So I have found enough time to record another video!
This video shows you how to efficiently hide text in image files in simple steps, using a popular tool called StegHide. Steganography, as defined by Google is "The practice of concealing messages or information within other non-secret text or data." Playing around with steganographic tools is one of the favorite past times of computer forensic analyzers, and tools like StegHide has been a staple in stegging files for over a decade.
The primary advantage that steganography offers over standard encryption is that a potential attacker has to detect that something is hidden/encrypted first. When a person stumbles upon a cipher or encrypted text, it is fairly obvious something is hidden within, and even the method of encryption is usually easily deducible. However, if the encrypted text is embedded in an image file, no one would recognize the hidden content unless they specifically analyse the image using various tools, something that usually doesn't happen.
Many Linux distros ship with the StegHide utility installed in them, and if many more allows you to get it with a simple command. In this video, however, I shall use StegHide in a Windows system to hide text within an image file and apply a password lock. Only users who can use StegHide and know the password you set for the image can extract the hidden text from the image.
Note that the procedure to use StegHide as described in this video is literally the same for Linux and Windows, with the only difference being the usage of Linux terminal over Windows command prompt in Linux systems.
Although you won't exactly hide your information from expert forensic analyzers using StegHide, it is neat way to pass of hidden information while fooling most everyone trying to intercept it.
Link to download page of StegHide: http://steghide.sourceforge.net/download.php
If you found the video useful, don't forget to like and subscribe!
This video shows you how to efficiently hide text in image files in simple steps, using a popular tool called StegHide. Steganography, as defined by Google is "The practice of concealing messages or information within other non-secret text or data." Playing around with steganographic tools is one of the favorite past times of computer forensic analyzers, and tools like StegHide has been a staple in stegging files for over a decade.
The primary advantage that steganography offers over standard encryption is that a potential attacker has to detect that something is hidden/encrypted first. When a person stumbles upon a cipher or encrypted text, it is fairly obvious something is hidden within, and even the method of encryption is usually easily deducible. However, if the encrypted text is embedded in an image file, no one would recognize the hidden content unless they specifically analyse the image using various tools, something that usually doesn't happen.
Many Linux distros ship with the StegHide utility installed in them, and if many more allows you to get it with a simple command. In this video, however, I shall use StegHide in a Windows system to hide text within an image file and apply a password lock. Only users who can use StegHide and know the password you set for the image can extract the hidden text from the image.
Note that the procedure to use StegHide as described in this video is literally the same for Linux and Windows, with the only difference being the usage of Linux terminal over Windows command prompt in Linux systems.
Although you won't exactly hide your information from expert forensic analyzers using StegHide, it is neat way to pass of hidden information while fooling most everyone trying to intercept it.
Link to download page of StegHide: http://steghide.sourceforge.net/download.php
If you found the video useful, don't forget to like and subscribe!
No comments:
Post a Comment