Steganography
strings test.jpg (Check out if there are interesting readable characters in the file)
file test.jpg (to check what kind of file it is)
exiftool test.jpg (Check out metadata of media files)
foremost stego.jpg (Carve out embedded/appended files)
pngcheck stego.png (Get details on a PNG file (or find out is is actually something else))
openstego extract -sf openstego.png -p abcd
ffmpeg -v info -i stego.mp3 -f null - (ffmpeg can be used to check integrity of audio files and let it report infos and errors)
STEGHIDE :
steghide extract -sf test.jpg
steghide info test.jpg
steghide extract -sf test.jpg -p password
BINWALK :
1)Scan to identify code, files, and other information : binwalk
2)Extract files from firmware : binwalk -e
3)Extract files from firmware recursively : binwalk -Me
4)Verbose Output : binwalk --verbose
OPENSTEGO / STEGHIDE - CAN BE USED FOR WINDOWS ALSO
SNOW.EXE -C -p 1234 -m "hidden message" input.txt output.txt -C : It is for compressing the data if concealing, or uncompressing it while extracting. -p : password
For extracting : SNOW.EXE -C -p 1234 output.txt
Last updated