Loading...
0  
$0.00
Your cart

You have no items in your shopping cart.

The product quantity has been updated
Show cart

 

StegoHunt

Be the first to review this product

$1,995.00

Availability: In stock

 

Description

StegoHunt™ is the industry's leading software tool for discovering the presence of data hiding activities. Recently included in the StegoHunt package are the additional analysis tools, StegoAnalyst™ and StegoBreak™. With this full suite of technologies, investigators, corporate auditors, incident responders, breach teams and data leak prevention users are able to quickly identify if steganography is present in active cases or in the work environment.

Why StegoHunt?

Cyber criminals are becoming increasingly proficient at covering their tracks and hiding incriminating data. With over 1,000 known methods of hiding data within images, audio files, digital video, network protocols and other digital carriers it has never been more important to discover these methods and artifacts. Recently, malware developers have been actively integrating data hiding capabilities into malicious code to create advanced persistent threats.

 

StegoHunt:

  • Quickly identify if steganography is present in your investigations by scanning for over 1,000 data hiding threat applications using Fibonacci search methods (desktop applications, smart mobile device apps, server based apps, source code)
  • Identify suspect carrier files that otherwise go un-detected (program artifacts, program signatures, statistical anomalies)
  • Generate case specific reports for management or court presentation
  • Operational discovery modes (directory, drive, archives, drive image, network path, live machine)

StegoAnalyst: Now Included!  

  • Provide deep analysis for detected images and audio files of suspect nature.
  • Utilize the file viewing panel which displays the individual file (image, audio, wave and the file attributes including image details, DCT coefficients, and color pairs) allowing for a complete analysis of identified carriers.
  • Various filter options for further presentation and analysis to include Least Significant Bit (LSB's) of specific colors
  • Searchable HEX utility available for potential carrier file analysis

StegoBreak: Now Included!

  • Quickly and easily crack and extract payloads from carrier files with a simple point and click interface
  • Enjoy the popular password dictionaries included in order to execute a dictionary attack
  • Easily bring in other dictionaries as well as create your own to expand your dictionary attacks.

Specifications:

  • >200 MB's / sec on well-equipped platforms
  • OS Support (GUI + CMD Line)
  • Windows XP - 7;32 and 64 bit
  • Available in two forms.
    • Electronic Software Download (ESD) designed for lab use or
    • On an Encrypted FLASH device for mobile use

Technical Specs

Accessories

Downloads

Guides

 

If you would like to request information on multiple products, please use the add to quote button located on each product page and submit by clicking the quote request link in the menu.

 

If you would like more information about this product, please contact us and a sales representative will get back to you within 48 hours.

Request Additional Information

* Required Fields