wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

S-Tool : Steganography

profile
Sarvesh Vishwakarma
May 03, 2018
0 Likes
0 Discussions
693 Reads

The information provided by website should be used for educational purpose only, website will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

  Start s-tool and open any *.bmp image. Create a text file and save it with some content. Now drag the *.txt file in tool over image and drop the *.txt file and s-tool will ask to put password to hide image. Now we can see two same images with different title name as hidden data. We will right click on image and save it as *.bmp with different name. This time open last saved *.bmp file (hidden.bmp) and right click on it and click on reveal to extract hidden data. Again enter same password and same Encryption Algorithm and click OK to proceed Now we can see the revealed data and we will right click on reveal file and try to save it. And Now we'll see that, there is no change in *.txt file. Audio Download *.wav music file and drag it in the s-tool. Create a *.txt file . Drag the *.txt file on the image in tool and enter password and select the Algorithm and Finally Click OK. Save the new Wave file as new *.wav file. Drag new *.wav file to s-tool and reveal the file again. Again save file with *.txt . Again we can see the same *.txt file extracted from *.wav file.

Comments ()


Sign in

Read Next

Ambiguous

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

Pipedrive

Blog banner

PPT methodology

Blog banner

Memory management

Blog banner

Technological Advancement

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Child labour

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

IT RISK

Blog banner

Security Issues

Blog banner

WomenEmpowerment

Blog banner

SQL Injection

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

Process State

Blog banner

HubSpot

Blog banner

Modern Operating System

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

Studying ProRat

Blog banner

What is hydration pack/ hydration bladder?

Blog banner

MACHINE LEARNING

Blog banner

Solitary Play Activities for Preschoolers: Types and Benefits

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Social Media Marketing Trends 2022

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

Self Confidence

Blog banner

Paginng In OS

Blog banner

Deadlock and Starvation

Blog banner

Deadlock and Starvation

Blog banner

IO Buffers

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

IOT- Internet Of Things

Blog banner

College Life

Blog banner

Principal of concurrency

Blog banner

Cache Memory

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

Virtual machine

Blog banner