wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

S-Tool : Steganography

profile
Sarvesh Vishwakarma
May 03, 2018
0 Likes
0 Discussions
693 Reads

The information provided by website should be used for educational purpose only, website will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

  Start s-tool and open any *.bmp image. Create a text file and save it with some content. Now drag the *.txt file in tool over image and drop the *.txt file and s-tool will ask to put password to hide image. Now we can see two same images with different title name as hidden data. We will right click on image and save it as *.bmp with different name. This time open last saved *.bmp file (hidden.bmp) and right click on it and click on reveal to extract hidden data. Again enter same password and same Encryption Algorithm and click OK to proceed Now we can see the revealed data and we will right click on reveal file and try to save it. And Now we'll see that, there is no change in *.txt file. Audio Download *.wav music file and drag it in the s-tool. Create a *.txt file . Drag the *.txt file on the image in tool and enter password and select the Algorithm and Finally Click OK. Save the new Wave file as new *.wav file. Drag new *.wav file to s-tool and reveal the file again. Again save file with *.txt . Again we can see the same *.txt file extracted from *.wav file.

Comments ()


Sign in

Read Next

What do you mean by online marketing and why do you need to know about it

Blog banner

Windows Operating System

Blog banner

operating system

Blog banner

Internet of Things and cyber security

Blog banner

VIRTUAL MACHINE

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

Some web vulnerabilities

Blog banner

RAID

Blog banner

Bharat Maps

Blog banner

Modern Operating system

Blog banner

GUIDE TO GIS

Blog banner

Health and fitness in technology

Blog banner

Memory input output management

Blog banner

Evolution of the Microprocesor

Blog banner

Os(Computer security threats)

Blog banner

Network Forensics

Blog banner

Domain Name System

Blog banner

Mumbaicha Dabbawalla

Blog banner

ZOHO

Blog banner

Constrained Management in IT

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

K-means use cases

Blog banner

Threads

Blog banner

GraphQL

Blog banner

A True Friendship

Blog banner

How I use google in my daily life

Blog banner

Operation system

Blog banner

Malware Defense

Blog banner

MAILFENCE

Blog banner

Beauty of indian railway

Blog banner

semaphores

Blog banner

Cache Memory

Blog banner

Processes: Process Description and Control.

Blog banner

Time Series Analysis

Blog banner

Types of Hackers.

Blog banner

Water Resources are about to exhaust...

Blog banner

Famous Indian dishes that where misunderstood to be Indian

Blog banner

Security in Cloud Computing

Blog banner

'Positivity in life'

Blog banner

 " Healing of Yoga "

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner