All of us want our sensitive information to be hidden from people and for that we perform different kinds of things like hide those files or lock them using different softwares. But even though we do that, those files attractive people to itself as an object of security. Today I'm going to give you a slight introduction to what is called as Steganography. Its a practice of hiding an informational file within another file like you might have seen in movies an image has a secret message encoded in it. You can read more about Steganography from Wikipedia.
In this tutorial I'm going to use a tool called steghide, which is a simple to use Steganography tool and I'm running it on my Arch Linux. What I'm going to do is simply encode an image with a text file which contains some kind of information which I don't want other people to see. And at the end I'll show you how to decode that information back. So lets get started:
Requirements:
1. steghide
2. a text file
3. an image file
After you have installed steghide, fire up the terminal and type steghide
It will give you list of options that are available.
Now say I have a file with the name of myblogpassword.txt which contains the login password of my blog and I want to encode that file into an Image file with the name of arch.jpg so that I can hide my sensitive information from the preying eyes of my friends. In order to do that I'll type the following command in my terminal:
steghide embed -ef myblogpassword.txt -cf arch.jpg
here steghide is the name of the program
embed flag is used to specify to steghide that we want to embed one file into another file
-ef option is used to specify to steghide the name (and location, in case if its in some other directory) of the file that we want to embed inside of the another file, in our case its myblogpassword.txt
-cf option is used to specify the name (and location, in case if its in some other directory) of the file in which we want to embed our file, in our case its an image file named arch.jpg
After typing the above command and hitting enter it will prompt for a password. We can specify a password here in order to password protect our file so that when anyone tries to extract our embedded file, they'll have to supply a password in order to extract it. If you don't want to password protect it you can just simply hit enter.
Now myblogpassword.txt file is embedded inside of the image file arch.jpg. You'll see no changes in the image file except for its size. Now we can delete the plain password text file myblogpassword.txt.
In order to extract the embedded file from the cover file, I'll type following command in the terminal:
steghide extract -sf arch.jpg -xf myblogpass.txt
here steghide is again name of the program
extract flag specifies that we want to extract an embedded file from a stego file
-sf option specifies the name of the stego file or in other words the file in which we embedded another file, in our case here its the arch.jpg file
-xf option specifies the name of the file to which we want to write our embedded file, here it is myblogpass.txt
(remember you must specify the name of file with its location if its somewhere else than the current directory)
After typing the above command and hitting enter, it will prompt for a password. Supply the password if any or otherwise just simply hit enter. It will extract the embedded file to the file named myblogpass.txt. Voila! you got your file back but yes the image file still contains the embedded file.
That's it, very easy isn't it?
It was a pretty basic introduction you can look for other things like encrypting the file to be embedded before you embed it into another file and so on... enjoy :)
More information
- Hack Tools For Mac
- Hacker
- Pentest Tools Alternative
- Tools Used For Hacking
- Pentest Tools
- Pentest Tools Windows
- Pentest Tools Website Vulnerability
