Our Secret

From Just Solve the File Format Problem
(Difference between revisions)
Jump to: navigation, search
(Created page with "{{FormatInfo |formattype=electronic |subcat=Encryption |subcat2=Data Hiding/Embedding }} '''Our Secret''' by SecureKit (formerly '''Steganography''' by Pipisoft) secretly app...")
 
Line 19: Line 19:
  
 
== Links ==
 
== Links ==
 +
* [https://www.proquest.com/docview/1956791137 Forensic analysis of video steganography tools] - How to bypass password protection in 2.5.5
 +
* [http://www.cvedetails.com/cve/CVE-2007-0163 CVE-2007-0163 on how to bypass password protection in 1.7.1 and 1.8]
 
* [http://www.guillermito2.net/stegano/steganography/index.html Analysis of Steganography v1.5 and v1.6 and how to bypass its protections]
 
* [http://www.guillermito2.net/stegano/steganography/index.html Analysis of Steganography v1.5 and v1.6 and how to bypass its protections]
 
* [https://web.archive.org/web/20161203112635/http://securekit.net/oursecret.htm Archived Our Secret homepage]
 
* [https://web.archive.org/web/20161203112635/http://securekit.net/oursecret.htm Archived Our Secret homepage]

Revision as of 23:31, 7 October 2023

File Format
Name Our Secret
Ontology

Our Secret by SecureKit (formerly Steganography by Pipisoft) secretly appends files to the end of other files and can optionally password protect the resulting file.

In Steganography v1.5 it used a plain zip file.

In Steganography v1.6 it started obfuscating the zip file.

In both cases the password 'protection' was trivial to bypass.


Our secret.jpg


Links

Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox