Added thumbnails for JPGS

pull/14/head
John Hammond 2019-08-02 10:46:28 -04:00
parent 6b7518e789
commit 331c4bab49
1 changed files with 24 additions and 0 deletions

View File

@ -341,6 +341,12 @@ Steganography
Tabs and spaces could be representing 1's and 0's and treating them as a binary message... or, they could be whitespace done with [`snow`][snow] or an esoteric programming language interpreter: [https://tio.run/#whitespace](https://tio.run/#whitespace)
* Audio Speed Change (also change pitch)
```
mplayer -af scaletempo -speed 64 flag.mp3
```
* DNA Codes
When given a sequence with only A, C, G, T , there is an online mapping for these. Try this:
@ -348,6 +354,14 @@ Steganography
![img/dna_codes.png](img/dna_codes.png)
![img/genome_coding.jpg](img/genome-coding.jpg)
* Extract Thumbnail (data is covered in original image)
If you have an image where the data you need is covered, try viewing the thumbnail:
```
exiftool -b -ThumbnailImage my_image.jpg > my_thumbnail.jpg
```
* [`snow`][snow]
A command-line tool for whitespace steganography (see above).
@ -741,6 +755,16 @@ PNG File Forensics
A command-line tool for "checking" a [PNG] image file. Especially good for verifying checksums.
* [`pngcsum`](http://www.schaik.com/png/pngcsum/pngcsum-v01.tar.gz)
Correct the CRC on all of the parts of a [PNG] image file.
* [https://github.com/sherlly/PCRT](https://github.com/sherlly/PCRT)
Utility to try and correct a [PNG] file. **NOTE... this will NOT SAVE your file as new one. YOU HAVE TO SHOW the file (enter y when using the script]) to actually view the new image.**
APK Forensics
---------------