Skip to main content

No project description provided

Project description

camouflage-decryptor

PyPI - Version PyPI - Python Version


This is a tool to extract information from files that have been generated with camouflage.

Table of Contents

Installation

pip install camouflage-decryptor

Usage

This tool provides different tools for analyzing a file that has been generated with camouflage. This includes the following:

Command Line Help

For the tool and all its subcommands, help can be retrieved by calling the tool with the --help flag:

camouflage-decryptor --help

Metadata retrieval

To retrieve all the camouflage metadata from a prepared file the following command can be used:

camouflage-decryptor get-info camouflaged-file.jpg

The output will look similar to this one:

File Name Carrier:             normal_file.png
File Name Secret:              secret.txt
Size secret file:              4.00 B
File size unmodified carrier:  4.00 B
Camouflage Version:            v1.2.1
Password:                      very-secret-password

'Carrier' refers to the file that has been used to hide the secret file. 'Secret' refers to the file that has been hidden in the carrier file.

Password retrieval

To get the password only from a stego file:

camouflage-decryptor get-key my-stego-file.jpg

Secret file retrieval

To retrieve the secret file from a stego file and save it to a file (here: secret.txt):

camouflage-decryptor get-data my-stego-file.jpg > secret.txt

This solution only works on Linux and Mac OS X. On Windows, the following command can be used:

python -m camouflage-decryptor get-data my-stego-file.jpg | Out-File -Encoding utf8 secret.txt

Get unmodified carrier file

To get the unmodified carrier file from a stego file (-> remove the part added by camouflage) and save it to a file (here: carrier.png):

camouflage-decryptor get-original camouflaged-carrier.png > carrier.png

This solution only works on Linux and Mac OS X. On Windows, the following command can be used:

python -m camouflage-decryptor get-original camouflaged-carrier.png | Out-File -Encoding utf8 carrier.png

Advanced: Generate own static key file for larger files

The tool is able to decrypt files up to 10MB using an embedded key. For larger files up to 1GB a static key is downloaded to decrypt the file. For larger files or to avoid the download of the static key, a custom static key can be supplied.

A 1GB key can be downloaded from the releases for offline use: https://github.com/anjomro/camouflage-decryptor/releases/download/v0.3.0/STATIC_KEY_1GB

A larger key can be obtained using the following steps:

  • Setup a virtual machine using Windows XP
  • Download camouflage and install it on the virtual machine
    • Download camouflage from here: http://camouflage.unfiction.com/
    • Transfer the downloaded file to the virtual machine via the shared folder
    • Install camouflage on the virtual machine
  • Create a payload with the intended size
    • This can be done using the camouflage-decryptor tool:
    • camouflage-decryptor dev generate-test-payload 2GB > PAYLOAD_2GB.txt
    • This will create a file with the size of 2GB. Adapt the size to your needs.
  • Transfer the payload to the virtual machine
    • This can be done using the shared folder
  • Create a stego file using camouflage
    • Find a carrier file (a file to hide the payload in)
      • Ideally this file should be small to avoid unneccecary resource consumption
      • Any random file will do
      • If no file is at hand, just create a small text file
    • Right click on the generated payload file and select the Camouflage Option
    • Click Next
    • For the field Camouflage using select the previously selected carrier file
    • For the field Create This File select a sensible file name, e.g camouflaged_2GB.txt and remove the read only checkmark
    • You can leave the password field empty, but it also doesn't matter if you do set a password
  • Extract the static key from the file treated with Camouflage
    • Use the camouoflage-decryptor tool to extract the static key
    • camouflage-decryptor dev extract-static-key path/to/camouflaged_2GB.txt > save/path/STATIC_KEY_2GB
    • Adapt the paths to the location and the location you want to save the static key

Advanced: Use a custom static key to decrypt a file

If you want to use a custom static key to decrypt a file you can use it using the following syntax:

CAMOUFLAGE_DECRYPTOR_KEY=/path/to/static/key.bin camouflage-decryptor get-data my-stego-file.jpg > secret.txt

It is necessary to use an absolute path to the static key.

To avoid prefixing every command, you can also set the static key for your session:

export CAMOUFLAGE_DECRYPTOR_KEY=/path/to/static/key.bin

After setting the key location once, you can then use the tool as usual:

camouflage-decryptor get-data my-stego-file.jpg > secret.txt

Both methods work with all functionality that requires a static key.

To obtain a static key see the section above.

Usage on Windows

For all presented commands, you might need to use the following syntax to call the script, e.g. if on Windows:

python -m camouflage_decryptor get-key my-stego-image.jpg

License

camouflage-decryptor is distributed under the terms of the EUPL-1.2 license.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

camouflage_decryptor-0.3.4.tar.gz (32.9 MB view details)

Uploaded Source

Built Distribution

camouflage_decryptor-0.3.4-py3-none-any.whl (12.0 MB view details)

Uploaded Python 3

File details

Details for the file camouflage_decryptor-0.3.4.tar.gz.

File metadata

  • Download URL: camouflage_decryptor-0.3.4.tar.gz
  • Upload date:
  • Size: 32.9 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/4.0.2 CPython/3.11.4

File hashes

Hashes for camouflage_decryptor-0.3.4.tar.gz
Algorithm Hash digest
SHA256 4889e21cbcccba72ddd63fca04da4226d6b6faf1c03b6bd980abf2050e557420
MD5 a1dba551c23162d72dd822ec8d8ceb61
BLAKE2b-256 c77d9e81d015fd13add78a970b9a59267ad818e1a7dd51dedd5d9ae36c965aa4

See more details on using hashes here.

File details

Details for the file camouflage_decryptor-0.3.4-py3-none-any.whl.

File metadata

File hashes

Hashes for camouflage_decryptor-0.3.4-py3-none-any.whl
Algorithm Hash digest
SHA256 b6740ce327b7aced3ced789d508850d8f0f69344ca6dd52a7663de176b44ede5
MD5 69fc62fca2f0934e6edc935f4970054b
BLAKE2b-256 e9eefe503c88a6da658a4bceb2c9527b7790818661b4bc97fd638ec2c2ecf47f

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page