Toggle menu
Toggle preferences menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Steghide: Difference between revisions

From Brunnerne
Created page with "== Steghide == '''Steghide''' is a command-line steganography tool used to hide secret data within cover files (typically JPEG, BMP, WAV, or AU files) and extract data hidden using the same method. It often requires a passphrase for extraction. Commonly used in forensics challenges to extract hidden flags or messages from provided media files. === Basic Extraction Example === To extract potentially hidden data from a file named ''challe..."
 
No edit summary
 
Line 13: Line 13:


If successful, ''steghide'' will write the extracted hidden file (e.g., ''flag.txt'') to the current directory.
If successful, ''steghide'' will write the extracted hidden file (e.g., ''flag.txt'') to the current directory.
[[Category:Tools]]
[[Category:Forensics]]

Latest revision as of 17:01, 2 May 2025

Steghide

Steghide is a command-line steganography tool used to hide secret data within cover files (typically JPEG, BMP, WAV, or AU files) and extract data hidden using the same method. It often requires a passphrase for extraction.

Commonly used in forensics challenges to extract hidden flags or messages from provided media files.

Basic Extraction Example

To extract potentially hidden data from a file named challenge.jpg (you might be prompted for a passphrase if one was used):

steghide extract -sf challenge.jpg

If you know the passphrase is SuperSecret, you can provide it directly:

steghide extract -sf challenge.jpg -p SuperSecret

If successful, steghide will write the extracted hidden file (e.g., flag.txt) to the current directory.