Professional Documents
Culture Documents
Steganography - HackersOnlineClub
Steganography - HackersOnlineClub
Steganography - HackersOnlineClub
Home
Advance Operating System Steganography
Advertisement With Us
Android Tools
Android Vulnerability Updates
Anonymous Surfing
BackTrack Tutorial
Books And WhitePapers
Botnets
Bug Bounty Web List
Bypass Android Pattern lock Sponsor Ad
Chat with Friends through
Command Prompt
Clickjacking
Computer Forensic Tools And What is Steganography?
Tricks
Cross Site Scripting (XSS)
Steganography is the art and science of hiding information by embedding
messages within
Cryptography other, seemingly harmless images or other types of media.
Donate Us
DOS Attacks The word steganography is of Greek origin and means "concealed writing". The first recorded
use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on
Phlashing-PDOS
cryptography and steganography disguised as a book on magic. Generally, messages will
Earn Bitcoins appear to be something else: images, articles, shopping lists, or some other covertext and,
Earn Money Online classically, the hidden message may be in invisible
ink between th
Email Hacking e visible lines of a private letter.
Ethical Hacking Training
Course Online It
originated with the Greeks, and it means “covered writing”.
It can be traced back for centuries,
Events when messengers used to shave their heads, tattoo the message to their head, then wait until
their hair grew back, travel to their destination, and finally shave their head again to reveal the
Exploits
message. Another technique that was used was etching a message in a wooden tablet, and
Facebook Tricks then covering it with was. They also used invisible ink, null ciphers, and microdots to convey
Firefox Imp. Addons
messages. Steganography has come a long way since those days. Now, steganography is the
Forensic Tools altering of bits in either an image, sound document, or even another document, to hide a
Fuzzing message.
Game CheatCodes
Google Hacking
Hack Facebook Account
Hack iCloud Activation Lock Steganography
has become increasingly popular in the past years, due to the explosion
of the
Hack Instagram Account internet and multi-media use in general. Most of the attention has been drawn now because of
RUN Commands
Search Engine Optimization
(SEO)
Security Projects
Security Tools
Send Fake Mail
Send Fake SMS
Sniffing
Social Engineering
Steganography
Technical Steganography
Hide File In Image Technical
steganography offers a broad variety of methods. It is nearly impossible to divide up all
Tab Napping these methods. & Its uses scientific methods to hide a message, such as the use of invisible ink
Tips & Trickses or microdots
and other size-reduction methods.
To Block Websites
Some methods of technical steganography are:
To Create Your Own Social
Network Website
Invisible Ink
Training & Webinar
One of the methods with the longest tradition.
VAPT Tools
Virus Types Microdots
Virus Writing A method that can be used to hide up to one page in a dot.
Website Hacking
Computer-based Methods
Bypass Web Application
Firewalls Uses redundant information in texts, pictures, sounds, videos, ...
Website Security
Website Security Tools Linguistic Steganography
Linguistic
steganography hides the message in the carrier in some nonobvious ways and is
Wi-Fi Network Hacking
further categorized as semagrams or open codes.
Windows Hacking
YouTube Video Converter Open Codes
The
openly readable text is in the case of open codes mostly well constructed. It can contain
certain words or sentences, certain letters can be on certain places in the text or words can be
hidden in vertical or reversed position.
Cues
A certain word
appearing in the text transports the message. This message is very often used in
wartime to broadcast information to resistance groups in the enemy's country.
Null-ciphers
The hidden text could be reconstructed by taking the first (second,...) letter of each word (or after
the punctuation mark, etc.).
Hidden messages could also be found vertically, diagonally or in reversed order. It could also be
necessary to re-write the open text in other form (e.g. with a certain number of letters per line).
As an increasing amount of data is stored on computers and transmitted over networks, it is not
surprising that steganography has entered the digital age. On computers and networks,
steganography applications allow for someone to hide any type of binary file in any other binary
file, although image and audio files are today's most common carriers.
Steganography provides some very useful and commercially important functions in the digital
world, most notably digital watermarking. In this application, an author can embed a hidden
message in a file so that ownership of intellectual property can later be asserted and/or to
ensure the integrity of the content. An artist, for example, could post original artwork on a
Website. If someone else steals the file and claims the work as his or her own, the artist can
later prove ownership because only he/she can recover the watermark . Although conceptually
similar to
steganography, digital watermarking usually has different technical goals. Generally
only a small amount of repetitive information is inserted into the carrier, it is not necessary to
hide the watermarking information, and it is useful for the watermark to be able to be removed
while maintaining the integrity of the carrier.
>>Steganography Tools:-
Online Tools
http://www.spammimic.com
http://www.gdataonline.com
Softwares:
1. S Tools
S-Tools hides in a variety of cover media. This software is a good
illustration of different versions
hiding in different media. These
versions cover hiding in BMP, GIF, WAV, and even on unused
floppy disk
space.
Download:- http://www.spychecker.com/program/stools.html
2.MP3Stego.
which hides text files within larger text files, and lastly a tool that hides files in MP3s called MP3
Stego
Download:- http://www.petitcolas.net/fabien/steganography/mp3stego/index.html
3.Steganos Suite
Tested one commercial steganography product, Steganos Suite.
4.Camouflage 2.0
5.Dmagic.
Hides files and folders on Windows systems
6.Hermetic Stego
by Peter Meyer, Hermetic Systems This program is capable of hiding in a BMP image or across
multiple BMP images.
Download:- http://www.hermetic.ch/hst/hst.htm
7.jpeg-jsteg
DOS hides information in the DCT coefficients of JPEG's JFIF image format.
Download:- http://www.nic.funet.fi/pub/crypt/steganography/
8.Snow
Snow (also variants include !SnowDOS, SnowJava, JSnow
By Matthew Kwan is available in
both DOS and JAVA executable formats.
"snow exploits the steganographic nature of
whitespace. Locating
trailing whitespace in text is like finding a polar bear in a
snowstorm. And it
uses the ICE encryption algorithm, so the name is
thematically consistent.
Download:- http://www.darkside.com.au/snow/index.html
9.Steghide
Source code is aviailable and several ports are available for different
operating systems.
IMAGES: (BMP) AUDIO: (WAV, AU )
Download :- http://steghide.sourceforge.net/
10.wbStego
wbStego is a steganography to hide data in bitmaps, text files and HTML files.
Download:- http://www.8ung.at/wbailer/wbstego/
Copyright © 2008-2009 Design & Developed By PRIYANSHU. Site Best viewed in Firefox with
1024x768 screen resolution.