Steganography - HackersOnlineClub

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Steganography - HackersOnlineClub

Home
Advance Operating System Steganography
Advertisement With Us
Android Tools
Android Vulnerability Updates
Anonymous Surfing
BackTrack Tutorial
Books And WhitePapers
Botnets
Bug Bounty Web List
Bypass Android Pattern lock Sponsor Ad
Chat with Friends through
Command Prompt
Clickjacking
Computer Forensic Tools And What is Steganography?
Tricks
Cross Site Scripting (XSS)
Steganography is the art and science of hiding information by embedding
messages within
Cryptography other, seemingly harmless images or other types of media.
Donate Us
DOS Attacks The word steganography is of Greek origin and means "concealed writing". The first recorded
use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on
Phlashing-PDOS
cryptography and steganography disguised as a book on magic. Generally, messages will
Earn Bitcoins appear to be something else: images, articles, shopping lists, or some other covertext and,
Earn Money Online classically, the hidden message may be in invisible
ink between th
Email Hacking e visible lines of a private letter.
Ethical Hacking Training
Course Online It
originated with the Greeks, and it means “covered writing”.
It can be traced back for centuries,
Events when messengers used to shave their heads, tattoo the message to their head, then wait until
their hair grew back, travel to their destination, and finally shave their head again to reveal the
Exploits
message. Another technique that was used was etching a message in a wooden tablet, and
Facebook Tricks then covering it with was. They also used invisible ink, null ciphers, and microdots to convey
Firefox Imp. Addons
messages. Steganography has come a long way since those days. Now, steganography is the
Forensic Tools altering of bits in either an image, sound document, or even another document, to hide a
Fuzzing message.
Game CheatCodes
Google Hacking
Hack Facebook Account
Hack iCloud Activation Lock Steganography
has become increasingly popular in the past years, due to the explosion
of the
Hack Instagram Account internet and multi-media use in general. Most of the attention has been drawn now because of

http://hackersonlineclub.com/steganography/[2/16/2016 8:43:54 PM]


Steganography - HackersOnlineClub

Hack PayPal Account the malicious use of the technique. It has


been used for terrorism, fraud, espionage, etc. It has
Hack Victim Computer become a threat not only to individuals and businesses, but to government agencies and

homeland security, not just in the United States, but all across the world. This is why there is
Hack WhatsApp Account
now a growing interest in steganalysis, which is the detection of embedded data. The problem
Hack Windows Admin is, there are so many methods to embed the information, it is hard to develop programs to
Hackers Types distinguish between the different types. There are over 100 free steganography programs, such
Hacking Tools as Outguess, available on the internet, and
it is reported that there have been over 1 million
Heartbleed OpenSSL Tools downloads of this software, which goes to show how popular steganography is becoming. It is
not always used in a malevolent manner, some people just like to keep
their private information
HOC Tools
secret, or use it as another way to encrypt important information, but the fact is that it can be
HoneyPot used in a criminal
way, and that is what the concern is about.
How To Bypass Smartphone
Lock Screen What are some steganography programs?
How To Identify Fake Facebook
Accounts
Not only are there several programs that hide information, there are several different methods
How To Make Window for doing so. There are three basic ways: injection, substitution, and generation. With injection,
Genuiene the idea is to find areas in the file that are not being used, like at the end of
a song for example,
How To Remove Facebook and insert the data in that space. Substitution finds the least significant bits, and places the
Timeline hidden document there. Generation creates an entirely new file, based around the information
Information Security
that you want hidden, for example, creating an image of a painting based
on the bits that are in
Install window XP In 10Min. the file.
Internet Guide
There are also several different programs, with their own methods that all fall under one of the
Intrusion Detection System above mentioned categories. Outguess is one such program, it is a universal steganographic
(IDS) tool that allows the insertion of hidden information into the redundant bits of data sources. It
Jailbreak iOS determines the maximum amount of information that can be inserted into a jpeg without
Job Board
changing the statistical counts, making it difficult to find using statistical tests. There are also
Kali Linux Tutorials several others such as S-tools.
Keylogger Tutorial
Learn TCP/IP
LFI & RFI
MAC Address (Media Access
Control)
Malware Analysis
Metasploit Tutorial
Hack Webcam
Metasploit Cheatsheet
Miscellaneous Tools
Mobile Hack Tricks
Mobile Hacking Tools
Mobile Recharge Free
What is Steganalysis?
Mobile Stuff
LG Mobile Codes Steganalysis is simply the detection of steganography by a third party. This is a relatively new
Nokia mobile codes field, since the new technology behind steganography is just becoming popular. There are two
Samsung Mobile Codes main types of steganalysis: visual analysis and statistical (algorithmic) analysis.
Multi Yahoo&Gtlk Visual analysis tries
to reveal the presence of hidden information through inspection with the
Network Hacking naked eye or with the assistance of a computer, which can separate the image into bit planes for
further analysis.
Open Source Code
Statistical analysis is
more powerful and successful, because it reveals the smallest alterations
Phishing Attacks in an image’s statistical behavior. There are several statistical tests which can be run on an
Phreaking image: average bytes, variations of the bytes, skew, kurtosis, average deviation and differential
Privacy Policy values.
Proxy Server
Python Tools
Recover Deleted Files
Reverse Engineering

http://hackersonlineclub.com/steganography/[2/16/2016 8:43:54 PM]


