Steganography

  1. strings test.jpg (Check out if there are interesting readable characters in the file)

  2. file test.jpg (to check what kind of file it is)

  3. exiftool test.jpg (Check out metadata of media files)

  4. foremost stego.jpg (Carve out embedded/appended files)

  5. pngcheck stego.png (Get details on a PNG file (or find out is is actually something else))

  6. openstego extract -sf openstego.png -p abcd

  7. ffmpeg -v info -i stego.mp3 -f null - (ffmpeg can be used to check integrity of audio files and let it report infos and errors)

STEGHIDE :

  1. steghide extract -sf test.jpg

  2. steghide info test.jpg

  3. steghide extract -sf test.jpg -p password

BINWALK :

1)Scan to identify code, files, and other information : binwalk

2)Extract files from firmware : binwalk -e

3)Extract files from firmware recursively : binwalk -Me

4)Verbose Output : binwalk --verbose

OPENSTEGO / STEGHIDE - CAN BE USED FOR WINDOWS ALSO

SNOW.EXE -C -p 1234 -m "hidden message" input.txt output.txt -C : It is for compressing the data if concealing, or uncompressing it while extracting. -p : password

For extracting : SNOW.EXE -C -p 1234 output.txt

Last updated