Steganography#

Or the art of hiding things in plain sight….

Tools#

Strings#

Hexedit#

Why not take a look at the raw data and see what you can find. Just because their is an end to the data, doesnt mean it’s the end of the file.

hexedit

Exiftool#

Used for examining a file for extra information. This normally includes metadata that isnt obviously seen in the file. This could include capture location, date, device etc. Most social media / image sharing sites scrub this data, but it cant hurt to check.

Another check, the ‘colour components’ may indicate another layer (such as alpha).

Exiftool

steghide#

Used for hiding data in another file (jpeg or wav)

binwalk#

Used for examining a file for other files that may be included. It can extract them too!

binwalk

Stegsnow#

Used for hiding data in ASCII files (text). To store

stegsnow -C -m “secrets” -p “superpassword”

To extract

stegsnow -C -p “superpassword”

If it comes back empty, nothing there sorry.

tineye#

Tineye.com does reverse image search. Maybe see if the file source can give any hints.

Stegseek#

Bruteforce a file for hidden data against a wordlist. Looks to try extracting against common tools that can use a password to store (such as steghide).

Zsteg#

This one isnt in the standard repos, you have to install it with gem

sudo gem install zsteg

It looks for data using a multiple methods and displays these clearly.