14.2 Steganography Lab

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
4 hours 15 minutes
Difficulty
Beginner
CEU/CPE
4
Video Transcription
00:02
Hi. I'm glad you're back.
00:05
Islam. We're going to learn how to hide data within an image as well as how to extract here in information from image price you seen up in a stable steganography solution mainly used for hiding information. Inco where fires
00:21
for a slab you leader will know separating sister environment our grocer to the tool A secret program social seven seed we see are
00:32
only much fire
00:34
Have This is the marching here called Amos one that PNG
00:39
and you would also need a text file. We will hide
00:43
I have this tax code Password that T X t which has secret information inside.
00:51
First you'll need to look you in the machine.
00:55
Next, you have to open a word, bro. Sir,
00:59
I never hear Google Chrome on a We lost an environment but we're free to use the word bro self your choice
01:04
serious for open still Or you can simply go there exiting the website over stable That con which is in this guide
01:14
reading documentation The website. If you want on click in a gun interruption in the top off the pace.
01:23
I don't know the X file on Save it in your computer
01:29
usedto requires an installation,
01:32
so run this a curable file. Second upper Stegall that XY
01:37
it usually hasta version. Number off the tool
01:41
you the license terms and click on. I agree. If you do
01:46
followed destination wizard
01:51
when the installation is finished. Open, Open, stable from the start menu under Main Window with appear
02:00
to hide data. Verify that the high date option is selected.
02:06
Select the text file in the field. May such fire.
02:12
Select the much fire in the field over. File
02:19
tight. A name for the output. Much fight.
02:23
In this case, I'm typing in Musto that PG.
02:28
It's like select increase in algorithm and put a password in the side
02:34
by doing these rich that only the users with the passport can extract the heat and fire
02:42
Glicken High data
02:44
on a newly much fine will be created.
02:47
Okay, here's a question for you.
02:51
What is that? The first between the DUI. Much fires.
03:07
If we take a look and compare the misfires, we could see that they must generate. It is beginning size,
03:15
which is due to the fact that hostage data inside, for this reason in a forensic investigation, if we know une match that is bigger. That is supposed to be. It's probably hiding something
03:30
to extract the data, select the ocean. Distract data
03:35
in the footsteps of file selected. A must previously generated
03:42
become location and safe the hidden information in the Alto folder for Miss Fine
03:50
Type the pass for a quick own extract data,
04:06
you will see the hero's file in the specified location.
04:13
Now we know how tired information in a way that ghost line attract any attention on Lee. The intended recipient is aware off such data.
04:24
If you want to learn more about this topic, please check the reference system supplementary material.
04:30
And in the next morning we're going to story demain for Essex on howto struck key information from these messages.
Up Next