Steganography - HackersOnlineClub

RUN Commands
Search Engine Optimization
(SEO)
Security Projects
Security Tools
Send Fake Mail
Send Fake SMS
Sniffing
Social Engineering
Steganography
Technical Steganography
Hide File In Image Technical
steganography offers a broad variety of methods. It is nearly impossible to divide up all
Tab Napping these methods. & Its uses scientific methods to hide a message, such as the use of invisible ink
Tips & Trickses or microdots
and other size-reduction methods.
To Block Websites
Some methods of technical steganography are:
To Create Your Own Social
Network Website
Invisible Ink
Training & Webinar
One of the methods with the longest tradition.
VAPT Tools
Virus Types Microdots
Virus Writing A method that can be used to hide up to one page in a dot.
Website Hacking
Computer-based Methods
Bypass Web Application
Firewalls Uses redundant information in texts, pictures, sounds, videos, ...
Website Security
Website Security Tools Linguistic Steganography
Linguistic
steganography hides the message in the carrier in some nonobvious ways and is
Wi-Fi Network Hacking
further categorized as semagrams or open codes.
Windows Hacking
YouTube Video Converter Open Codes
The
openly readable text is in the case of open codes mostly well constructed. It can contain
certain words or sentences, certain letters can be on certain places in the text or words can be
hidden in vertical or reversed position.

The main methods are:


Masking
In
a text there could be sentences or words starting with certain letters,
which have another
meaning. There can also be metaphors, etc. In so far
all kinds of jargons are in fact masking.

Cues
A certain word
appearing in the text transports the message. This message is very often used in
wartime to broadcast information to resistance groups in the enemy's country.

Null-ciphers
The hidden text could be reconstructed by taking the first (second,...) letter of each word (or after
the punctuation mark, etc.).
Hidden messages could also be found vertically, diagonally or in reversed order. It could also be

necessary to re-write the open text in other form (e.g. with a certain number of letters per line).

http://hackersonlineclub.com/steganography/[2/16/2016 8:43:54 PM]


Steganography - HackersOnlineClub

# Semagrams hide information by


the use of symbols or signs. A visual semagram uses
innocent-looking or
everyday physical objects to convey a message, such as doodles or the

positioning of items on a desk or Website. A text semagram hides a message by modifying the
appearance of the carrier text, such as subtle changes in font size or type, adding extra spaces,
or different flourishes in letters or handwritten text.

As an increasing amount of data is stored on computers and transmitted over networks, it is not
surprising that steganography has entered the digital age. On computers and networks,
steganography applications allow for someone to hide any type of binary file in any other binary
file, although image and audio files are today's most common carriers.

Steganography provides some very useful and commercially important functions in the digital
world, most notably digital watermarking. In this application, an author can embed a hidden
message in a file so that ownership of intellectual property can later be asserted and/or to
ensure the integrity of the content. An artist, for example, could post original artwork on a
Website. If someone else steals the file and claims the work as his or her own, the artist can
later prove ownership because only he/she can recover the watermark . Although conceptually
similar to
steganography, digital watermarking usually has different technical goals. Generally
only a small amount of repetitive information is inserted into the carrier, it is not necessary to
hide the watermarking information, and it is useful for the watermark to be able to be removed
while maintaining the integrity of the carrier.

>>Steganography Tools:-

Online Tools

http://www.spammimic.com

http://www.gdataonline.com

Softwares:

1. S Tools
S-Tools hides in a variety of cover media. This software is a good
illustration of different versions
hiding in different media. These
versions cover hiding in BMP, GIF, WAV, and even on unused
floppy disk
space.
Download:- http://www.spychecker.com/program/stools.html

2.MP3Stego.
which hides text files within larger text files, and lastly a tool that hides files in MP3s called MP3
Stego
Download:- http://www.petitcolas.net/fabien/steganography/mp3stego/index.html

http://hackersonlineclub.com/steganography/[2/16/2016 8:43:54 PM]


Steganography - HackersOnlineClub

3.Steganos Suite
Tested one commercial steganography product, Steganos Suite.

4.Camouflage 2.0

5.Dmagic.
Hides files and folders on Windows systems

6.Hermetic Stego
by Peter Meyer, Hermetic Systems This program is capable of hiding in a BMP image or across
multiple BMP images.
Download:- http://www.hermetic.ch/hst/hst.htm

7.jpeg-jsteg
DOS hides information in the DCT coefficients of JPEG's JFIF image format.
Download:- http://www.nic.funet.fi/pub/crypt/steganography/

8.Snow
Snow (also variants include !SnowDOS, SnowJava, JSnow
By Matthew Kwan is available in
both DOS and JAVA executable formats.
"snow exploits the steganographic nature of
whitespace. Locating
trailing whitespace in text is like finding a polar bear in a
snowstorm. And it
uses the ICE encryption algorithm, so the name is
thematically consistent.
Download:- http://www.darkside.com.au/snow/index.html

9.Steghide
Source code is aviailable and several ports are available for different
operating systems.
IMAGES: (BMP) AUDIO: (WAV, AU )
Download :- http://steghide.sourceforge.net/

10.wbStego
wbStego is a steganography to hide data in bitmaps, text files and HTML files.
Download:- http://www.8ung.at/wbailer/wbstego/


Copyright © 2008-2009 Design & Developed By PRIYANSHU. Site Best viewed in Firefox with
1024x768 screen resolution.

http://hackersonlineclub.com/steganography/[2/16/2016 8:43:54 PM]

You might also like