wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

S-Tool : Steganography

profile
Sarvesh Vishwakarma
May 03, 2018
0 Likes
0 Discussions
693 Reads

The information provided by website should be used for educational purpose only, website will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

  Start s-tool and open any *.bmp image. Create a text file and save it with some content. Now drag the *.txt file in tool over image and drop the *.txt file and s-tool will ask to put password to hide image. Now we can see two same images with different title name as hidden data. We will right click on image and save it as *.bmp with different name. This time open last saved *.bmp file (hidden.bmp) and right click on it and click on reveal to extract hidden data. Again enter same password and same Encryption Algorithm and click OK to proceed Now we can see the revealed data and we will right click on reveal file and try to save it. And Now we'll see that, there is no change in *.txt file. Audio Download *.wav music file and drag it in the s-tool. Create a *.txt file . Drag the *.txt file on the image in tool and enter password and select the Algorithm and Finally Click OK. Save the new Wave file as new *.wav file. Drag new *.wav file to s-tool and reveal the file again. Again save file with *.txt . Again we can see the same *.txt file extracted from *.wav file.

Comments ()


Sign in

Read Next

SPAM

Blog banner

How Preschool Annual Day Shapes Confidence, Emotions, and Growth

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

What is Spyware? and examples of them.

Blog banner

How Unstructured Play Helps Children Become Creative Thinkers

Blog banner

GIS in Disaster Management

Blog banner

Deadlocks

Blog banner

The Golden Temple , Amritsar

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

GIS

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Number Guessing game --lisp

Blog banner

MEMORY MANAGEMENT

Blog banner

Cache memory

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

The launch of UniMap by HERE

Blog banner

Trends that began during the pandemic

Blog banner

Game Theory in Blockchain

Blog banner

ahh wait a min

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

What is a Malware ?

Blog banner

BENIFITS OF YOGA

Blog banner

Deadlock and Starvation

Blog banner

Memory management

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

What are NFT s?

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

Jira service Management

Blog banner

Search Marketing In 2026: From Keywords To Credibility And User Intent

Blog banner

Data Exfiltration

Blog banner

Cyber Laws In India and Around the World

Blog banner

Place to visit in pune

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

MailChimp

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Security Issues and Countermeasures

Blog banner

Fault Tolerance

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

Concurrency and memory

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner