wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

S-Tool : Steganography

profile
Sarvesh Vishwakarma
May 03, 2018
0 Likes
0 Discussions
693 Reads

The information provided by website should be used for educational purpose only, website will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

  Start s-tool and open any *.bmp image. Create a text file and save it with some content. Now drag the *.txt file in tool over image and drop the *.txt file and s-tool will ask to put password to hide image. Now we can see two same images with different title name as hidden data. We will right click on image and save it as *.bmp with different name. This time open last saved *.bmp file (hidden.bmp) and right click on it and click on reveal to extract hidden data. Again enter same password and same Encryption Algorithm and click OK to proceed Now we can see the revealed data and we will right click on reveal file and try to save it. And Now we'll see that, there is no change in *.txt file. Audio Download *.wav music file and drag it in the s-tool. Create a *.txt file . Drag the *.txt file on the image in tool and enter password and select the Algorithm and Finally Click OK. Save the new Wave file as new *.wav file. Drag new *.wav file to s-tool and reveal the file again. Again save file with *.txt . Again we can see the same *.txt file extracted from *.wav file.

Comments ()


Sign in

Read Next

(Input/Output) in os

Blog banner

Article on Zoho Corporation

Blog banner

I Personally

Blog banner

Fault Tolerance

Blog banner

Multithreading in Operating System

Blog banner

Process Creation

Blog banner

MYNTRA

Blog banner

Evolution of Operating system.

Blog banner

Use case of K-means clustering

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

How to lose belly fat

Blog banner

VIRTUAL MEMORY

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

Risk management in IT

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

Fashion design

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Water Resources are about to exhaust...

Blog banner

The Right way of cooking

Blog banner

Paging

Blog banner

Veg Mix Pickle

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Design Considerations for Disk Cache Management

Blog banner

Hosting basics

Blog banner

Jira Software

Blog banner

Esri India launches Policy Maps.

Blog banner

internet email and it's applications

Blog banner

Docker Framework

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

Data Mapping

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

File Management

Blog banner

Artificial Intelligence and I

Blog banner

Service Operation

Blog banner

Building Confidence in Children Through Daily Routines and Play

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

Asana

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner