Contraband Steganog...
 
Notifications
Clear all

Contraband Steganography

2 Posts
2 Users
0 Reactions
728 Views
thegavster
(@thegavster)
Eminent Member
Joined: 17 years ago
Posts: 22
Topic starter  

Hi guys,

does anyone know a weakness in the steg tool "contraband"? If not is the only solution to getting the hidden data back, a brute force approach. Is their any "tell tail" signs in the hex of where the password is stored or the exact location of the hidden data.

If brute force is the way to go - how forensically sound is that?

kind Regards,
Gav


   
Quote
(@jonathan)
Prominent Member
Joined: 20 years ago
Posts: 878
 

If brute force is the way to go - how forensically sound is that?

If you're an experienced examiner working on a copy of the file, not the original, and you document your steps to the extent that another examiner could repeat your results, then it would probably be regarded as admissible evidence.


   
ReplyQuote
Share: