Steganography Mp3Stegz Lab

[toggle_content title="Transcript"] Hey, Leo Dregier here. I finally get to talk about a section that, uh, everybody wants to get a chance to play with, ste, uh, steganography tools, um, but they never really get a chance to play with them. Uh, you can encode messages in all sorts of files. It’s not just limited to text files. Um, and so it – application like Mp3Stegz is easy enough for you guys to use. I just – I can just show you the interface. This, this is so easy. You guys can play it, can play it, so I’m not even going to do it. But be sure to, uh, uh, do it yourself, and add to the dialog box, uh, and see if you can get it to work. It’s fun. All right, so you select your source mp3 file. Um, you can look at the information out of the mp3 file if you want. Then you select their hi – the file that you want to hide, um, and then the password in which you want to apply to it. So this is the symmetric secret key that you’re going to pre-share with only the people that you want them to see for full disclosure or to prevent disclosure. Um, you could add, uh, optional things like file length, um, or hidden file length, the steg result name. Basically, what do you want the name of your file, um, and any sort of additional information you want, uh, done. That’s how you encode in an mp3, uh, end of file in a secret message and for password protected, and have some other hidden message. Now, what you can do with that is you can go use your MD5 utilities, and take a snapshot of your files before you change them and after you change them. And not only do you go less in integrity because you can see that confidentiality algorithms actually do change things, um, but you can compare it to the polar opposite of integrity. Remember, confidentiality, uh, confidentiality and integrity should be considered polar opposites of each other. In a confidentiality role, you do want to change. In the integrity world, it’s all about the prevention or detection of change, or modifications, or alterations. So it’s quite different, all right? But you’ve got to compare and contrast those two worlds. Well, when – with an Mp3Stegz, this is an encoding. It’s actually an encoding into the file. Um, so it does change the integrity of it, um, but you – it’s still an mp3, so you – it’s not disclo – in confidentiality world, you, you wouldn’t be able to see it because it’s ciphertext, but in this tool, you can see the file, uh, very, very clearly. The file plays just fine. So it’s not disclosed whatsoever, but it – there is a message encoded. So steganography is really its ow, own world, and that – and how it encodes itself into its message. My name’s Leo Dregier, and thanks for watching. [/toggle_content] This next lab introduces you to Mp3Stegz. Mp3Stegz is a neat encoding utility that enables you to add hidden messages yet maintain the integrity of the original file. You’ll observe the interface demonstration on how apply a stego algorithm to an mp3 file to encode to create secret messages, you’ll also learn about capturing a before and after snapshot of your file, and why confidentiality vs. integrity should be considered polar opposites.
Recommended Study Material
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google Play Get it on the App Store

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?