Our Secret

From Just Solve the File Format Problem
(Difference between revisions)
Jump to: navigation, search
(Created page with "{{FormatInfo |formattype=electronic |subcat=Encryption |subcat2=Data Hiding/Embedding }} '''Our Secret''' by SecureKit (formerly '''Steganography''' by Pipisoft) secretly app...")
 
 
(One intermediate revision by one user not shown)
Line 19: Line 19:
  
 
== Links ==
 
== Links ==
 +
* [https://www.proquest.com/docview/1956791137 Forensic analysis of video steganography tools] ([https://www.researchgate.net/publication/345803203_Forensic_analysis_of_video_steganography_tools mirror]) - How to bypass password protection in v2.5.5
 +
* [http://www.cvedetails.com/cve/CVE-2007-0163 CVE-2007-0163] - How to bypass password protection in v1.7.1 and v1.8
 
* [http://www.guillermito2.net/stegano/steganography/index.html Analysis of Steganography v1.5 and v1.6 and how to bypass its protections]
 
* [http://www.guillermito2.net/stegano/steganography/index.html Analysis of Steganography v1.5 and v1.6 and how to bypass its protections]
 
* [https://web.archive.org/web/20161203112635/http://securekit.net/oursecret.htm Archived Our Secret homepage]
 
* [https://web.archive.org/web/20161203112635/http://securekit.net/oursecret.htm Archived Our Secret homepage]

Latest revision as of 23:58, 7 October 2023

File Format
Name Our Secret
Ontology

Our Secret by SecureKit (formerly Steganography by Pipisoft) secretly appends files to the end of other files and can optionally password protect the resulting file.

In Steganography v1.5 it used a plain zip file.

In Steganography v1.6 it started obfuscating the zip file.

In both cases the password 'protection' was trivial to bypass.


Our secret.jpg


[edit] Links

Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox