googleba88693c99e7e8ce.html
tel. 22 813 10 29 email: biuro@gravsoft.pl
pon-pt w godz. 8-16

Gravsoft informatyka śledcza

Home Informatyka śledcza - ForensicNarzędzia - analiza › StegoHunt™

StegoHunt™

Dostępny powyżej tygodnia
W magazynie: Dostępny (100 szt.)

StegoHunt™

StegoHunt™ is the industry's leading software tool for discovering the presence of data hiding activities. Recently included in the StegoHunt package are the additional analysis tools, StegoAnalyst™ and StegoBreak™. With this full suite of technologies, investigators, corporate auditors, incident responders, breach teams and data leak prevention users are able to quickly identify if steganography is present in active cases or in the work environment.

Why StegoHunt?

Cyber criminals are becoming increasingly proficient at covering their tracks and hiding incriminating data. With over 1,000 known methods of hiding data within images, audio files, digital video, network protocols and other digital carriers it has never been more important to discover these methods and artifacts. Recently, malware developers have been actively integrating data hiding capabilities into malicious code to create advanced persistent threats.

 

Get Certified:

StegoHunt

It couldn't be easier to get certified, join us for a 4 hour online Kick Start Training and Certification. For more information, please visit: /product/stegohunt/trainings/.

StegoHunt:

  • Quickly identify if steganography is present in your investigations by scanning for over 1,000 data hiding threat applications using Fibonacci search methods (desktop applications, smart mobile device apps, server based apps, source code)
  • Identify suspect carrier files that otherwise go un-detected (program artifacts, program signatures, statistical anomalies)
  • Generate case specific reports for management or court presentation
  • Operational discovery modes (directory, drive, archives, drive image, network path, live machine)

StegoAnalyst: Now Included!

  • Provide deep analysis for detected images and audio files of suspect nature.
  • Utilize the file viewing panel which displays the individual file (image, audio, wave and the file attributes including image details, DCT coefficients, and color pairs) allowing for a complete analysis of identified carriers.
  • Various filter options for further presentation and analysis to include Least Significant Bit (LSB's) of specific colors
  • Searchable HEX utility available for potential carrier file analysis

StegoBreak: Now Included!

  • Quickly and easily crack and extract payloads from carrier files with a simple point and click interface
  • Enjoy the popular password dictionaries included in order to execute a dictionary attack
  • Easily bring in other dictionaries as well as create your own to expand your dictionary attacks.

Specifications:

  • >200 MB's / sec on well-equipped platforms
  • OS Support (GUI + CMD Line)
  • Windows XP - 8;32 and 64 bit
  • Available in two forms.
    • Electronic Software Download (ESD) designed for lab use or
    • On an Encrypted FLASH device for mobile use


  • Brak komentarzy
Podobne w tej kategorii