Coder Social home page Coder Social logo

steg-tools's Introduction

steg-tools

This is a list of tools and resources for learning and experimenting with steganography and information hiding.

Tools

  • Exiftool is a Perl library and a command line application for the manipulation of metadata of different files, including EXIF, GPS, XMP, and ID3.

  • Strings is part of the binutils and it is pre-installed in many unix OSes. On macOS is part of Xcode command line tools and can be installed with: xcode-select --install. Strings can be used to find printable strings (i.e., ASCII strings) in binary and other files.

  • binwalk is a simple (yet powerful) tool for binary files. Among the various use, it can be used to find embedded or appended files or blocks of executable code. On Linux can be installed with apt-get install binwalk, while on macOS is available through Homebrew with brew install binwalk.

  • zsteg can be used to detect data within PNG and BMP images, which can be embedded by using steganography. It can be installed via gem install zsteg and provides different extraction methods. With the flag -a, it can be used to search an image for hidden content by using all the known methods, or it can be tweaked to search for specific combinations of R, G, B, A channels.

  • Steghide is a tool for hiding data in different media files (i.e., audio and image). Embedded data can be compressed, encrypted and protected with a checksum to verify the integrity of the message.

  • zbarimg is part of the ZBar suite of tools for scanning and reading barcodes and QRcodes for different sources (e.g., videos and images). It also offers a Python API, which allows to easily integrate the scanning functionalities in scripts to automate the analysis process.

Further Reading

  • steg-in-the-wild a list of real-world attacks leveraging some form of steganography or information hiding.

  • J.-F. Lalande, S. Wendzel, "Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels", in Proc. of the First International Workshop on Emerging Cyberthreats and Countermeasures, 2013, pp. 701โ€“710. This paper presents an overview of the Colluding Applications Threat. Videos of a prototypal attack using such technique are available here and here.

  • SteganoCC is a set of covert channels (i.e., hidden communication paths implemented by using information hiding) acting between two Android processes. This technique is at the basis of the Colluding Applications Threat, which can be used to exfiltrate data between two isolated processes.

  • Network Information Hiding 101 is an online course prepared by Steffen Wendzel discussing terminology, methodology and practical aspects of Network Steganography and Network Covert Channels.

steg-tools's People

Contributors

lucacav avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.