Yet another Stego Tool
$ pip3 install stegoveritas
$ stegoveritas_install_deps
stegoveritas_install_deps
currently supports: ubuntu, debian, kali, parrotOS, fedora, archlinux and MacOS.
$ sudo docker run -it --rm bannsec/stegoveritas
Option 3 -- BlackArch
$ sudo pacman -S stegoveritas
StegoVeritas has default actions for most image types (gif,jpeg,png,tiff,bmp) and will attempt to run on any file.
stegoveritas <file>
If you want to do something specific, you can check out the help:
stegoveritas -h
usage: stegoveritas [-h] [-out dir] [-debug] [-password PASSWORD]
[-wordlist WORDLIST] [-meta] [-imageTransform]
[-bruteLSB] [-colorMap [N [N ...]]]
[-colorMapRange Start End] [-extractLSB]
[-red index [index ...]] [-green index [index ...]]
[-blue index [index ...]] [-alpha index [index ...]]
[-extract_frames] [-trailing] [-steghide] [-exif]
[-xmp] [-carve] [-steghide]
file
Yet another Stego tool
positional arguments:
file The file to analyze
optional arguments:
-h, --help show this help message and exit
-out dir Directory to place output in. Defaults to ./results
-debug Enable debugging logging.
-password PASSWORD When applicable, attempt to use this password to
extract data.
-wordlist WORDLIST When applicable, attempt to brute force with this
wordlist.
image options:
-meta Check file for metadata information
-imageTransform Perform various image transformations on the input
image and save them to the output directory
-bruteLSB Attempt to brute force any LSB related steganography.
-colorMap [N [N ...]]
Analyze a color map. Optional arguments are colormap
indexes to save while searching
-colorMapRange Start End
Analyze a color map. Same as colorMap but implies a
range of colorMap values to keep
-extractLSB Extract a specific LSB RGB from the image. Use with
-red, -green, -blue, and -alpha
-red index [index ...]
-green index [index ...]
-blue index [index ...]
-alpha index [index ...]
-extract_frames Split up an animated gif into individual frames.
-trailing Check for trailing data on the given file
-steghide Check for StegHide hidden info.
multi options:
-exif Check this file for exif information.
-xmp Check this file for XMP information.
-carve Attempt to carve/extract things from this file.
Have a good example? Wish it did something more? Submit a ticket:
https://github.com/bannsec/stegoVeritas