Uninformed: Informative Information for the Uninformed

Vol 8» 2007.Sep


Command-line Arguments

The following command-line arguments are available from the SteganRTP application's command-line.

-a $ <$ host$ >$

$ <$ host$ >$ is the name or IP address of the closest side of the RTP session desired to be utilized as cover-medium (Host A).

-b $ <$ host$ >$

$ <$ host$ >$ is the name or IP address of the remote size of the RTP session desired to be utilized as cover-medium (Host B).

-k $ <$ keyphrase$ >$

$ <$ keyphrase$ >$ is a shared secret between the users of the two SteganRTP instances which will be communicating. In some cases, a single user may be running both instances. The keyphrase is used to generate a bit-pad via the SHA-1 hash function which will later be used to obfuscate the data being steganographically embedded into the RTP audio cover-data.

-c $ <$ port$ >$

$ <$ port$ >$ is the RTP port used by Host A.

-d $ <$ port$ >$

$ <$ port$ >$ is the RTP port used by Host B.

-i $ <$ interface$ >$

$ <$ interface$ >$ is the interface to use on the local host. This parameter defaults to "eth0".

-s

This argument enables the command shell service. If the command shell service is enabled, the user of the remote instance of SteganRTP will be able to execute commands on the local system as the user running SteganRTP. You likely don't want this unless you are the user running both instances of SteganRTP and intend to use the remote instance as an interface for a remote shell on that host. This feature can be useful for remote administration of a system without direct access to the system, assuming that RTP is allowed to traverse traffic policy enforcement points.

-v

This argument increases the verbosity level. Repeat for higher levels of verbosity.

-V

This argument prints SteganRTP's version information and exits.

-e

This argument prints a quick examples reference.

-h

This argument prints the usage (help) information and exits.