Direct Link
http://homepage.mac.com/adonismac/Advisory/steg/steganography.html
A Major design Bug in Steganography 1.7.x, 1.8 (latest)
This material is presented for informational purposes ONLY. I do not condone or encourage vandalism or theft.
I do not accept any liability for anything anyone does with this information. So, don't shoot the messenger.
Remember: Use a computer in ways that ensure respect for your fellows.
Adonis a.K.a. NtWaK0
Abed a.K.a. NoPh0BiA
Steganography 1.7.1 and 1.8 (latest).
http://www.securekit.com/hidefiles.htm
Type: Very Bad Design
Date: 01/07/2007
Cracking encrypted (steganography application 1.7.x 1.8) files without any bruteforce.
WHY LOSING TIME ON MATH AND BRUTEFORCE WHEN YOU CAN PLAY WITH YOUR HEX EDITOR :-).
Firstly, computer forensic investigators can take advantage of this bug to access file protected with (steganography application 1.7.x 1.8) without the knowledge of the original password. Now it is time to check your cold cases for steganography files.
You can crack (steganography application 1.7.x 1.8) encrypted files very easy, in fact in less than two minute. The problem is similar to the bug I found in PGP last year.
(steganography application 1.7.x 1.8) leave a footprint after you stag a file. If you look at the end of your stagged file you will notice it will end with 30 00 0X FF FF. So a simple HEX search will reveal all stagged files.
So now we have identified the stagged file our next step is to access the HIDDEN messages or files without cracking the password, here is how.
For screen capture please check http://homepage.mac.com/adonismac/Advisory/steg/steganography.html
Step 01
Step02
To access the hidden message WITHOUT the original password "aaaaaa" we will do the followings:
Simple hein !!!
Peace to you all
Copyright © 2007 Adonis a.K.a NtWaK0