please wait
 
close window
top menu - tab edge
Home      members Customer Portal     corporate Corporate     partners Partners
Partners
Testimonials
Reseller Application
Map and Directions
StegoHunt
StegoHunt™ is the industry's leading software tool for discovering the presence of data hiding activities. Recently included in the StegoHunt package are the additional analysis tools, StegoAnalyst™ and StegoBreak™. With this full suite of technologies, investigators, corporate auditors, incident responders, breach teams and data leak prevention users are able to quickly identify if steganography is present in active cases or in the work environment.

Why StegoHunt?

Cyber criminals are becoming increasingly proficient at covering their tracks and hiding incriminating data. With over 1,000 known methods of hiding data within images, audio files, digital video, network protocols and other digital carriers it has never been more important to discover these methods and artifacts. Recently, malware developers have been actively integrating data hiding capabilities into malicious code to create advanced persistent threats.

 

Get Certified:

StegoHunt

 


It couldn't be easier to get certified, join us for a 4 hour online Kick Start Training and Certification. For more information, please visit: /product/stegohunt/trainings/.

 

 


StegoHunt:

  • Quickly identify if steganography is present in your investigations by scanning for over 1,000 data hiding threat applications using Fibonacci search methods (desktop applications, smart mobile device apps, server based apps, source code)
  • Identify suspect carrier files that otherwise go un-detected (program artifacts, program signatures, statistical anomalies)
  • Generate case specific reports for management or court presentation
  • Operational discovery modes (directory, drive, archives, drive image, network path, live machine)

StegoAnalyst: Now Included!

  • Provide deep analysis for detected images and audio files of suspect nature.
  • Utilize the file viewing panel which displays the individual file (image, audio, wave and the file attributes including image details, DCT coefficients, and color pairs) allowing for a complete analysis of identified carriers.
  • Various filter options for further presentation and analysis to include Least Significant Bit (LSB's) of specific colors
  • Searchable HEX utility available for potential carrier file analysis

StegoBreak: Now Included!

  • Quickly and easily crack and extract payloads from carrier files with a simple point and click interface
  • Enjoy the popular password dictionaries included in order to execute a dictionary attack
  • Easily bring in other dictionaries as well as create your own to expand your dictionary attacks.

Specifications:

  • >200 MB's / sec on well-equipped platforms
  • OS Support (GUI + CMD Line)
  • Windows XP - 8;32 and 64 bit
  • Available in two forms.
    • Electronic Software Download (ESD) designed for lab use or
    • On an Encrypted FLASH device for mobile use
Overview
Demo Video
Lab Sessions
Academic Program

Awards

George Mason Cybersecurity Innovation Forum: Steganography and the evolving threat of Data Hiding

DFI News Digital Magazine: Discovering The Hidden, The Future of Steganography

Steganography and Smart Phones

Operation Shady Rat: Attackers used steganography to hide commands controlling infected machines

Alueron Trojan uses steganography

Russian Spy Case Shines Light on Steganogaphy

Steganography: Deciphering Hidden Messages

 

Download StegoHunt Datasheet

Download StegoFlash Datasheet


Training Class Policy