- Hacking Tools Windows
- Free Pentest Tools For Windows
- Pentest Tools Tcp Port Scanner
- Hacking Tools Usb
- How To Hack
- Pentest Tools Android
- Hack Tools Github
- Hacking Tools Github
- Hacker Hardware Tools
- How To Make Hacking Tools
- Pentest Tools Alternative
- Best Hacking Tools 2020
- Hacking Tools For Games
- Hacker Hardware Tools
- Pentest Tools Kali Linux
- Hacker Tool Kit
- Hacking Tools For Beginners
- Hacking Tools 2020
- Pentest Recon Tools
- Best Hacking Tools 2020
- Pentest Tools Open Source
- Pentest Tools Linux
- Hacker Techniques Tools And Incident Handling
- Hacks And Tools
- Hacking Tools 2019
- Hacking Tools Github
- Pentest Tools Url Fuzzer
- Pentest Tools Alternative
- Pentest Tools For Mac
- Free Pentest Tools For Windows
- Pentest Tools Linux
- Hacking Tools
- Hacking Tools For Windows
- Nsa Hack Tools Download
- Hacker Tools Github
- Hacker Tools Apk Download
- Best Hacking Tools 2020
- Pentest Recon Tools
- Hack Tools Mac
- Pentest Tools Github
- Pentest Tools Port Scanner
- Hacking Tools For Pc
- Hacking Tools For Kali Linux
- Hack Tools Mac
- Pentest Box Tools Download
- Hacker Hardware Tools
- Hack Apps
- Hack Tools
- Hack Tools Pc
- Hacker Tools Software
- Pentest Tools Website Vulnerability
- How To Install Pentest Tools In Ubuntu
- Hacking Tools Online
- Hacker Tools Apk Download
- Pentest Tools Android
- Hack Tools Github
- Pentest Tools Github
- Top Pentest Tools
- Hacker Tools Apk Download
- New Hack Tools
- Hack Tools
- Pentest Tools Apk
- Hacking Tools 2019
- Hack Tools Pc
- Pentest Tools Port Scanner
- Pentest Tools Website Vulnerability
- Hack Tools For Pc
- Hacking Tools Software
- Hackrf Tools
- Hacker Hardware Tools
- Pentest Tools Website Vulnerability
- Pentest Tools Website Vulnerability
- Hacking Tools For Windows Free Download
- Easy Hack Tools
- Computer Hacker
- Pentest Recon Tools
- Hacking Tools Windows 10
- Hacker Tools Mac
- Pentest Tools For Windows
- Pentest Tools Review
- How To Make Hacking Tools
- Hacking Tools Free Download
- Hack Tools 2019
- Pentest Tools Android
- Best Pentesting Tools 2018
- Pentest Tools Url Fuzzer
- Pentest Automation Tools
- Hacker Tools For Mac
- Hacking Tools Free Download
- Hak5 Tools
- Pentest Tools Nmap
- Hack Rom Tools
- Hacking Tools
- Physical Pentest Tools
- Physical Pentest Tools
- Pentest Tools Review
- Hacking Tools And Software
- World No 1 Hacker Software
- Hack Tools For Games
- Beginner Hacker Tools
- Hacker
- Github Hacking Tools
- Hacking Tools For Pc
- Hacks And Tools
- Ethical Hacker Tools
- Hacking Tools Github
- Usb Pentest Tools
- Nsa Hack Tools Download
- Hacker Tools Linux
- Hack Tools Download
- Hacker Security Tools
- Pentest Tools Review
- Pentest Tools For Ubuntu
- Pentest Tools Free
- Hack Tools For Ubuntu
- Pentest Reporting Tools
- Android Hack Tools Github
- Pentest Tools Kali Linux
- Hacks And Tools
- Hacker Search Tools
- Hacker Search Tools
- Beginner Hacker Tools
- Hacking Tools Online
- Hack Website Online Tool
- New Hacker Tools
- Hack Tools For Mac
- Physical Pentest Tools
- Pentest Tools Website Vulnerability
- Hack Tools For Ubuntu
- Bluetooth Hacking Tools Kali
- Hack Apps
- Hacker Tools For Windows
- Pentest Tools Port Scanner
- Nsa Hack Tools
- Hack Tool Apk
- Hacker Search Tools
- Hacking Tools Software
- Hack Rom Tools
- Hacker Hardware Tools
- Hacker Tools For Ios
- Hack Tools 2019
- Hack Website Online Tool
- Hacker Tools For Mac
- Pentest Automation Tools
- Game Hacking
- Hacking Tools Online
- Growth Hacker Tools
- Hacker Tools Free
- Pentest Tools For Ubuntu
- Hacker Tools Github
- Hacking Tools For Mac
- Black Hat Hacker Tools
- Hacking Tools Online
- Pentest Tools Online
- Tools 4 Hack
- Hackers Toolbox
- Pentest Tools Alternative
- Tools 4 Hack
- Hack And Tools
- Physical Pentest Tools
- Wifi Hacker Tools For Windows
No comments:
Post a Comment