Steganography
Analyzer Signature Scanner
Detect
files containing steganography and extract the hidden
information!
StegAlyzerSS
is a steganalysis tool designed to extend the scope of
traditional computer forensic examinations by allowing the
examiner to scan suspect media or forensic images of suspect
media for over 55 uniquely identifiable byte patterns, or
known signatures, left inside files when particular
steganography applications are used to embed hidden
information within them. Automated extraction algorithms
unique to StegAlyzerSS can be used to recover hidden
information.
StegAlyzerSS
extends the signature scanning capability by also allowing
the examiner to use more traditional blind detection
techniques for detecting whether information may be hidden
within potential carrier files.
Product
highlights in StegAlyzerSS:
Versions
available for both 32-bit and 64-bit forensic workstations
Case
generation and management
Mount
and scan forensic images of storage media in EnCase, ISO,
RAW (dd), SMART, SafeBack, Paraben Forensic Replicator, and
Paraben Forensic Storage formats
Automated
scanning of an entire file system, individual directories,
or individual files on suspect media for the presence of
steganography application signatures
Identify
files that have information appended beyond a file�s
end-of-file marker with the Append Analysis feature and
analyze the files in a hex editor view to determine the
nature of the hidden information
Identify
files that have information embedded using Least Significant
Bit (LSB) image encoding with the LSB Analysis feature and
extract and rearrange the LSBs for analysis in a hex editor
view to detect hidden information
Exclusive
Automated Extraction Algorithm functionality for selected
steganography applications gives examiners a
�point-click-and-extract� interface to easily extract
hidden information from suspect files
Extensive
report generation in HTML format
Automated
logging of key events and information of potential
evidentiary value
Export
session activity and evidence logs in comma separated value
(.csv) format
Integrated
help feature to explain specific features and functions
BENEFITS
Search
for signatures associated with over 55 steganography
applications
Scan
files to discover hidden information to use as evidence of
criminal activity that would have otherwise gone unnoticed
Discover
evidence of covert communications
Determine
if trusted insiders are using covert techniques to steal
sensitive and proprietary information
Enforce
organizational policy prohibiting use of digital
steganography or other data-hiding applications
Automated
Extraction Algorithms allow examiners to
�point-click-and-extract� hidden information, a feature
exclusive to StegAlyzerSS
|