All of us want our sensitive information to be hidden from people and for that we perform different kinds of things like hide those files or lock them using different softwares. But even though we do that, those files attractive people to itself as an object of security. Today I'm going to give you a slight introduction to what is called as Steganography. Its a practice of hiding an informational file within another file like you might have seen in movies an image has a secret message encoded in it. You can read more about Steganography from Wikipedia.
In this tutorial I'm going to use a tool called steghide, which is a simple to use Steganography tool and I'm running it on my Arch Linux. What I'm going to do is simply encode an image with a text file which contains some kind of information which I don't want other people to see. And at the end I'll show you how to decode that information back. So lets get started:
Requirements:
1. steghide
2. a text file
3. an image file
After you have installed steghide, fire up the terminal and type steghide
It will give you list of options that are available.
Now say I have a file with the name of myblogpassword.txt which contains the login password of my blog and I want to encode that file into an Image file with the name of arch.jpg so that I can hide my sensitive information from the preying eyes of my friends. In order to do that I'll type the following command in my terminal:
steghide embed -ef myblogpassword.txt -cf arch.jpg
here steghide is the name of the program
embed flag is used to specify to steghide that we want to embed one file into another file
-ef option is used to specify to steghide the name (and location, in case if its in some other directory) of the file that we want to embed inside of the another file, in our case its myblogpassword.txt
-cf option is used to specify the name (and location, in case if its in some other directory) of the file in which we want to embed our file, in our case its an image file named arch.jpg
After typing the above command and hitting enter it will prompt for a password. We can specify a password here in order to password protect our file so that when anyone tries to extract our embedded file, they'll have to supply a password in order to extract it. If you don't want to password protect it you can just simply hit enter.
Now myblogpassword.txt file is embedded inside of the image file arch.jpg. You'll see no changes in the image file except for its size. Now we can delete the plain password text file myblogpassword.txt.
In order to extract the embedded file from the cover file, I'll type following command in the terminal:
steghide extract -sf arch.jpg -xf myblogpass.txt
here steghide is again name of the program
extract flag specifies that we want to extract an embedded file from a stego file
-sf option specifies the name of the stego file or in other words the file in which we embedded another file, in our case here its the arch.jpg file
-xf option specifies the name of the file to which we want to write our embedded file, here it is myblogpass.txt
(remember you must specify the name of file with its location if its somewhere else than the current directory)
After typing the above command and hitting enter, it will prompt for a password. Supply the password if any or otherwise just simply hit enter. It will extract the embedded file to the file named myblogpass.txt. Voila! you got your file back but yes the image file still contains the embedded file.
That's it, very easy isn't it?
It was a pretty basic introduction you can look for other things like encrypting the file to be embedded before you embed it into another file and so on... enjoy :)
- New Hacker Tools
- Hacker Security Tools
- Nsa Hack Tools
- Hacker Tools Github
- Pentest Tools Tcp Port Scanner
- Hacker Tools For Ios
- Hack Tools For Games
- Hacking Tools For Beginners
- Pentest Tools Find Subdomains
- Nsa Hacker Tools
- Pentest Tools Android
- Hacking Tools For Mac
- What Are Hacking Tools
- Pentest Tools Apk
- Hack And Tools
- What Is Hacking Tools
- Tools For Hacker
- Hacker Tools Software
- Hacking Tools For Beginners
- Hacker Tools Mac
- Pentest Tools Apk
- Pentest Tools Tcp Port Scanner
- Hacker Tools Linux
- Pentest Tools
- Hack Tools For Games
- Hack Tools Online
- Hack Tools For Games
- Hack Tools For Pc
- Hackers Toolbox
- Hacking Tools Software
- World No 1 Hacker Software
- Hacker Techniques Tools And Incident Handling
- Hacker Tool Kit
- Pentest Tools For Ubuntu
- Pentest Tools Github
- Pentest Tools
- Hack Tools 2019
- Hacking Tools For Games
- Hacker
- Hacker Tools For Pc
- Hack Rom Tools
- Hack And Tools
- What Are Hacking Tools
- Pentest Tools Tcp Port Scanner
- Hacking Tools And Software
- Hack Apps
- Hacking Tools Pc
- Pentest Tools Url Fuzzer
- Pentest Tools Open Source
- Hacker Tools Github
- World No 1 Hacker Software
- Physical Pentest Tools
- Hacker Security Tools
- Pentest Tools Windows
- Hack Tools For Games
- Hack Tools
- Pentest Tools Free
- Hacker Techniques Tools And Incident Handling
- Hacking Tools For Pc
- Computer Hacker
- Hacker Tools Software
- Hack Tools Online
- Free Pentest Tools For Windows
- Hacker Hardware Tools
- Hacker Tools List
- Hak5 Tools
- Hack Tools For Windows
- Hacking Tools Name
- Nsa Hack Tools Download
- Pentest Reporting Tools
- Hacking App
- Free Pentest Tools For Windows
- Hak5 Tools
- Pentest Tools Apk
- Pentest Tools Find Subdomains
- Hacking Tools Windows 10
- Nsa Hack Tools Download
- Pentest Tools Tcp Port Scanner
- Hacking Tools For Kali Linux
- Underground Hacker Sites
- Hack Tools
- Hack Rom Tools
- Hacking Tools Windows 10
- Hacking Tools For Beginners
- Pentest Tools Port Scanner
- Hacker Tools List
- Hacking Tools For Beginners
- Hacking Tools Github
- Pentest Tools Website Vulnerability
- Hacking Tools And Software
- Hacker Tool Kit
- Hack Tools For Games
- Hack Tools For Windows
- Termux Hacking Tools 2019
- Hacking Tools Mac
- Hacker Tools Online
- Hackrf Tools
- New Hack Tools
- Hack Tool Apk No Root
- Hack Tools For Mac
- Pentest Tools List
- Nsa Hack Tools Download
- Blackhat Hacker Tools
- Hacking Tools Windows 10
- Pentest Tools Online
- Hacker Techniques Tools And Incident Handling
- Computer Hacker
- Free Pentest Tools For Windows
- Underground Hacker Sites
- Pentest Tools Linux
- Pentest Tools Review
- Hacker Tools 2020
- Hack Tools For Mac
- Install Pentest Tools Ubuntu
- Pentest Tools Tcp Port Scanner
- Pentest Tools Kali Linux
- Hacking Tools Online
- Underground Hacker Sites
- Pentest Tools For Android
- Wifi Hacker Tools For Windows
- Pentest Tools Review
- Ethical Hacker Tools
- Hack Website Online Tool
- Github Hacking Tools
- Underground Hacker Sites
- Pentest Tools
- Install Pentest Tools Ubuntu
- Hacker Tools Hardware
- Hacker Tools Mac
- World No 1 Hacker Software
- Hack Tools 2019
- Hack Tools For Mac
- Bluetooth Hacking Tools Kali
- Hacker Tools
- Hacking Tools Name
- Game Hacking
- Hacking Tools Kit
- Bluetooth Hacking Tools Kali
- Hacking Tools Pc
- Hacking Tools Windows
- Hacking Tools Mac
- Pentest Tools Review
- Pentest Tools Website
- Tools 4 Hack
- Underground Hacker Sites
- Kik Hack Tools
- Hacking Tools And Software
- Hacking Tools Mac
- Growth Hacker Tools
- Hacking Tools Pc
- Hackers Toolbox
- How To Hack
- Hacking Tools For Mac
No comments:
Post a Comment