< All Computer Hacking and Forensics Notes

jgalarza2 | Computer and Hacking Forensics | Module 13 – Steganography

By: jgalarza2 | Related Course: Computer Hacking and Forensics | Published: November 6, 2017 | Modified: November 6, 2017
Join Cybrary

NotepadHideMe

Our first Steganography lab introduces you to HideMe in the Clipboard. HideMe in the Clipboard is a wild little tool that used more for penetration testing to discover how to copy anything that your mouse touches and dump it into the clipboard so you can hide it in whatever object your choose.
You’ll learn from this demonstration how HideMe in the Clipboard analyzes dump data then inserts into another object and where you can and cannot see how that information is hidden.


NotepadMp3Stegz

This next lab introduces you to Mp3Stegz. Mp3Stegz is a neat encoding utility that enables you to add hidden messages yet maintain the integrity of the original file.
You’ll observe the interface demonstration on how apply a stego algorithm to an mp3 file to encode to create secret messages, you’ll also learn about capturing a before and after snapshot of your file, and why confidentiality vs. integrity should be considered polar opposites.


NotepadQuickStego

Our next lab introduces you to QuickStego. QuickStego lets you quickly encode any image by acting as a clipboard within that file to temporarily copy and paste info to be hidden an image.
You’ll learn that if you are a forensic investigator, you need a direct, quick way of replicating how an image is encoded and then finding out what information that image was with.


NotepadSteganography

Welcome to Module 13 of the Computer Hacking and Forensics course, Steganography. This Steganography module introduces you to digital media and hiding messages (“stegoed”) within a variety of different media or any object.
You’ll learn what a “principled based approach is, how messages are created to hide in an object and how Steganography differs from Cryptology for revealing what there vs. what’s been deliberately hidden.
You’ll also learn the difference applications of Steganography, for example for Authentication and how a stegoed message would work.
We’ll discuss various attack techniques, classification and what those categories entail tools for performing analysis on an algorithm, or digital watermark or whatever has been “stegoed” within a given object.
The hands on demonstrations you’ll engage as part of the Steganography module include the following labs:
HideMe in the Clipboard Lab
Mp3Stegz Lab
QuickStego Lab
Xnview Lab


NotepadXnview

Our final lab in the Steganography lab series is Xnview. Xnview is both a viewer and organizer for documentation.
This lab demonstrates what Xnview sees, how explicitly it details information about an image including its histogram, geo time stamp, thumbnail info.
You’ll learn just how completely you can analyze and document every aspect of an image.


< All Computer Hacking and Forensics Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel