wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

S-Tool : Steganography

profile
Sarvesh Vishwakarma
May 03, 2018
0 Likes
0 Discussions
693 Reads

The information provided by website should be used for educational purpose only, website will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

  Start s-tool and open any *.bmp image. Create a text file and save it with some content. Now drag the *.txt file in tool over image and drop the *.txt file and s-tool will ask to put password to hide image. Now we can see two same images with different title name as hidden data. We will right click on image and save it as *.bmp with different name. This time open last saved *.bmp file (hidden.bmp) and right click on it and click on reveal to extract hidden data. Again enter same password and same Encryption Algorithm and click OK to proceed Now we can see the revealed data and we will right click on reveal file and try to save it. And Now we'll see that, there is no change in *.txt file. Audio Download *.wav music file and drag it in the s-tool. Create a *.txt file . Drag the *.txt file on the image in tool and enter password and select the Algorithm and Finally Click OK. Save the new Wave file as new *.wav file. Drag new *.wav file to s-tool and reveal the file again. Again save file with *.txt . Again we can see the same *.txt file extracted from *.wav file.

Comments ()


Sign in

Read Next

Should you be using a mouthwash? Know from the experts

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

Dal Bafla Recipe

Blog banner

What is metaverse?

Blog banner

Child labour

Blog banner

Why is ITSM important in IT organization?

Blog banner

Direct Memory Access

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Domain Name System

Blog banner

bulk email software

Blog banner

Data Mining

Blog banner

The Laws of Karma

Blog banner

Social Media Sentiment Analysis

Blog banner

Virtual memory

Blog banner

Characteristics of Etherum

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

Memory management

Blog banner

History of Money

Blog banner

12 Principles of Animation

Blog banner

BENIFITS OF YOGA

Blog banner

Outlook mail

Blog banner

Service Design Principles

Blog banner

Getting started with Android Studio

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Financial Fraud Detection

Blog banner

PERSONAL STORIES

Blog banner

RAID and It's Levels

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Importance Of Yoga.

Blog banner

Web Site

Blog banner

Photorec - media recovery tool

Blog banner

Developments in Modern Operating Systems

Blog banner

LIMITED EDITION

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

Virus

Blog banner

Telegram and it's features

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

File Management

Blog banner

Malware

Blog banner

EdTech (Education Technology)

Blog banner