wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

S-Tool : Steganography

profile
Sarvesh Vishwakarma
May 03, 2018
0 Likes
0 Discussions
693 Reads

The information provided by website should be used for educational purpose only, website will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

  Start s-tool and open any *.bmp image. Create a text file and save it with some content. Now drag the *.txt file in tool over image and drop the *.txt file and s-tool will ask to put password to hide image. Now we can see two same images with different title name as hidden data. We will right click on image and save it as *.bmp with different name. This time open last saved *.bmp file (hidden.bmp) and right click on it and click on reveal to extract hidden data. Again enter same password and same Encryption Algorithm and click OK to proceed Now we can see the revealed data and we will right click on reveal file and try to save it. And Now we'll see that, there is no change in *.txt file. Audio Download *.wav music file and drag it in the s-tool. Create a *.txt file . Drag the *.txt file on the image in tool and enter password and select the Algorithm and Finally Click OK. Save the new Wave file as new *.wav file. Drag new *.wav file to s-tool and reveal the file again. Again save file with *.txt . Again we can see the same *.txt file extracted from *.wav file.

Comments ()


Sign in

Read Next

Deadlocks

Blog banner

Meshoo

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Android Flashlight Application

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

Disk scheduling

Blog banner

Proof-of-Stake (PoS)

Blog banner

Worms, viruses and Bots

Blog banner

How to Build an Effective Digital Campaign

Blog banner

Types of Viruses

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

USPS mail

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Development Of Modern Operating System

Blog banner

Microsoft powerpoint presentation

Blog banner

Types of Malware in Cyber Security

Blog banner

Data Analytics in Data Science

Blog banner

I/O Management and Disk Scheduling

Blog banner

Modern operating system

Blog banner

Deadlock and Starvation

Blog banner

Wrike

Blog banner

Flipkart

Blog banner

Firewall in Computer Network

Blog banner

Mumbai famous street food

Blog banner

Mumbai

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

ODOO

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

RACI model in IT services

Blog banner

Brain wash of social media

Blog banner

Multiprocessor scheduling

Blog banner

Vulnerability Assessment

Blog banner

File Management In OS

Blog banner

Street foods

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Gis in agriculture and farming

Blog banner

Models of Information Security.

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Virtual Machine

Blog banner

Big Data

Blog banner

25 Movies to Watch Post Breakup Blues

Blog banner