StegoHunt

StegoHunt is an industry-leading software tool, comprising the StegoAnalyst and StegoBreak tools, which can be used to discover the presence of hidden data activity in files and applications.

  • Quickly identify data obfuscation activity in an investigation by scanning files, captured memory images, and, for active systems, active processes;
  • Find evidence of steganography programs using YARA WetStone rules and hash sets provided in the monthly dataset releases;
  • Identify suspicious carrier files by detecting program data, signatures, and structural and static anomalies;
  • Use multiple operational discovery modes for transport file discovery, including directories, drives, files, and drive images;
  • Relate and capture evidence for presentations to management or the court.


Segmento

Principais features

Detecção de Esteganografia
Análise de Imagens
Extração de Dados Ocultos
Relatórios de Segurança
Interface Intuitiva

Descripción completa

Request a quote

Why StegoHunt?

Cybercriminals are becoming increasingly adept at covering their tracks and hiding incriminating data. With more than 1,000 known methods for hiding data in images, audio files, digital video, network protocols, and other digital media, uncovering these methods and artifacts has never been more important. Recently, malware developers have integrated the ability to hide data into malicious code to create advanced persistent threats.

With this comprehensive suite of technologies, investigators, corporate auditors, incident responders, white-collar crime teams, and data loss prevention users can quickly identify whether steganography is present in active cases or in the workplace.

StegoBreak opens and extracts streaming payloads from payload files with a simple click-and-bridge interface. Find popular password dictionaries included to perform a dictionary attack and easily incorporate other dictionaries, as well as create your own to extend your dictionary attacks.

The StegoAnalyst tool provides in-depth analysis of locked images and audio files. Use the file preview panel to view individual attributes (image details, DCT coefficients, core pairs). This allows for a comprehensive analysis of identified vehicles. Several filter options are available for further analysis, such as the Least Significant Bit (LSB) of specific cores.

Quickly identify if steganography is present in your investigations by scanning over 1,000 applications that hide data threats using Fibonacci search methods (desktop applications, smart mobile applications, server-based applications, source code)

Find suspicious files that would otherwise go unnoticed (program artifacts, program signatures, statistical anomalies)

Generate specific reports for case management or court presentation.

Operational discovery modes (directory, drive, files, drive image, network path, live machine)

System Requirements

  • To support StegoHunt, a computer system must meet or exceed the following minimum requirements:
  • Microsoft Windows 2000, Windows XP, Windows Vista, Windows 2003 Server, Windows 7, Windows 8, Windows 2008 Server
  • 1 GB of RAM
  • 1 GHz Pentium processor or higher


Request a quote

By clicking "Submit," you agree to allow Software.com.br to contact you using the information provided to send quotes and communications related to your order. For more details on how we protect and use your data, please see our Privacy Policy. Política de privacidad y Términos de uso

Productos relacionados

Clearswift SECURE Email Gateway

Manufacturer

By clicking "Submit," you agree to allow Software.com.br to contact you using the information provided to send quotes and communications related to your order. For more details on how we protect and use your data, please see our Privacy Policy. Política de privacidad y Términos de uso

en_US