More actions
The.mikkel (talk | contribs) Created page with "== Steghide == '''Steghide''' is a command-line steganography tool used to hide secret data within cover files (typically JPEG, BMP, WAV, or AU files) and extract data hidden using the same method. It often requires a passphrase for extraction. Commonly used in forensics challenges to extract hidden flags or messages from provided media files. === Basic Extraction Example === To extract potentially hidden data from a file named ''challe..." |
No edit summary |
||
| Line 13: | Line 13: | ||
If successful, ''steghide'' will write the extracted hidden file (e.g., ''flag.txt'') to the current directory. | If successful, ''steghide'' will write the extracted hidden file (e.g., ''flag.txt'') to the current directory. | ||
[[Category:Tools]] | |||
[[Category:Forensics]] | |||
Latest revision as of 17:01, 2 May 2025
Steghide
Steghide is a command-line steganography tool used to hide secret data within cover files (typically JPEG, BMP, WAV, or AU files) and extract data hidden using the same method. It often requires a passphrase for extraction.
Commonly used in forensics challenges to extract hidden flags or messages from provided media files.
Basic Extraction Example
To extract potentially hidden data from a file named challenge.jpg (you might be prompted for a passphrase if one was used):
steghide extract -sf challenge.jpg
If you know the passphrase is SuperSecret, you can provide it directly:
steghide extract -sf challenge.jpg -p SuperSecret
If successful, steghide will write the extracted hidden file (e.g., flag.txt) to the current directory.