wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

S-Tool : Steganography

profile
Sarvesh Vishwakarma
May 03, 2018
0 Likes
0 Discussions
693 Reads

The information provided by website should be used for educational purpose only, website will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

  Start s-tool and open any *.bmp image. Create a text file and save it with some content. Now drag the *.txt file in tool over image and drop the *.txt file and s-tool will ask to put password to hide image. Now we can see two same images with different title name as hidden data. We will right click on image and save it as *.bmp with different name. This time open last saved *.bmp file (hidden.bmp) and right click on it and click on reveal to extract hidden data. Again enter same password and same Encryption Algorithm and click OK to proceed Now we can see the revealed data and we will right click on reveal file and try to save it. And Now we'll see that, there is no change in *.txt file. Audio Download *.wav music file and drag it in the s-tool. Create a *.txt file . Drag the *.txt file on the image in tool and enter password and select the Algorithm and Finally Click OK. Save the new Wave file as new *.wav file. Drag new *.wav file to s-tool and reveal the file again. Again save file with *.txt . Again we can see the same *.txt file extracted from *.wav file.

Comments ()


Sign in

Read Next

Starvation

Blog banner

Stop Racism

Blog banner

Cache Memory

Blog banner

Importance Of Blockchain

Blog banner

Visualization in Data Science

Blog banner

RAID

Blog banner

Threat management

Blog banner

Threads in OS

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

 " Healing of Yoga "

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Dental Problems That Start Small But Should Never Be Ignored

Blog banner

Trends that began during the pandemic

Blog banner

SPEM

Blog banner

Paging

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Question

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

What if COVID does not exist!

Blog banner

Self Confidence

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

Apple

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Explaining Buffer Overflow with Example

Blog banner

Types of Malware in Cyber Security

Blog banner

Operating system and overviews

Blog banner

Ransomware

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

Virtual Machine

Blog banner

Self defence

Blog banner

Uniprocessor scheduling

Blog banner

Threads

Blog banner

Embaded operating system

Blog banner

Satellite Based Positioning

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

I/O Buffering

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

VIRTUAL MACHINE

Blog banner

Process and Threading

Blog banner