Pages

Subscribe:

Friday 21 August 2020

Steghide - A Beginners Tutorial




All of us want our sensitive information to be hidden from people and for that we perform different kinds of things like hide those files or lock them using different softwares. But even though we do that, those files  attractive people to itself as an object of security. Today I'm going to give you a slight introduction to what is called as Steganography. Its a practice of hiding an informational file within another file like you might have seen in movies an image has a secret message encoded in it. You can read more about Steganography from Wikipedia.


In this tutorial I'm going to use a tool called steghide, which is a simple to use Steganography tool and I'm running it on my Arch Linux. What I'm going to do is simply encode an image with a text file which contains some kind of information which I don't want other people to see. And at the end I'll show you how to decode that information back. So lets get started:


Requirements:

1. steghide
2. a text file
3. an image file

After you have installed steghide, fire up the terminal and type steghide




It will give you list of options that are available.


Now say I have a file with the name of myblogpassword.txt which contains the login password of my blog and I want to encode that file into an Image file with the name of arch.jpg so that I can hide my sensitive information from the preying eyes of my friends. In order to do that I'll type the following command in my terminal:


steghide embed -ef myblogpassword.txt -cf arch.jpg




here steghide is the name of the program

embed flag is used to specify to steghide that we want to embed one file into another file
-ef option is used to specify to steghide the name (and location, in case if its in some other directory) of the file that we want to embed inside of the another file, in our case its myblogpassword.txt
-cf option is used to specify the name (and location, in case if its in some other directory) of the file in which we want to embed our file, in our case its an image file named arch.jpg

After typing the above command and hitting enter it will prompt for a password. We can specify a password here in order to password protect our file so that when anyone tries to extract our embedded file, they'll have to supply a password in order to extract it. If you don't want to password protect it you can just simply hit enter.


Now myblogpassword.txt file is embedded inside of the image file arch.jpg. You'll see no changes in the image file except for its size. Now we can delete the plain password text file myblogpassword.txt.


In order to extract the embedded file from the cover file, I'll type following command in the terminal:


steghide extract -sf arch.jpg -xf myblogpass.txt




here steghide is again name of the program
extract flag specifies that we want to extract an embedded file from a stego file
-sf option specifies the name of the stego file or in other words the file in which we embedded another file, in our case here its the arch.jpg file
-xf option specifies the name of the file to which we want to write our embedded file, here it is myblogpass.txt
(remember you must specify the name of file with its location if its somewhere else than the current directory)

After typing the above command and hitting enter, it will prompt for a password. Supply the password if any or otherwise just simply hit enter. It will extract the embedded file to the file named myblogpass.txt. Voila! you got your file back but yes the image file still contains the embedded file.


That's it, very easy isn't it?


It was a pretty basic introduction you can look for other things like encrypting the file to be embedded before you embed it into another file and so on... enjoy
:)

