exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 3 of 3 RSS Feed

Files

Camou121.exe
Posted Oct 23, 2004

Camouflage v1.2.1 is an incredibly weak steganography tool for Windows. It can use various image files and doc files as a carrier to hide arbitrary data inside of. It has been broken by a number of researchers, so you would be pretty stupid to use it. See here.

tags | arbitrary, encryption, steganography
systems | windows
SHA-256 | faccf08df223865d232691f8475db7b818246a228b6c4a312c75a7121086a632
CKFP.zip
Posted Oct 23, 2004
Authored by vikt0ry | Site vikt0ry.com

This is a Windows program that "unprotects" files which have been hidden using a steganography program called Camouflage. If the Camouflage'd file requires a password, the password is reset to nothing.

tags | encryption, steganography
systems | windows
SHA-256 | 2a5520ed6c0e2c104c405fe6c4bdf3b330cb557d4abd1af0cb69794992420b74
SetecAstronomy.pl
Posted Oct 23, 2004
Authored by Andrew Christensen

This is a Perl script that can search files to identify whether data has been hi dden using a weak steganography tool for Windows named Camouflage. If Camouflage has been used, it prints the approximate amount of hidden data, and says how many hidden files there are. If a password was used to "protect" the hidden data, the password is printed out. It has been tested against .doc carrier files, and tested against Camouflage v1.2.1. It also saves an unprotected version of the file with a different name.

tags | perl, encryption, steganography
systems | windows
SHA-256 | 1e41627ee891f89cb5aa1c4e441cd1ec6065587fedf8c8f504930887f92bb62a
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close