Hi everybody ,
I used "jphide" to hide some data into a jpg file.
It worked fine…
But in order to seek the data ,jphide asks me to put my passphrase again.
In a case where i dont know the passphrase, i will have to use a brute force attack application.
Stegbreak is the only one that i found in order to use this attack on a jpg picture…but i keep having the same error… as many other people (while searching for a a solution)
Public bug reported
Binary package hint stegdetect
the package stegdetect installs a link in /etc/stegbreak/rules.ini
pointing to /usr/share/stegbreak/rules.ini but that file is missing.
Does anyone resolved this issue?
If not , is there any other reliable brute force attack that i can use?
Thanks
Try PRTK. I have used it with success on jphide before.
I had this issue before, I just moved the "rules.ini" file to the same folder where I have the stegbreak.exe, then use "-r" to point to the "rules.ini" file
e.g
stegbeak -r rules.ini -f words ,,,,,,
I believe you have to have to move the words file to the same folder as well
where did you find the words list for stegbreak?
Couple of my students have had the same problem. I pointed them to dictionary files for aspell, and basically ANY txt files containing dictionaries for spell-checkers.
Also, check for password-cracking program wordlists.
A third idea is to just append a number of wordlist files into one big file, write a nice little perl script to throw out duplicate words and keep the resulting file.
Hope this helps.
Cheers
DarkSYN