Time
4 hours 15 minutes
Difficulty
Beginner
CEU/CPE
4

Video Transcription

00:02
Hi. I'm glad you're back.
00:05
Islam. We're going to learn how to hide data within an image as well as how to extract here in information from image price you seen up in a stable steganography solution mainly used for hiding information. Inco where fires
00:21
for a slab you leader will know separating sister environment our grocer to the tool A secret program social seven seed we see are
00:32
only much fire
00:34
Have This is the marching here called Amos one that PNG
00:39
and you would also need a text file. We will hide
00:43
I have this tax code Password that T X t which has secret information inside.
00:51
First you'll need to look you in the machine.
00:55
Next, you have to open a word, bro. Sir,
00:59
I never hear Google Chrome on a We lost an environment but we're free to use the word bro self your choice
01:04
serious for open still Or you can simply go there exiting the website over stable That con which is in this guide
01:14
reading documentation The website. If you want on click in a gun interruption in the top off the pace.
01:23
I don't know the X file on Save it in your computer
01:29
usedto requires an installation,
01:32
so run this a curable file. Second upper Stegall that XY
01:37
it usually hasta version. Number off the tool
01:41
you the license terms and click on. I agree. If you do
01:46
followed destination wizard
01:51
when the installation is finished. Open, Open, stable from the start menu under Main Window with appear
02:00
to hide data. Verify that the high date option is selected.
02:06
Select the text file in the field. May such fire.
02:12
Select the much fire in the field over. File
02:19
tight. A name for the output. Much fight.
02:23
In this case, I'm typing in Musto that PG.
02:28
It's like select increase in algorithm and put a password in the side
02:34
by doing these rich that only the users with the passport can extract the heat and fire
02:42
Glicken High data
02:44
on a newly much fine will be created.
02:47
Okay, here's a question for you.
02:51
What is that? The first between the DUI. Much fires.
03:07
If we take a look and compare the misfires, we could see that they must generate. It is beginning size,
03:15
which is due to the fact that hostage data inside, for this reason in a forensic investigation, if we know une match that is bigger. That is supposed to be. It's probably hiding something
03:30
to extract the data, select the ocean. Distract data
03:35
in the footsteps of file selected. A must previously generated
03:42
become location and safe the hidden information in the Alto folder for Miss Fine
03:50
Type the pass for a quick own extract data,
04:06
you will see the hero's file in the specified location.
04:13
Now we know how tired information in a way that ghost line attract any attention on Lee. The intended recipient is aware off such data.
04:24
If you want to learn more about this topic, please check the reference system supplementary material.
04:30
And in the next morning we're going to story demain for Essex on howto struck key information from these messages.

Up Next

Windows Forensics and Tools

The Windows Forensics and Tools course focuses on building digital forensics knowledge of Microsoft Windows operating systems, as well as some compatible software or tools that can be used to obtain or process information in such systems.

Instructed By

Instructor Profile Image
Adalberto Jose Garcia
Information Security Analyst at Bigazi
Instructor