17.6 Photo Cryptography Lab EH

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

9 hours 47 minutes
Video Transcription
I welcome back to the course. So in the last video, we actually set up our photos for a lab. Now, again, I mentioned that I already had a couple saved that I'm gonna use for the lab. But go ahead and use the ones that you saved in the one you edited.
So here in this lab, we're gonna actually analyze the photos, so just make sure you log into the Windows machine, which you should still be, And then just open the folder with the original photo that you had saved as well as the edited one You would say so if you say those to your desktop, that's fine. Just you wanna open both these photos?
So we're first going to do a visual check of these photos and see if we notice any differences. So again, I had a couple saved here, so I'm just gonna open them both up,
so we'll start with Cat one Dodge a peg.
It's gonna take a moment or so to open up, and then we just want to open our other photo as well. So we want to open them side by side. You may have to adjust your the size of the photo and that sort of stuff to make sure you can look at him both side by side.
I'm just gonna move this one over here.
Okay? So let's compare the photos. So I'm gonna compare mine. And you just walked through yours as well. Or you could just pause the video. Excuse me? You could just want follow along in this video and then analyzers as well.
So first thing I noticed here is I got a couple of cats, and they both looked pretty much the same, right? I see it. Two years here. Too easy. Ears here. Got eyes and whiskers and nose cut the mouth. Got the pause Kind of together there.
I noticed, like maybe a chair or something in the background there. Looks like the cat's got his paws on the table.
This might be a photo or window or something to the background. Kind of hanging out there also noticed the text on the screen there. First the dot first set out that matches up. Looks like all the text matches up. So these these look like the same photo to me, so I'm gonna go ahead and close him now. So if you're following along, go ahead and close yours
because they should be looking the same.
The next thing we're gonna do
is we want to actually look at the file size. So here in question one. Are there any visual differences in the photos? So I didn't notice any, so I'm gonna say no to that.
So step number five, we're gonna next, right. Click on each photo and check the file size.
Let's go ahead and do that. We're gonna check Cat one
or your particular photo and then right click and go to properties.
So I see here, that is 38.1 kilobytes. Okay, so I'm gonna keep out in my head. I'm gonna memorize that.
I'm gonna try the next file here. Right. Click, go to properties and check the file size. Okay, well, that's 38.1 kilobytes as well. So they're the same file size. Let's go ahead back to our lab document.
So are the files the same size? I'm gonna say yes to that. And I'm also gonna mark down the actual file file size. So 38. Excuse me? 38.1
kilobytes. There we go.
All right. So next we're gonna actually do a hash on each one of the files, so we're gonna start with our first file. So that's the original one you downloaded from the Internet.
So what we're gonna do, we're in a double click on the hash coke,
and then we're gonna go ahead and click the three little dots to upload our photo.
So I'm gonna actually go to where I have this photo at. So I need to go to desktop
and that for me, I have to go to my actual photos for the hex workshop here,
and then I'm gonna click on Cat one. So again, click on your very first photo you downloaded from the Internet and then select open.
Okay, so we selected the original file. Now we're gonna de select all the hash options. Except for MD. Fights were doing it a little different than that shot one. We did. We want the MD five hash on these, mostly because it's a little shorter, so it's a little easier toe. See what the differences are. So we're gonna
choose just empty five and then calculate.
All right, so we see our hash here. Now, you can write all this down if you want to,
but we're just gonna make a note of the hash. And all I'm gonna do basically is I'm gonna memorize the last couple of digits here. So the 58 Caesar afore reminder. You know, the last five or six digits just memorized.
Okay, so now we're gonna do our second photo here, So just click back on those three little dots.
Could that photo and click open you're gonna fall. The hash has disappeared
because we had already do selected the other ones without closing the tool. It just leaves an MD five, which is the one we want, and then just click on calculate.
All right, so you see here that the hash is different than what we had in the other photo, so huh? Okay, well, the officially, the photos look the same,
and we check the file size. Those were the same.
But then we did the hashes, and those are different. So that kind of tells us that maybe there's something hidden in those files,
so let's go ahead. And we're gonna close hashtag right now because we don't need it again.
let's move on with her lab. So are the file. Hashes is saying the answer to that is No, they were not the same.
Okay, so now I'm gonna go ahead and I'm gonna launch a 60 editor. So let's go ahead. Double click on that.
It's gonna launch that for us.
So now we're gonna select file and open. We're gonna do that very first photo. So that original file you had downloaded from the internet,
so we're gonna go to file and then open. We're gonna navigate wherever that file is. So I'm gonna go here to my photos
and click that cat one so that my first photo and then say open
that's gonna open it in the hex editor here again, since I'm using J PAIGC the f f d. A. Deficit.
So I'm gonna scroll to the very bottom here
and see, Justify, noticed any characters that are readable. So I see a bunch of jumbling this here so I don't notice anything hidden there. Let's go back to our lab.
So I do. I noticed any secret information type there in the first photo. So my enters. No, I didn't notice any secret type of information, like a password or something like that.
All right, So we're gonna go back to our hex editor. We're gonna select file open, and then we're gonna choose the second photo that we had.
Let's go ahead and do that. We're gonna go to file
and then we'll choose a second photo. Where have you have a saved up and then just say open.
It's gonna open that one as well in a hex editor.
And so we're gonna scroll from the bottom of the page, and we're gonna look again for any secret information. So let's go ahead and do that. So well, scroll to the bottom of the page
and see. Look for secret information. Okay? Look at that. So I see that the word password is tight there. I can read that. So that's some secret information. So again, in part to the lab, we had set that up. So whatever you had type there, that's what you should see in this particular lab.
So let's go ahead and type whatever you found in there, So, yes, there were secret information and it was the word password with a capital P.
So in this lab. We just went over analyzing the photos that we had, so we took a hash on both of them. We noticed that the hashes were different. So then we opened the photos and a hex editor to see what kind of secret information might be in there.
So in the next module, we're gonna go over reporting, which is a very important component of the penetration test. Because at the end of the day, if your customer cannot digesting information, they're not gonna hire you again in six months or a year when they want another penetration test done.
Up Next
Penetration Testing and Ethical Hacking

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course

Instructed By