يتذكر فهداً رآه على شاشة التلفزيون،
فهدا قويا يحاصر ظبيا رضيعا
وحين دنا منه شم الحليب
فلم يفترسه

كأن الحليب يروض وحش الفلاة
م.د
"حنى الوحوش ترفض أن تفعل مثلكم وتؤذي الطفولة أيها المجرمون"

18‏/01‏/2024

Steghide - A Beginners Tutorial




All of us want our sensitive information to be hidden from people and for that we perform different kinds of things like hide those files or lock them using different softwares. But even though we do that, those files  attractive people to itself as an object of security. Today I'm going to give you a slight introduction to what is called as Steganography. Its a practice of hiding an informational file within another file like you might have seen in movies an image has a secret message encoded in it. You can read more about Steganography from Wikipedia.


In this tutorial I'm going to use a tool called steghide, which is a simple to use Steganography tool and I'm running it on my Arch Linux. What I'm going to do is simply encode an image with a text file which contains some kind of information which I don't want other people to see. And at the end I'll show you how to decode that information back. So lets get started:


Requirements:

1. steghide
2. a text file
3. an image file

After you have installed steghide, fire up the terminal and type steghide




It will give you list of options that are available.


Now say I have a file with the name of myblogpassword.txt which contains the login password of my blog and I want to encode that file into an Image file with the name of arch.jpg so that I can hide my sensitive information from the preying eyes of my friends. In order to do that I'll type the following command in my terminal:


steghide embed -ef myblogpassword.txt -cf arch.jpg




here steghide is the name of the program

embed flag is used to specify to steghide that we want to embed one file into another file
-ef option is used to specify to steghide the name (and location, in case if its in some other directory) of the file that we want to embed inside of the another file, in our case its myblogpassword.txt
-cf option is used to specify the name (and location, in case if its in some other directory) of the file in which we want to embed our file, in our case its an image file named arch.jpg

After typing the above command and hitting enter it will prompt for a password. We can specify a password here in order to password protect our file so that when anyone tries to extract our embedded file, they'll have to supply a password in order to extract it. If you don't want to password protect it you can just simply hit enter.


Now myblogpassword.txt file is embedded inside of the image file arch.jpg. You'll see no changes in the image file except for its size. Now we can delete the plain password text file myblogpassword.txt.


In order to extract the embedded file from the cover file, I'll type following command in the terminal:


steghide extract -sf arch.jpg -xf myblogpass.txt




here steghide is again name of the program
extract flag specifies that we want to extract an embedded file from a stego file
-sf option specifies the name of the stego file or in other words the file in which we embedded another file, in our case here its the arch.jpg file
-xf option specifies the name of the file to which we want to write our embedded file, here it is myblogpass.txt
(remember you must specify the name of file with its location if its somewhere else than the current directory)

After typing the above command and hitting enter, it will prompt for a password. Supply the password if any or otherwise just simply hit enter. It will extract the embedded file to the file named myblogpass.txt. Voila! you got your file back but yes the image file still contains the embedded file.


That's it, very easy isn't it?


It was a pretty basic introduction you can look for other things like encrypting the file to be embedded before you embed it into another file and so on... enjoy
:)

More information

  1. Hacker Tools Apk
  2. How To Make Hacking Tools
  3. What Are Hacking Tools
  4. Hack Tools Online
  5. Pentest Tools For Ubuntu
  6. Hacking Tools Hardware
  7. Hacker Tools For Pc
  8. Bluetooth Hacking Tools Kali
  9. Hacker Tools Free Download
  10. What Are Hacking Tools
  11. Top Pentest Tools
  12. Hacking Tools For Pc
  13. Pentest Tools Url Fuzzer
  14. Pentest Tools Online
  15. Android Hack Tools Github
  16. Hacker Tools Software
  17. Growth Hacker Tools
  18. Hackers Toolbox
  19. Easy Hack Tools
  20. Hacker Tools For Ios
  21. Pentest Tools Find Subdomains
  22. Hack Apps
  23. Hack Tools 2019
  24. Underground Hacker Sites
  25. Hack Tools Mac
  26. Hacker
  27. Hacker Tools Free Download
  28. Blackhat Hacker Tools
  29. Hack Apps
  30. Hack Tools Github
  31. Hack Tool Apk No Root
  32. Pentest Tools Android
  33. Hacking Tools For Mac
  34. Tools For Hacker
  35. Termux Hacking Tools 2019
  36. Hacking Tools Free Download
  37. Hacking Tools Windows 10
  38. Install Pentest Tools Ubuntu
  39. Hacking Tools Windows
  40. Pentest Tools Linux
  41. Hackers Toolbox
  42. Tools Used For Hacking
  43. Pentest Tools Alternative
  44. Bluetooth Hacking Tools Kali
  45. Hack Tools 2019
  46. Hacker Tools Hardware
  47. Hacking Tools Windows
  48. Pentest Tools Free
  49. Hacker Security Tools
  50. Pentest Tools Kali Linux
  51. Pentest Tools Nmap
  52. World No 1 Hacker Software
  53. Hacker Tools Linux
  54. Hackrf Tools
  55. Pentest Tools Bluekeep
  56. Hacker Tools Windows
  57. Growth Hacker Tools
  58. Pentest Automation Tools
  59. Hacker Tool Kit
  60. Top Pentest Tools
  61. Pentest Tools For Mac
  62. Pentest Tools Android
  63. Hacking Tools
  64. Pentest Tools Bluekeep
  65. Pentest Tools Website Vulnerability
  66. Pentest Tools Website Vulnerability
  67. Pentest Tools For Android
  68. Github Hacking Tools
  69. Pentest Tools For Windows
  70. Tools 4 Hack
  71. Game Hacking
  72. Hack Tools Pc
  73. Hacker Tools Free
  74. Hacker Tools Free
  75. Hack Tools For Pc
  76. Kik Hack Tools
  77. Hack Tools
  78. Nsa Hack Tools Download
  79. Hacking Tools For Windows 7
  80. Pentest Tools Port Scanner
  81. Hacker Tools 2020
  82. Hacking Tools Windows
  83. Pentest Tools For Mac
  84. Hacker Hardware Tools
  85. Ethical Hacker Tools
  86. Hacking Tools Windows

ليست هناك تعليقات: