wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

S-Tool : Steganography

profile
Sarvesh Vishwakarma
May 03, 2018
0 Likes
0 Discussions
693 Reads

The information provided by website should be used for educational purpose only, website will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

  Start s-tool and open any *.bmp image. Create a text file and save it with some content. Now drag the *.txt file in tool over image and drop the *.txt file and s-tool will ask to put password to hide image. Now we can see two same images with different title name as hidden data. We will right click on image and save it as *.bmp with different name. This time open last saved *.bmp file (hidden.bmp) and right click on it and click on reveal to extract hidden data. Again enter same password and same Encryption Algorithm and click OK to proceed Now we can see the revealed data and we will right click on reveal file and try to save it. And Now we'll see that, there is no change in *.txt file. Audio Download *.wav music file and drag it in the s-tool. Create a *.txt file . Drag the *.txt file on the image in tool and enter password and select the Algorithm and Finally Click OK. Save the new Wave file as new *.wav file. Drag new *.wav file to s-tool and reveal the file again. Again save file with *.txt . Again we can see the same *.txt file extracted from *.wav file.

Comments ()


Sign in

Read Next

Short-Form Video Marketing: Why It's Dominating the Internet

Blog banner

Service Operation

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Instagram

Blog banner

Self defence

Blog banner

10 Types of Friends in every friend group

Blog banner

Process and Threading

Blog banner

The Peephole

Blog banner

Fault Tolerance

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

Education?

Blog banner

Operating system

Blog banner

Service Strategy In ITSM

Blog banner

EID UL FITR

Blog banner

Virtual Machine

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

FREE VERSION OF G-MAIL

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

Predictive Analysis - Ek Overview

Blog banner

Answer

Blog banner

FILE SHARING

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

american greatines

Blog banner

Deadlock and Starvation

Blog banner

What if COVID does not exist!

Blog banner

Deadlock and Starvation

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Threads

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Supervised and unsupervised learning

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

LIMITED EDITION

Blog banner

Email Privacy

Blog banner

Understanding Endometriosis and Its Psychological Impact on Quality of Life

Blog banner

Europe Through My Lens

Blog banner

Deadlock and Starvation

Blog banner

Multicore and multithreading 171

Blog banner

How To Secure Operating Systems ?

Blog banner

Real time scheduling

Blog banner

internet email and it's applications

Blog banner