LinuxCommandLibrary

zsteg

Detect steganography in PNG and BMP images

TLDR

Analyze image

$ zsteg [image.png]
copy
Check all channels
$ zsteg -a [image.png]
copy
Extract specific data
$ zsteg -E "[b1,rgb,lsb]" [image.png]
copy
Verbose output
$ zsteg -v [image.png]
copy
Check BMP file
$ zsteg [image.bmp]
copy
Limit output
$ zsteg --limit [1000] [image.png]
copy

SYNOPSIS

zsteg [-a] [-v] [-E extract] [options] image

DESCRIPTION

zsteg detects and extracts data hidden through steganography in PNG and BMP image files. It analyzes multiple color channels (RGB, alpha, and individual colors) across various bit depths to identify concealed content such as text, embedded files, and binary patterns.
The tool's primary focus is LSB (Least Significant Bit) steganography, where data is hidden in the least significant bits of pixel color values. The -a flag performs a comprehensive check across all common methods and channel combinations, while the -E flag extracts data from a specific channel and bit configuration.
zsteg is widely used in CTF (Capture The Flag) competitions for solving steganography challenges and in forensic analysis of suspicious image files. It is written in Ruby.

PARAMETERS

-a, --all

Check all methods.
-v, --verbose
Verbose output.
-E SPEC
Extract data.
--limit N
Output limit.
-o FILE
Output file.
--bits BITS
Bits to check.
--order ORDER
Bit order.

CAVEATS

PNG and BMP only. False positives possible. Requires Ruby.

HISTORY

zsteg was created for CTF competitions and steganography analysis. It provides quick detection of hidden image data.

SEE ALSO

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community