Steg Toolkit

StegBreak

Steg Toolkit the stegbreak prints the filename, the embedding system and the password when the attack succeeded for an image.

Usage

Note : If rules.ini is missing , here it is :
https://launchpadlibrarian.net/16697277/rules.ini
Copy and paste it to the location of error. 

Syntax

 stegbreak [-V] [-r <rules>] [-f <wordlist>] [-t <schemes>] file.jpg ...

Options

     -q           Only reports images for which the dictionary attack
                  succeeded.

     -V           Displays the version number of the software.

     -r rules     Contains rules with transformations that will be applied to
                  the words in the wordlist.  The rules follow the same syntax
                  as in Solar Designers password cracking program John the
                  Ripper.  The default is rules.ini.

     -f wordlist  Specifies the file that contains the words for the
                  dictionary attack.  The default is /usr/share/dict/words.

     -t tests     Sets the tests that are being run on the image.  The
                  following characters are understood:

                  o             The dictionary attack follows the embedding
                                used by outguess.

                  p             The dictionary attack follows the embedding
                                used by jphide.

                  j             The dictionary attack follows the embedding
                                used by jsteg-shell.

                  The default value is p.

     -c           Specifies that the JPG images should be converted to a small
                  sized object that contains all the information necessary for
                  the dictionary attack.  This can be used to reduce the size
                  of the data set in distributed computing applications.

Example

cyborg@cyborg:$ stegbreak -tj steg.jpg
Loaded 1 files...
steg.jpg : jsteg(wonderland)
Processed 1 files, found 1 embeddings.
Time: 36 seconds: Cracks: 324123,   8915 c/s


StegCompare

stegcompare can compare the original and the image which stores information

Usage

Syntax

stegcompare orig.jpg modified.jpg

Example

cyborg@cyborg:~$ stegcompare google.jpg steg.jpg 
stegcompare: Size of images differs: 67650 != 67651


StegDetect

The stegdetect utility analyses image files for steganographic content. It runs statistical tests to determine if steganographic content is present, and also tries to find the system that has been used to embed the hidden information.

Usage

Syntax

 stegdetect [-qhnV] [-s float] [-C num,tfname] [-c file ... name]
                [-D file] [-d num] [-t tests] [file ...]

Options

    -q        Only reports images that are likely to have steganographic
               content.

     -h        Only calculates the DCT histogram.  Use the -d option to
               display the values.

     -n        Enables checking of JPEG header information to surpress false
               positives.  If enabled, all JPEG images that contain comment
               fields will be treated as negatives.  OutGuess checking will be
               disabled if the JFIF marker does not match version 1.1.

     -V        Displays the version number of the software.

     -s float  Changes the sensitivity of the detection algorithms.  Their
               results are multiplied by the specified number.  The higher the
               number the more sensitive the test will become.  The default is
               1.

     -C num,tfname
               Feature vectors are being extraced from the images.  The
               argument num can either be zero or one.  A zero indicates that
               the provided images do not contain steganographic content, a
               one indicates that they do.  The argument tfname is the name of
               transform used for feature extraction.  The features vectores
               are printed to stdout.

     -c file   Reads the data created by the -C options and computes the
               necessary values to detect steganographic content in yet
               unknown images.  The option can be used multiple times.  It
               expects that the name of the scheme provided as additional
               argument.  The result is a decision object that can be used
               with the -D option.  The decision object contains a the
               parameters for a linear discriminant function based on the
               Neyman-Pearson theorem.

     -D file   Reads a decision object that contains detection information
               about a new steganographic scheme.

     -d num    Prints debug information.

     -t tests  Sets the tests that are being run on the image.  The following
               characters are understood:

               j       Tests if information has been embedded with jsteg.

               o       Tests if information has been embedded with outguess.

               p       Tests if information has been embedded with jphide.

               i       Tests if information has been hidden with invisible
                       secrets.

               f       Tests if information has been hidden with F5.

               F       Tests if information has been hidden with F5 using a
                       more sophisticated but fairly slow detection algorithm.

               a       Tests if information has been added at the end of file,
                       for example by camouflage or appendX.

Example

cyborg@cyborg:$ stegdetect stenew.jpg
stegnew.jpg : jphide(***)


StegDeImage

stegdeimage can hide image to an image.

Usage

Syntax

stegdeimage orig.jpg modified.jpg

Example

cyborg@cyborg:~$ stegdeimage google.jpg steg.jpg


StegHide

Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color- respectivly sample- frequencies are not changed thus making the embedding resistant against first-order statistical tests.

Usage

Syntax

  steghide command [ arguments ]

Options

the first argument must be one of the following:
 embed, --embed          embed data
 extract, --extract      extract data
 info, --info            display information about a cover- or stego-file
   info <filename>       display information about <filename>
 encinfo, --encinfo      display a list of supported encryption algorithms
 version, --version      display version information
 license, --license      display steghide's license
 help, --help            display this usage information

embedding options:
 -ef, --embedfile        select file to be embedded
   -ef <filename>        embed the file <filename>
 -cf, --coverfile        select cover-file
   -cf <filename>        embed into the file <filename>
 -p, --passphrase        specify passphrase
   -p <passphrase>       use <passphrase> to embed data
 -sf, --stegofile        select stego file
   -sf <filename>        write result to <filename> instead of cover-file
 -e, --encryption        select encryption parameters
   -e <a>[<m>]|<m>[<a>]  specify an encryption algorithm and/or mode
   -e none               do not encrypt data before embedding
 -z, --compress          compress data before embedding (default)
   -z <l>                 using level <l> (1 best speed...9 best compression)
 -Z, --dontcompress      do not compress data before embedding
 -K, --nochecksum        do not embed crc32 checksum of embedded data
 -N, --dontembedname     do not embed the name of the original file
 -f, --force             overwrite existing files
 -q, --quiet             suppress information messages
 -v, --verbose           display detailed information

extracting options:
 -sf, --stegofile        select stego file
   -sf <filename>        extract data from <filename>
 -p, --passphrase        specify passphrase
   -p <passphrase>       use <passphrase> to extract data
 -xf, --extractfile      select file name for extracted data
   -xf <filename>        write the extracted data to <filename>
 -f, --force             overwrite existing files
 -q, --quiet             suppress information messages
 -v, --verbose           display detailed information

options for the info command:
 -p, --passphrase        specify passphrase
   -p <passphrase>       use <passphrase> to get info about embedded data

Example

cyborg@cyborg:~$ steghide --embed -ef a.txt -cf google.jpg -sf steg.jpg -p pass123 -Z
embedding "a.txt" in "google.jpg"... done
writing stego file "steg.jpg"... done
0 Comments

Leave a reply

CONTACT US

We're are building as a community and a team. Be a part of it.

Sending

©2017 Ztrela Knowledge Solutions Pvt. Ltd

Log in with your credentials

Forgot your details?