Skip to content

This script automates the process of extracting hidden data from files using 'steghide,' streamlining digital forensic investigations."

Notifications You must be signed in to change notification settings

N-r0bin/steghide-extractor

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

steghide-extractor

Overview

This script automates the process of extracting hidden data from files using steghide. During my Introduction to Digital Forensics course by Security Blue Team, I found it tedious to run steghide commands manually for each file and password. To save time, I created this Bash script to streamline the process.

I developed extract_flags.sh specifically for the Stenography Activity in the course that required me to try 3 different passwords on 7 files to find the flags. Then I realised I would have a more enhanced version so I could use it whenever I felt it would save me more time so I developed extract_steghide.sh; which allows users to:

  • Specify the directory containing the files to analyze.
  • Use custom password lists or fallback to default ones.
  • Displays the content of extracted files.

Features

  1. Batch processing of files in a directory.
  2. Multiple passwords are tried for each file.
  3. Logs the success or failure of extraction attempts.
  4. Displays the content of extracted files automatically.

Usage

Prerequisites

Ensure steghide is installed on your system:

sudo apt install steghide

Running the Script:

1. Clone the repository:

git clone https://github.com/N-r0bin/steghide-extractor.git
cd steghide-extractor-main

2. Make the script executable:

chmod +x extract_steghide.sh

3. Execute the script:

  • To process files in the current directory with default passwords:
./extract_steghide.sh .
  • To specify a directory and custom passwords:
./extract_steghide.sh /path/to/directory "password1,password2,password3"

Example:

./extract_steghide.sh ~/Downloads "password123,letmein,opensesame"

Notes:

  • If no directory is specified, the script will process the current directory (.).
  • If no passwords are specified, it will use the default list: christmastree, darksky123, goldenwatch.

Screenshots of how I utilized the bash scripts while investigating:

  1. I utilized extract_flags.sh in the Steganography Activity:

1st ectraction 2nd extraction 3rdextraction

  1. I utilized extract_steghide.sh in the Capstone of the Introduction to Digital Forensics course by the Security Blue Team:

capstone-extract-result

About

This script automates the process of extracting hidden data from files using 'steghide,' streamlining digital forensic investigations."

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages