steganography

Steganography is a technique that consists of embedding secret information in a message. The goal is to prevent an unauthorized party (attacker) from knowing that secret information is concealed within the apparent message. The hidden information can be embedded in various communication channels, such as an image, a text, a song, a video, or even an object.

Steganography differs from encryption in that, with encryption, the attacker knows the message is encrypted—indicating that information is hidden—but cannot access it.

The tools listed below use predefined steganography techniques and frameworks to extract information from digital formats.

Online Tools

Depending on the sensitivity of the message one is analyzing for steganographic content, a good practice can be to use online tools. The following online resources can be useful:

  • Aperisolve: Can also be used in CLI with the command:

    sudo sh -c "$(curl -fs https://www.aperisolve.com/install.sh)"

Metadata

Metadata provides information used to describe a digital format. Common tools to analyze metadata include:

file <FILE>
exiftool <FILE>

Embedded Data Extraction

To search for hidden embedded data, the following commands can be used:

strings <FILE> | grep <FLAG>
strings <FILE> | awk 'length($0)>20' | sort -u
binwalk -Me <FILE>
stegseek -wl <WORD LIST> <FILE>

Bit Manipulation

For examining potentially corrupted or tampered files, a hex editor can be useful.

hexeditor <FILE>

Last updated