Steghide is a steganography program that allows you to hide confidential files inside an image or audio file with a passphrase. Supports BMP and JPEG image formats, AU and WAV audio formats. By default it uses Rijndael algorithm to encrypt the file and the key size is 128 bits. If you want to use any-other supported algorithm to encrypt files, use steghide --encinfo command to bring the list. Steghide - Hide information Inside Image and Sound Objects
Steghide Features:
Compression of embedded data.
Encryption of embedded data.
Embedding of a checksum to verify the integrity of the extraced data.
Support for JPEG, BMP, WAV and AU files.
Install in Debian System
sudo apt-get install steghide
Install in Termux
pkg install steghide
To use this tool, type “steghide” in your terminal.
The receiver also has to use same steghide tool to recover the data, so if the password is correct, the contents of original file will be extracted from the image file and saved in the current directory.
You can also view the info related to embedded data by typing this below command.
Command: steghide info kumar.jpeg
How to hide a file inside image ?
Steghide doesn’t have the GUI, so run the following command on terminal to embed the file inside the image. In the following example, we are going to hide atul.txt text file into kumar.jpeg image.
Command: steghide embed -cf kumar.jpeg -ef atul.txt
Above command will embed the file taskwarrior in the cover file kumar.jpeg
How to Unhide/Extract a file ?
Run the following command in terminal and provide the correct passphrase to Unhide/Extract a atul.txt file from the stego file Linux_logo.jpg, which will automatically save in the current directory.
Command: steghide extract -sf kumar.jpeg
steghide –encinfo
Displays the list of supported encryption algorithms and modes that can be used.steghide –encinfo
Displays the list of supported encryption algorithms and modes that can be used.
steghide -encinfo ( Termux )
steghide --encinfo ( Linux )
How to hide a file inside audio file ?
Use the same format and change the stego file type to audio instead of image file. See the following example.
Command: steghide embed -cf atul.wav -ef secret.odt
Above command will embed the file secret.odt in the cover file test.wav
How to Unhide/Extract the file ?
Run the following command in terminal and provide the correct passphrase to Unhide/Extract a secret.odt file from the stego file test.wav, which will automatically save in the current directory.
Command: steghide extract -sf atul.wav
Video Tutorial :- Updated....Otherwise search me on YouTube - Kumar Atul Jaiswal
Disclaimer
This was written for educational purpose and pentest only.
The author will not be responsible for any damage ..!
The author of this tool is not responsible for any misuse of the information.
You will not misuse the information to gain unauthorized access.
This information shall only be used to expand knowledge and not for causing malicious or damaging attacks. Performing any hacks without written permission is illegal ..!
All video’s and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos provided on www.hackingtruth.in is only for those who are interested to learn about Ethical Hacking, Security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
- Hacking Truth by Kumar Atul Jaiswal
I hope you liked this post, then you should not forget to share this post at all.
Thank you so much :-)