<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: R4yan</title>
    <description>The latest articles on Forem by R4yan (@r4ygm).</description>
    <link>https://forem.com/r4ygm</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F493705%2Fae5da5ac-e43f-42a1-9a7a-c431f04d71f8.jpeg</url>
      <title>Forem: R4yan</title>
      <link>https://forem.com/r4ygm</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/r4ygm"/>
    <language>en</language>
    <item>
      <title>stegbrute - Fast Steganography brute-force tool</title>
      <dc:creator>R4yan</dc:creator>
      <pubDate>Mon, 19 Oct 2020 21:31:47 +0000</pubDate>
      <link>https://forem.com/r4ygm/stegbrute-fast-steganography-brute-force-tool-535k</link>
      <guid>https://forem.com/r4ygm/stegbrute-fast-steganography-brute-force-tool-535k</guid>
      <description>&lt;p&gt;stegbrute - stands for steganography and bruteforce is a fast and simple steganography brute-force tool written in rust very useful in ctf challanges&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to use it&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;First of all you need to download the program, you can download it in 4 ways they are all documentated in the &lt;a href="https://github.com/R4yGM/stegbrute#installation" rel="noopener noreferrer"&gt;Github repository&lt;/a&gt; or just download them from the &lt;a href="https://github.com/R4yGM/stegbrute/releases" rel="noopener noreferrer"&gt;releases section&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;now that you have stegbrute installed run it with -h or — help option, this is what you should see&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;

&lt;span class="o"&gt;============================================================&lt;/span&gt;
     ____  _             ____             _
    / ___|| |_ ___  __ _| __ &lt;span class="o"&gt;)&lt;/span&gt; _ __ _   _| |_ ___
    &lt;span class="se"&gt;\_&lt;/span&gt;__ &lt;span class="se"&gt;\|&lt;/span&gt; __/ _ &lt;span class="se"&gt;\/&lt;/span&gt; _&lt;span class="sb"&gt;`&lt;/span&gt; |  _ &lt;span class="se"&gt;\|&lt;/span&gt; &lt;span class="s1"&gt;'__| | | | __/ _ \
     ___) | ||  __/ (_| | |_) | |  | |_| | ||  __/
    |____/ \__\___|\__, |____/|_|   \__,_|\__\___|
                   |___/

StegBrute v0.1.1 - By R4yan
https://github.com/R4yGM/StegBrute

StegBrute 0.1.1
R4yan &amp;lt;yessou.rayan@gmail.com&amp;gt;
Steganography bruteforce tool

USAGE:
    stegbrute [FLAGS] [OPTIONS] --file-name &amp;lt;file-name&amp;gt; --wordlist &amp;lt;wordlist&amp;gt;

FLAGS:
    -h, --help       Prints help information
    -V, --version    Prints version information
    -v, --verbose    shows every try the program does

OPTIONS:
    -x, --extract-file &amp;lt;extract-file&amp;gt;    the file name path where you want to write the results [default:
                                         stegbrute_results.txt]
    -f, --file-name &amp;lt;file-name&amp;gt;          the file name path you want to crack
    -t, --threads &amp;lt;threads&amp;gt;              number of threads to bruteforce the file [default: 3]
    -w, --wordlist &amp;lt;wordlist&amp;gt;            path of the wordlist
```
now you can crack any image!,

example on how to use stegbrute

stegbrute -f image.jpg -w wordlist.txt -x results.txt

where -f is the file you want to crack, -w is the wordlist (a big list of passwords), -x is where you want to save your results, output :
```bash
============================================================
     ____  _             ____             _
    / ___|| |_ ___  __ _| __ ) _ __ _   _| |_ ___
    \___ \| __/ _ \/ _` |  _ \| '&lt;/span&gt;__| | | | __/ _ &lt;span class="se"&gt;\&lt;/span&gt;
     ___&lt;span class="o"&gt;)&lt;/span&gt; | &lt;span class="o"&gt;||&lt;/span&gt;  __/ &lt;span class="o"&gt;(&lt;/span&gt;_| | |_&lt;span class="o"&gt;)&lt;/span&gt; | |  | |_| | &lt;span class="o"&gt;||&lt;/span&gt;  __/
    |____/ &lt;span class="se"&gt;\_&lt;/span&gt;_&lt;span class="se"&gt;\_&lt;/span&gt;__|&lt;span class="se"&gt;\_&lt;/span&gt;_, |____/|_|   &lt;span class="se"&gt;\_&lt;/span&gt;_,_|&lt;span class="se"&gt;\_&lt;/span&gt;_&lt;span class="se"&gt;\_&lt;/span&gt;__|
                   |___/StegBrute v0.1.1 - By R4yan
https://github.com/R4yGM/StegBruteBruteforcing the file &lt;span class="s1"&gt;'image.jpg'&lt;/span&gt; with the wordlist &lt;span class="s1"&gt;'wordlist.txt'&lt;/span&gt; using 3 threads
&lt;span class="o"&gt;(&lt;/span&gt;thread-0&lt;span class="o"&gt;)&lt;/span&gt; Failed to crack the file, finished the passwords 178.02ms
&lt;span class="o"&gt;(&lt;/span&gt;thread-2&lt;span class="o"&gt;)&lt;/span&gt; Failed to crack the file, finished the passwords 284.84ms
password try: cool123 - Success
File extracted!
Password: cool123
Results written &lt;span class="k"&gt;in&lt;/span&gt;: results.txt
Tried passwords : 62
Successfully cracked &lt;span class="k"&gt;in &lt;/span&gt;499.64ms
&lt;span class="o"&gt;============================================================&lt;/span&gt;


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;it’s pretty fast, stegbrute tried 62 passords in half a second! as you can see it also shows the status of every thread&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Comparision&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I saw around also stegcracker wich is also a great program so i tried to compare it to stegbrute, and these are the results:&lt;/p&gt;

&lt;p&gt;stegcracker :&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;

&lt;span class="c"&gt;# time stegcracker image.jpg wordlist.txt | grep -E "real|user|sys"real    0m1.754s&lt;/span&gt;
user    0m0.420s
sys     0m0.362s


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;stegbrute :&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;

&lt;span class="c"&gt;# time stegbrute -f image.jpg -w wordlist.txt | grep -E "real|user|sys"real    0m0.553s&lt;/span&gt;
user    0m0.366s
sys     0m0.460s


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;this says that stegbrute is more faster than stegcracker (i also tried to compare using other large wordlists)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Benchmark&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I also made a benchmark of stegrute using different large wordlists i found on the internet&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fmiro.medium.com%2Fmax%2F300%2F1%2AxFFFgNagmWfTyk1zRvaE-Q.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fmiro.medium.com%2Fmax%2F300%2F1%2AxFFFgNagmWfTyk1zRvaE-Q.png"&gt;&lt;/a&gt;&lt;br&gt;
the table can be found &lt;a href="https://github.com/R4yGM/stegbrute#benchmark" rel="noopener noreferrer"&gt;here&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;these values ​​of course can vary on due to your machine power&lt;/p&gt;

</description>
      <category>rust</category>
      <category>showdev</category>
      <category>hacktoberfest</category>
      <category>security</category>
    </item>
  </channel>
</rss>
