From 5ce9fb7d14fe614c2ec1f4e4f9e1b57dc50448b3 Mon Sep 17 00:00:00 2001 From: Margaret Fero Date: Sun, 4 Oct 2020 23:56:00 -0700 Subject: [PATCH] Fixed typo in names/commands for Screening Scripts Under "Screening Scripts", in the section beginning "The following file types are supported," both the JPG and PNG options had a typo in the first script. They were listed as check_jpg.h and check_png.h, but they're actually both shell scripts (.sh) rather than C files, so they didn't work if you copied and pasted (like I just did). --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index f3c843b..67af270 100644 --- a/README.md +++ b/README.md @@ -139,8 +139,8 @@ For each file type, there are two kinds of scripts: - `XXX_brute.sh `: tries to extract a hidden message from a stego file with various tools using a wordlist (`cewl`, `john` and `crunch` are installed to generate lists - keep them small). The following file types are supported: -- JPG: `check_jpg.h` and `brute_jpg.sh` (brute running `steghide`, `outguess`, `outguess-0.13`, `stegbreak`, `stegoveritas.py -bruteLSB`) -- PNG: `check_png.h` and `brute_png.sh` (brute running `openstego` and `stegoveritas.py -bruteLSB`) +- JPG: `check_jpg.sh` and `brute_jpg.sh` (brute running `steghide`, `outguess`, `outguess-0.13`, `stegbreak`, `stegoveritas.py -bruteLSB`) +- PNG: `check_png.sh` and `brute_png.sh` (brute running `openstego` and `stegoveritas.py -bruteLSB`) ### Wordlist generation