Issues with Stegbre...
 
Notifications
Clear all

Issues with Stegbreak

5 Posts
5 Users
0 Reactions
1,535 Views
(@jegham)
Eminent Member
Joined: 18 years ago
Posts: 40
Topic starter  

Hi everybody ,

I used "jphide" to hide some data into a jpg file.
It worked fine…

But in order to seek the data ,jphide asks me to put my passphrase again.

In a case where i dont know the passphrase, i will have to use a brute force attack application.

Stegbreak is the only one that i found in order to use this attack on a jpg picture…but i keep having the same error… as many other people (while searching for a a solution)
Public bug reported

Binary package hint stegdetect

the package stegdetect installs a link in /etc/stegbreak/rules.ini
pointing to /usr/share/stegbreak/rules.ini but that file is missing.

Does anyone resolved this issue?
If not , is there any other reliable brute force attack that i can use?

Thanks


   
Quote
traknerud
(@traknerud)
Active Member
Joined: 18 years ago
Posts: 12
 

Try PRTK. I have used it with success on jphide before.


   
ReplyQuote
(@usama)
New Member
Joined: 17 years ago
Posts: 2
 

I had this issue before, I just moved the "rules.ini" file to the same folder where I have the stegbreak.exe, then use "-r" to point to the "rules.ini" file
e.g
stegbeak -r rules.ini -f words ,,,,,,
I believe you have to have to move the words file to the same folder as well


   
ReplyQuote
(@ams147)
Active Member
Joined: 16 years ago
Posts: 5
 

where did you find the words list for stegbreak?


   
ReplyQuote
(@darksyn)
Trusted Member
Joined: 17 years ago
Posts: 50
 

Couple of my students have had the same problem. I pointed them to dictionary files for aspell, and basically ANY txt files containing dictionaries for spell-checkers.

Also, check for password-cracking program wordlists.

A third idea is to just append a number of wordlist files into one big file, write a nice little perl script to throw out duplicate words and keep the resulting file.

Hope this helps.

Cheers
DarkSYN


   
ReplyQuote
Share: