking at the comments in omgwtf.jpg with for instance exiftool
you will see information which out of the oridinary on Make & Model ;
Model: tr a-zA-Z n-za-mN-ZA-M
The ROT13 code simply shifts the letters up 13 places, and can easily be changed back to original text by using the 'tr' command
There are also numerous sites online that will do it for you. http://en.wikipedia.org/wiki/ROT13
With the hints given in the image file I imagine it didnt take too long to figure this out
In any case, well done, the first step is complete !
There are of course more steps to get through to complete the challenge..
Password to extract the password protected data from the .zip file: TEAMTHSROCKS
> Use the above mentioned password to extract the 'winning' file.
- Again the file looks like gibberish, but it is in fact a base64 encoded file.
(well done mazzif for finding that !)
> Decode the base64 with THS-OS Apollo (or with an online translater) ;
base64 -d winning > output_file
>output_file then shows to be a .jpg image of our much loved Charlie Sheen.. WINNING
-(can check the file type in hex editor and look for file headers/trailers)
> The final part of the challenge is to extract the password protected steganography within the image. (using steghide)
steghide extract -sf winning.jpg
This was the last step..
Well done challenge complete !
For those who tried, hope you enjoyed it !