±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 1 Overall: 35880
New Yesterday: 7 Visitors: 126

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Brute force attack in steganography case

Forensic software discussion (commercial and open source/freeware). Strictly no advertising.
Reply to topicReply to topic Printer Friendly Page
Forum FAQSearchView unanswered posts
 
  

Jegham
Member
 

Brute force attack in steganography case

Post Posted: Apr 30, 08 01:01

Through your experience...what is the best reliable software you used to brute force a password in stegnagrophy case ?  
 
  

ddow
Senior Member
 

Re: Brute force attack in steganography case

Post Posted: Apr 30, 08 04:46

GIYF.
_________________
Dennis 
 
  

Jegham
Member
 

Re: Brute force attack in steganography case

Post Posted: Apr 30, 08 10:35

- ddow
GIYF.

????  
 
  

jamie
Site Admin
 

Re: Brute force attack in steganography case

Post Posted: Apr 30, 08 11:57

Google Is Your Friend  
 
  

Jegham
Member
 

Re: Brute force attack in steganography case

Post Posted: Apr 30, 08 19:48

- jamie
Google Is Your Friend


Very Happy Thanks for the clarification.

But i checked Google and yahoo...and the only tool that i found is stegbreak but it doesn't run normally, it has errors...  
 
  

keydet89
Senior Member
 

Re: Brute force attack in steganography case

Post Posted: Apr 30, 08 20:02

Part of the issue may be with the concept itself.

For example, the last time I looked at S-Tools4, you'd get a dialog box prompting you for a passphrase even if you had never embedded anything in the image before.

I guess it all goes back to the question of how do you get an arbitrary file (image, movie, sound, etc.) and determine whether or not anything was stego'd into it? Some of the research I've seen by Provos indicates that even if you know the specific tool and version used to stego a file, the best you can do is determine the probability that something was stego'd into the 'carrier' file. Oddly enough, the same person also wrote stego algorithms that he claims defeated statistical analysis methods of stego detection.

Even this presentation states that you need the original, un-stego'd copy of the file for analysis:
security.ngoinabox.org...alysis.pdf

Other stuff
www.citi.umich.edu/tec...-01-11.pdf  
 
  

Jegham
Member
 

Re: Brute force attack in steganography case

Post Posted: Apr 30, 08 23:16

- keydet89
Part of the issue may be with the concept itself.

For example, the last time I looked at S-Tools4, you'd get a dialog box prompting you for a passphrase even if you had never embedded anything in the image before.

I guess it all goes back to the question of how do you get an arbitrary file (image, movie, sound, etc.) and determine whether or not anything was stego'd into it? Some of the research I've seen by Provos indicates that even if you know the specific tool and version used to stego a file, the best you can do is determine the probability that something was stego'd into the 'carrier' file. Oddly enough, the same person also wrote stego algorithms that he claims defeated statistical analysis methods of stego detection.

Even this presentation states that you need the original, un-stego'd copy of the file for analysis:
security.ngoinabox.org...alysis.pdf

Other stuff
www.citi.umich.edu/tec...-01-11.pdf



This is very interesting....especially the first PDF...Thanks a lot  
 

Page 1 of 1