Skip to main content

Steganography--Dangerous Hacking Technique

Picture1
Steganography is the art and science of hiding messages. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read. The word steganography is derived from the Greek words “steganos” and “graphein”, which mean “covered” and “writing.” Steganography, therefore, is covered writing. Historical stenganography involved techniques such as disappearing ink or microdots. Modern steganography involves hiding data in computer files. It is fairly easy to hide a secret message in a graphic file without obviously altering the visible appearance of that file. 

Steganography Softwares

  • OutGuess  is a universal steganographic tool that allows the insertion of hidden information into the redundant bits of data sources. The nature of the data source is irrelevant to the core of OutGuess. The program relies on data specific handlers that will extract redundant bits and write them back after modification. In this version the PNM and JPEG image formats are supported. In the next paragraphs, images will be used as concrete example of data objects, though OutGuess can use any kind of data, as long as a handler is provided.
  • F5  is a publicly available steganography software package which hides messages in BMP, GIF , and JPG graphics.
  • Camera/Shy  is the only steganographic tool that automatically scans for and delivers decrypted content straight from the Web. It is a stand-alone, Internet Explorer-based browser that leaves no trace on the user’s system and has enhanced security.
  • JPHIDE and JPSEEK are programs which allow you to hide a file in a jpeg visual image. There are lots of versions of similar programs available on the internet but JPHIDE and JPSEEK are rather special. The design objective was not simply to hide a file but rather to do this in such a way that it is impossible to prove that the host file contains a hidden file. Given a typical visual image, a low insertion rate (under 5%) and the absence of the original file, it is not possible to conclude with any worthwhile certainty that the host file contains inserted data. As the insertion percentage increases the statistical nature of the jpeg coefficients differs from “normal” to the extent that it raises suspicion. Above 15% the effects begin to become visible to the naked eye. Of course some images are much better than others when used a host file – plenty of fine detail is good. A cloudless blue sky over a snow covered ski paradise is bad. A waterfall in a forest is probably ideal.
  • MP3Stego will hide information in MP3 files during the compression process. The data is first compressed, encrypted and then hidden in the MP3 bit stream. Although MP3Stego has been written with steganographic applications in mind it might be used as a copyright marking system for MP3 files (weak but still much better than the MPEG copyright flag defined by the standard). Any opponent can uncompress the bit stream and recompress it; this will delete the hidden information (actually this is the only attack we know yet) but at the expense of severe quality loss.
  • Steghide is a steganography program that is able to hide data in JPG, BMP, WAV, and AU files. The color frequencies are not changed thus making the embedding resistant against first-order statistical tests.
  • Hydan steganographically conceals a message ito an executable. It exploits redundancy in the i386 instruction set by defining sets of functionally equivalent instructions. It then encodes information in machine code by using the appropriate instructions from each set. The executable filesize remains unchanged. The message is Blowfish encrypted with a user-supplied passphrase before being embedded.
The 1st method that We will Study Here Is Using command Prompt. 

To hide a file behind a image.

To hide a file behind a image file which means that if any one opens that image he will see the image only but if you open in a special way then you can open the hidden file behind the image.
So to hide the file behind a image open CMD.exe 
Picture2
1) Select an image to be used for hiding file behind the image.
2) Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
3) And most important is that paste both the files on desktop and run the following command on the command prompt.
4) And then type the following command.  { cd } { Copy /b imagename.jpg + filename.rar finalnameofimage.jpg } 
Picture3Picture4
And then hit enter the file will be created with the file final file name of the image. 
“ Using This method for The illegal Activities is against the Laws this tutorial is for educational purpose only “.
“ You Can Also Use The softwares for the steganography like STEGHIDE Or F5 which will make your work easy and time efficient “.
There is also another kind of Steganography known as frequency steganography or sound steganography. An excellent software for this is Sonic Visualizer.
Sonic_Visualizer
So friends I hope that my post showed a little light in this vast field.
Now you can start sending secret messages to your friends because “Knowing is not Enough…You must Apply…”

Comments

Popular posts from this blog

How To Root the Xolo Q700 and flash CWM Recovery

Do you want to root Xolo q700? Do you want to install CWM recovery and take backups, install custom ROMs and do more? Well, here's a step by step method to root the phone and install CWM recovery.  Requirements: The Xolo Q700 phone fully charged Download the USB and ADB drivers for the Xolo Q700 from  here  and  here Download the Motochopper rooting utility from  here Download the flash tool for the recovery from  here Download the recovery image from  here Download the necessary drivers and tools to a folder on your desktop and extract the archives to their respective folders. First, we shall root the phone and later install the CWM recovery patch. Make sure you have administrative rights on your Windows PC before you proceed. Install the necessary driver(s) Rooting the Xolo Q700 For this, we will need the USB and ADB drivers installed. Go ahead and install the drivers (usually one driver should work, but in certain cases, you would have to install bo...

How To Install Wordpress in Linux server

  Hello friend's In this session i am going to tell you how to install Worldpress in Linux server, Wordpress is open source blogging tool and CMS based on PHP and mysql which runs on a web hosting service. Wordpress is use by more then 18.9% of the top 10 million website. In order to install wp we have to configure the   web server   & mysql server. So now i am going to configure mysql database, As you can see sql database has been configured successfully and time to download Wordpress and configure the same, I already downloaded wordpress zip file, Ok guys we successfully configured the wordpress config file and added the our mysql database, user and password, all configuration done now time to move and install wordpress Go to you browser and type http://localhost (i did not configure dns server so i put localhost if you already install dns server then type you website name ) and fill required information After filling the same click to install Bingo :) wordpress ins...

Turn Your Cell Phone Into Jammer

 I have managed to build my own cell phone jammer, at last! And now  you  can do the same. Steps Working Principles . This cell phone jammer operates at GSM800 frequency since most mobile phones use it to operate. So the selected VCO is a sweeping oscillator, which is very effective but may be hard to construct for the beginners without nice RF-testing equipment. As a noise source you can use 45MHz clock oscillator which is driving Local Oscillator port located on a mini-circuit mixer. There is also an impedance matching network for Local Oscillator signal to pass through it. It is used to equate impedances of the clock oscillator and the port of the mixer. RF input (which is this port of the mixer) connected to the first 800MHz cell phone antenna, and the RF output is sent to the mini-circuit amplifier. This amplifier increases the output power for 15-16dbm. The amplified signal then sent to the second cell phone antenna. How It Works ?   All cell phones which use G...