Steganography Detection Across the Board
StegoCommand supports several “out-of-the-box” file types for scanning for the presence of steganography. In addition to the “out-of-the-box” file types offered, the WetStone Technologies research and development team can work directly with a customer to expand the capabilities to scan for steganography in unique, custom, proprietary or industry-specific file types.
StegoCommand has the ability to traverse an unlimited number of nested archive files. Nested archives are often used in an attempt to conceal the presence of data hiding. With StegoCommand, users can be assured that all files in an archive file will be analyzed for the presence of hidden data.
Features of StegoCommand
StegoCommand detects and provides comprehensive reports on:
- statistical anomalies
- structural anomalies
- the presence of misplaced binary or UTF-8 data
- data appending
- data prepending
- file name obfuscation
- the presence of unusual Unicode data
- Comprehensive reporting
StegoCommand is:
- Easily deployed in either on-premise or cloud-based environments
- Scalable to support analysis of very large files and very large data repositories
- Invoked via a command prompt or PowerShell
File Types supported by StegoHunt™ MP
- JPEG
- GIF
- BMP
- PNG
- ASCII (txt, csv, xml and html)
- Archive Files (includes but not limited to ZIP, TAR, JAR, APK, BZ2)
- HDF5
- NetCDF4
- BUFR
- NEXRAD
- HDF4
- HSD (Himawari)