Difference between revisions of "Stego Suite"

From Forensics Wiki
Jump to: navigation, search
(New page: '''Stego Suite™''' [https://www.wetstonetech.com/cgi/shop.cgi?view,1] == == Stego Suite is comprised of four specialized products: Stego Hunter™, Stego Watch™, Stego Analyst™...)
 
 
Line 1: Line 1:
'''Stego Suite™'''  [https://www.wetstonetech.com/cgi/shop.cgi?view,1]
+
'''Stego Suite™'''  [http://www.wetstonetech.com/cgi-bin/shop.cgi?view,1]
  
  
Line 9: Line 9:
 
'''Key Features:'''
 
'''Key Features:'''
  
Rapid identification of known steganography programs, Flag suspicious files through blind anomaly-based approach, State-of-the-art image and audio analyzer, Crack and extract payloads from carrier  
+
Rapid identification of known steganography programs, Flag suspicious files through blind anomaly-based approach, State-of-the-art image and audio analyzer, Crack and extract payloads from carrier, Court ready investigator reports, Scan audio files, JPG, BMP, GIF,  PNG and more
 +
  
  
 
'''filesSystem Recommendations:'''
 
'''filesSystem Recommendations:'''
  
Microsoft Windows® 98, 100 MB free disk space, 512 MB RAM, Pentium® III 1GHz processor
+
Microsoft Windows® 98 or higher, 100 MB free disk space, 512 MB RAM, Pentium® III 1GHz processor
  
  
 
'''License:'''
 
'''License:'''
  
Single user license allows for installation  of entire suite, Site licenses are available upon request, Court ready investigator reports, Scan audio files, JPG, BMP, GIF,  PNG and more
+
Single user license allows for installation  of entire suite, Site licenses are available upon request
 
+
  
  

Latest revision as of 13:32, 6 October 2009

Stego Suite™ [1]


Stego Suite is comprised of four specialized products: Stego Hunter™, Stego Watch™, Stego Analyst™, and Stego Break™. This comprehensive suite of applications is designed to quickly identify, examine and analyze digital images and/or audio files for the presence of hidden information or covert communication channels. Detecting the presence of steganography is a tedious process; without advanced tools it is close to impossible to detect. Using Stego Suite investigators are able to utilize the latest algorithms for flagging suspicious files through a blind anomaly-based approach, examine files with image filters, analyze DCT coefficient histograms, and track palette manipulation with close color pairs, shortening investigation time drastically and allowing investigators to work specifically within the four tools provided in the suite.


Key Features:

Rapid identification of known steganography programs, Flag suspicious files through blind anomaly-based approach, State-of-the-art image and audio analyzer, Crack and extract payloads from carrier, Court ready investigator reports, Scan audio files, JPG, BMP, GIF, PNG and more


filesSystem Recommendations:

Microsoft Windows® 98 or higher, 100 MB free disk space, 512 MB RAM, Pentium® III 1GHz processor


License:

Single user license allows for installation of entire suite, Site licenses are available upon request



Contact Information:

1-877-WETSTONE ext 2

www.wetstonetech.com [2]