JPegX
Parchivist (Talk | contribs) (Created page with "{{FormatInfo |formattype=electronic |subcat=Encryption |subcat2=Data Hiding/Embedding |released=2001 }} '''JPegX''' by Lawrence Kom is a 32-bit Windows program that functions...") |
Parchivist (Talk | contribs) |
||
Line 8: | Line 8: | ||
'''JPegX''' by Lawrence Kom is a 32-bit Windows program that functions like a generic appender, but is limited to encrypted text messages in [[JPEG]] files. | '''JPegX''' by Lawrence Kom is a 32-bit Windows program that functions like a generic appender, but is limited to encrypted text messages in [[JPEG]] files. | ||
− | v1. | + | v1.00.6 - Employs a trivial encryption algorithm. Specifically the embedded encrypted data is appended to the file in a consistent and easily identifiable manner. The data is encrypted using the sum of the ASCII characters in the password as a substitution key. The key is then added (with a carry if there is one) to the original character, the key is incremented and added to the next character and so on until the process is complete. If no password is used the byte value of the first ASCII character of the data supplied is added (with a carry if there is one) to 187. The second character added to 188 and so on incrementally until the operation is complete. |
v2.0.3 - New format to address issues with v1 format, but when using the JpegX wizard to decrypt and no password credentials are supplied, files will be deciphered regardless. | v2.0.3 - New format to address issues with v1 format, but when using the JpegX wizard to decrypt and no password credentials are supplied, files will be deciphered regardless. | ||
Line 17: | Line 17: | ||
== Links == | == Links == | ||
− | * [https://web.archive.org/web/20040502022908/http://www.nerdlogic.org/jpegx/about.html | + | * [https://web.archive.org/web/20040502022908/http://www.nerdlogic.org/jpegx/about.html Homepage (archived)] |
+ | * [https://web.archive.org/web/20041015211027/http://www.freewebz.com/dufus/jpgx.html Older homepage (archived) | ||
* [https://web.archive.org/web/20050210101357/http://www.nerdlogic.org/jpegx/ v2.1.1 Download] | * [https://web.archive.org/web/20050210101357/http://www.nerdlogic.org/jpegx/ v2.1.1 Download] | ||
+ | * [https://web.archive.org/web/20020215184539/http://www.freewebz.com:80/dufus/file/jpgx.exe v1.00.6 Download] | ||
* [https://web.archive.org/web/20021015224044/http://www.nerdlogic.org/jpegx/old/jpgx.html Quick Help File] | * [https://web.archive.org/web/20021015224044/http://www.nerdlogic.org/jpegx/old/jpgx.html Quick Help File] | ||
* [http://www.guillermito2.net/stegano/jpegx/index.html Analysis of v1 format and JPegX Hidden Text Finder utility] | * [http://www.guillermito2.net/stegano/jpegx/index.html Analysis of v1 format and JPegX Hidden Text Finder utility] |
Revision as of 13:50, 17 October 2023
JPegX by Lawrence Kom is a 32-bit Windows program that functions like a generic appender, but is limited to encrypted text messages in JPEG files.
v1.00.6 - Employs a trivial encryption algorithm. Specifically the embedded encrypted data is appended to the file in a consistent and easily identifiable manner. The data is encrypted using the sum of the ASCII characters in the password as a substitution key. The key is then added (with a carry if there is one) to the original character, the key is incremented and added to the next character and so on until the process is complete. If no password is used the byte value of the first ASCII character of the data supplied is added (with a carry if there is one) to 187. The second character added to 188 and so on incrementally until the operation is complete.
v2.0.3 - New format to address issues with v1 format, but when using the JpegX wizard to decrypt and no password credentials are supplied, files will be deciphered regardless.
v2.1.1 - Last version, fixes password bypass issue by removing wizard.
Links
- Homepage (archived)
- [https://web.archive.org/web/20041015211027/http://www.freewebz.com/dufus/jpgx.html Older homepage (archived)
- v2.1.1 Download
- v1.00.6 Download
- Quick Help File
- Analysis of v1 format and JPegX Hidden Text Finder utility
- Password Bypass Vulnerability in v2.0.3
- More info
- Detected by StegSpy