wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

S-Tool : Steganography

profile
Sarvesh Vishwakarma
May 03, 2018
0 Likes
0 Discussions
693 Reads

The information provided by website should be used for educational purpose only, website will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

  Start s-tool and open any *.bmp image. Create a text file and save it with some content. Now drag the *.txt file in tool over image and drop the *.txt file and s-tool will ask to put password to hide image. Now we can see two same images with different title name as hidden data. We will right click on image and save it as *.bmp with different name. This time open last saved *.bmp file (hidden.bmp) and right click on it and click on reveal to extract hidden data. Again enter same password and same Encryption Algorithm and click OK to proceed Now we can see the revealed data and we will right click on reveal file and try to save it. And Now we'll see that, there is no change in *.txt file. Audio Download *.wav music file and drag it in the s-tool. Create a *.txt file . Drag the *.txt file on the image in tool and enter password and select the Algorithm and Finally Click OK. Save the new Wave file as new *.wav file. Drag new *.wav file to s-tool and reveal the file again. Again save file with *.txt . Again we can see the same *.txt file extracted from *.wav file.

Comments ()


Sign in

Read Next

Practical Implementation of Client Server model using TCP/IP.

Blog banner

From Model Mistakes to Metrics

Blog banner

Virtual Machine

Blog banner

Stop Racism

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

Evolution of operating systems

Blog banner

Scala - a programming tool

Blog banner

undefined

Blog banner

MODERN OPERATING SYSTEM

Blog banner

GUIDE TO GIS

Blog banner

PPT methodology

Blog banner

IP ADDRESS

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

I/O Management and Disk Scheduling

Blog banner

Music

Blog banner

"Mahakali cave"

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

Monday. com App

Blog banner

Data Lake

Blog banner

Firewall in Computer Network

Blog banner

Deadlock

Blog banner

Disk Management

Blog banner

Patola Outfits for the Modern Wardrobe: Reviving Indian Handloom in Style

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

Direct Memory Access

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

Short note on expert system

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Compromising Mobile Platforms

Blog banner

Os(Computer security threats)

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Modern Operating System - Suren Kotian

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

CoWIN

Blog banner

Tracking Emails & Email Crimes

Blog banner

Virtual Machine

Blog banner

USPS mail

Blog banner

1.1 basic elements

Blog banner

Mango Raisin Chutney (sweet mango raisin spread)

Blog banner

Data Mapping

Blog banner

Deadlock and Starvation

Blog banner