Anonymous ID: da7097 Jan. 20, 2019, 4:52 p.m. No.3282   🗄️.is 🔗kun   >>3284

Steganography Made Easy in Linux 11 June 2016

 

Now it is time for our recipient to open this file. After they open this jpg in SteGUI they simply go to the Actions tab and select “extract”. Another pop-up box will appear to input the necessary files. The input file at the top will simply be the jpg that we have sent them. The output file will be a new file we can name anything. Here I've just made it a file called out.txt. Now that we have our information in a text file we can easily open it for display.

 

https://linuxconfig.org/steganography-made-easy-in-linux

 

pic of another tut, couldn't copy and paste.

https://www.yeahhub.com/use-steghide-stegosuite-steganography-tools-kali-linux/

 

Learning how to create an image which contains additional content will help to learn how to extract content. Those who hide information in files using steganography usually do so with the intention that the information will be retrieved by the recipient.

If encryption is employed as an additional layer of security it will limit who can extract valid data.

 

For Windows users, if you have more than 3 or 4 gigs of ram, you could get linux running in Virtual Box. There are many ready made images of distros, like lemnux, a forensic discovery linux distro. Because it is a prebuilt image there is no need to install the OS. There are several security suites available as prebuilt images. Many are made for VMWare. VMWare runs on Windows, they used to offer a free version called VMWare Player, in which you can run prebuilt images. VirtualBox can run the VMWare format images also.

 

Running multiflavors OS will allow you to access all potential tools. Sometimes there are OS centric tools with no comparable alternative for the other OS platform.