Hackerman

┌──(root@ghost)-[/home/ghost]
└─# strings hackerman.jpg
...
g?6:
R`S_/
J7$&
jo+b
'r]+
,g52
o3n=
2<co;
5634275d694f8665957746c9619132f0
MD5 hash found
┌──(root@ghost)-[/home/ghost]
└─# john --format=RAW-MD5 --wordlist=rockyou.txt md5
Using default input encoding: UTF-8
Loaded 1 password hash (Raw-MD5 [MD5 256/256 AVX2 8x3])
Press 'q' or Ctrl-C to abort, almost any other key for status
almost (?)
1g 0:00:00:00 DONE (2022-07-21 18:32) 6.250g/s 72000p/s 72000c/s 72000C/s camaleon..snuffy
Use the "--show --format=Raw-MD5" options to display all of the cracked passwords reliably
Session completed.
┌──(root@ghost)-[/home/ghost]
└─# steghide extract -sf hackerman.jpg -p almost
wrote extracted data to "hackerman.txt".
┌──(root@ghost)-[/home/ghost]
└─# cat hackerman.txt
SFRCezN2MWxfYzBycH0=
┌──(root@ghost)-[/home/ghost]
└─# echo SFRCezN2MWxfYzBycH0= | base64 -d
HTB{3v1l_c0rp}