We are able to replicate the correct header for the first line in order to set the correct header for the data type.
After doing so the image can be exported and viewed correctly.
The image presents the directory /th1s_1s_h1dd3n.
Viewing the page source reveals the commented line:
After some poking about I found that the main index page is PHP. Along with this and no obvious method for inputting the secret mentioned above its probable that the /th1s_1s_h1dd3n directory will take a PHP parameter for input.
After some testing I found the following URL to be a valid parameter:
I then used fuff to automate this.
Where the number 73 appears to be the correct input.
This password can be used with steghide to then extract secret information from the thm.jpg (with the correct JPEG header).
Unfortunately this part of the room had to be looked up. This is because the password information required to proceed is hidden in the image on the room page.
We do not need a password to extract at least...
We now have all the information required to proceed with a SSH login as the user joker.
Through the standard enumeration checks we find SETUID is set on a non standard binary screen-4.5.0.
A simple Google search for this binary shows various exploits. Of which the most simple is shown below.