--- Development Continue ---------
Steganography is process that is use for hiding information inside of Image, audio , video or any digital object.That means when you hide your informaton inside image or audio or video , then send it to your destination it's called steganograpghy .
π See detials Via Video : https://youtu.be/Kxwzy2bJCqk
steghide
stegoveritas
zsteg
binwalk
exiftool
strings command
stegsolver
diit-1.5.jar
foremost
sonic visualizer
magic eye solver
Steghide is one of the most famous steganography tools, and for good reason. It's a classic method, hiding a message inside an image, and steghide does it effectively and efficiently. A downside of steghide is that it only works on jpgs; however, that means that if you believe there is a hidden message inside a jpg, then steghide is a probable option.
One of the greatest benefits of stegohide, is that it can encrypt data with a passphrase. Meaning that if they don't have the password then they can't extract any data.
sudo apt install steghide
steghide mainly use for extract or embeded file into .jpg file . But one can extract information from audio / wav /mp3 file .
So we can said that "Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files"
To embed emb.txt in cvr.jpg:
steghide embed -cf cvr.jpg -ef emb.txt
To extract embedded data from stg.jpg:
steghide extract -sf stg.jpg
See details using man command (man steghide )
zsteg is to png's what steghide is to jpg's. It supports various techniques to extract any and all data from png files.
gem install zsteg
zsteg image.png
Personally this is one of my favorite image stego tools. It supports just about every image file, and is able to extract all types of data from it. It is an incredibly useful tool if you don't know exactly what you're looking for, as it has a myriad of built in tests to extract any and all data.
sudo pip3 install stegoveritas
stegoveritas_install_deps
stegsolver is another important tools for ctf . It change color combination and expose data from image .
java -jar stegsolver
Then , Choose target image and change color combination . If color changes system don't expose data you must click on analyse button then choose option one by one .
Binwalk use for different purpose .In steganography we will use Binwalk for extract information without password . That means , when we have no password for extract image , we will use " Binwalk " for extracting information . ( It's default on Kali Linux )
binwalk -e image.jpg
π See details via youtube video :https://youtu.be/ANMp1EHuXCY
diit-1.5.jar is so important tools for CTF contest . When all process fail to solve steganograhy challenge it come . It use algorithm for extract data from image file
java -jar diit-1.5.jar
magic eye solver is onle tools which is similar tools like stegsolver .It is mainly use for magic image .
Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly referred to as data carving. Foremost can work on image files, such as those generated by dd, Safeback, Encase, etc, or directly on a drive.
foremost target_file_name
Ok , no problem . Follow the given below process >>
Step 1: check file type using file command
Step2:use exiftool command
Step3:use strings command
Step4:use steghide command if you have password for extract otherwise use binwalk (But luckly you can try steghide without password)
Step5:zsteg tools
Step6:open stegsolve.jar file using java βjar stegsolve.jar ( then , try to use it according to its uses )
Step7:use magic eye solver
Step8:use diit-1.5.jar and try to extract information
Step 1 :open file and listen it .
Step 2 :If target audio file is morse code try to extract information using online morse code decode tools .If not , follow step 3
Step 3 :open sonic visualizer and try to extract information from it .
Step 4 : If above all step are failed . Try to extract data using steghide as it has ability to extract audio file
Stegcracker use for crack password of image.jpg format file . That means when we have no password and we can't extract information using Binwalk tools we will use stegcracker for crack password of target file . It is so important tools in stego .
https://medium.com/@anastasisvasileiadis/stegcracker-steganography-brute-force-utility-to-uncover-hidden-data-inside-files-b8527600b890
stegcracker targetfile wordlist_for_brute_force_attack
Stegseek is more than powerful than Stegcracker .I personally recommend to you , use stegseeker instead of stegcrakcer for .jpg format file password cracking.
https://github.com/RickdeJager/stegseek/
stegseek targetfile wordlist_for_brute_force_attack
π Happy Hacking π