Didier Stevens

Monday 29 January 2018

New Tool: jpegdump.py

Filed under: My Software — Didier Stevens @ 0:00

jpegdump.py is a tool I developed to analyze JPEG images. I have used it for a couple of ISC diary entries: Analyzing JPEG files, It is a resume – Part 3 and A strange JPEG file.

This tool reads binary files and parses the JPEG markers inside them:

It can help with corrupted images, here is an example of a JPEG file that was partially overwritten by ransomware:

The partial image starts from marker 3.

With options -f and -c, one can search through binary files with embedded JPEG images, like this Google Chrome process dump:

For more information, take a look at the man page: jpegdump.py -m

 

jpegdump_V0_0_3.zip (https)
MD5: 929F3EC096AEBEC642C44C6A6EE2895E
SHA256: C5C1CA151C7E24FB6E305E5116BE7B6BC4C417810217249D3831BE5805BBAA9F

5 Comments »

  1. […] New Tool: jpegdump.py […]

    Pingback by Overview of Content Published In January | Didier Stevens — Thursday 1 February 2018 @ 0:00

  2. […] New Tool: jpegdump.py […]

    Pingback by Week 5 – 2018 – This Week In 4n6 — Sunday 4 February 2018 @ 10:34

  3. […] new version of jpegdump adds option -e: extract jpeg images to […]

    Pingback by Update: jpegdump.py Version 0.0.4 | Didier Stevens — Sunday 11 February 2018 @ 0:00

  4. Can i export the corrupt jpeg infected by ransomware encrypted 150kb from the header

    Comment by Vu Ha — Friday 27 March 2020 @ 17:37

  5. What’s the output of jpegdump?

    Comment by Didier Stevens — Friday 27 March 2020 @ 17:55


RSS feed for comments on this post. TrackBack URI

Leave a Reply (comments are moderated)

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Blog at WordPress.com.