Related posts


  1. Pentest Tools
  2. World No 1 Hacker Software
  3. Hacker Tools Github
  4. Physical Pentest Tools
  5. Pentest Tools Tcp Port Scanner
  6. Blackhat Hacker Tools
  7. Hack App
  8. Pentest Tools Github
  9. Hacker Tools 2019
  10. New Hacker Tools
  11. Ethical Hacker Tools
  12. Hacking Tools Windows 10
  13. Pentest Tools Website Vulnerability
  14. How To Install Pentest Tools In Ubuntu
  15. Hacker Hardware Tools
  16. Hacker Tools Windows
  17. Hacking Tools Github
  18. Game Hacking
  19. Hacker
  20. Pentest Tools Tcp Port Scanner
  21. Pentest Tools For Android
  22. Pentest Tools Bluekeep
  23. Hacking Tools Online
  24. Pentest Tools Online
  25. Hackers Toolbox
  26. Hacking Tools Usb
  27. Hacker Tools Windows
  28. Hack Tools For Mac
  29. Best Hacking Tools 2019
  30. Hacker Search Tools
  31. Pentest Tools Windows
  32. What Are Hacking Tools
  33. Easy Hack Tools
  34. Hacking Tools Online
  35. Nsa Hacker Tools
  36. Tools For Hacker
  37. Hacker Tools For Pc
  38. How To Make Hacking Tools
  39. Hacker Tool Kit
  40. Hacking Tools Software
  41. Hack Tools For Games
  42. Hacker Tools For Windows
  43. Hackers Toolbox
  44. Pentest Tools For Windows
  45. How To Make Hacking Tools
  46. Computer Hacker
  47. Hackers Toolbox
  48. Bluetooth Hacking Tools Kali
  49. Install Pentest Tools Ubuntu
  50. Hacks And Tools
  51. Hacking Tools Download
  52. Hacker Tools Windows
  53. Usb Pentest Tools
  54. New Hacker Tools
  55. Underground Hacker Sites
  56. Nsa Hack Tools Download
  57. Hacker Tools Free Download
  58. Hack Tools For Ubuntu
  59. Pentest Tools For Windows
  60. Pentest Tools Open Source
  61. Hacker Tools Windows
  62. Hacker Tools Windows
  63. Hacking Tools Windows 10
  64. Hack Tools Mac
  65. Hacking Tools Windows 10
  66. Tools For Hacker
  67. Hacking Tools For Windows Free Download
  68. New Hacker Tools
  69. Hacker Tool Kit
  70. Hacker Tools Software
  71. Hack Tool Apk
  72. Hack Tools Download
  73. Pentest Tools Download
  74. Hack Tools Mac
  75. Pentest Tools Tcp Port Scanner
  76. Hacking Tools For Games
  77. Hacker Tools Hardware
  78. Tools 4 Hack
  79. Hack Tools 2019
  80. Blackhat Hacker Tools
  81. Hack Tools 2019
  82. Hacker Tools
  83. Pentest Tools Review
  84. Game Hacking
  85. Hacking Tools Free Download
  86. Pentest Tools Subdomain
  87. Easy Hack Tools
  88. Pentest Tools Review
  89. Hack App
  90. World No 1 Hacker Software
  91. Hacker Tools For Pc
  92. Hacker Tools For Pc
  93. Hack Tools For Pc
  94. Pentest Tools Nmap
  95. Tools 4 Hack
  96. Beginner Hacker Tools
  97. Hacking Tools Mac
  98. Pentest Tools Review
  99. Nsa Hacker Tools
  100. Hacking Tools Windows 10
  101. Hacker Search Tools
  102. Pentest Tools Linux
  103. Best Hacking Tools 2020
  104. Kik Hack Tools
  105. How To Install Pentest Tools In Ubuntu
  106. Hacker Tools For Ios
  107. Hacking Tools Name
  108. Android Hack Tools Github
  109. Hackrf Tools
  110. New Hack Tools
  111. Pentest Tools Linux
  112. Hack Tools Mac
  113. Pentest Tools Linux
  114. Hacker Tools Free Download
  115. Hacker Security Tools
  116. Pentest Tools Website Vulnerability
  117. How To Make Hacking Tools
  118. Hacking Tools Software
  119. Hacking Tools Windows 10
  120. Hacker
  121. Pentest Tools Subdomain
  122. Pentest Tools Android
  123. Pentest Tools Online
  124. Easy Hack Tools
  125. Underground Hacker Sites
  126. Pentest Tools Linux
  127. Hacking App
  128. Hackers Toolbox
  129. Kik Hack Tools
  130. Easy Hack Tools
  131. Hack Tools Github
  132. Game Hacking
  133. How To Hack
  134. Pentest Tools Framework
  135. Hacker Tools Linux
  136. Pentest Tools List
  137. Pentest Tools List
  138. Hacker Tools For Windows
  139. Hacker Tools For Windows
  140. World No 1 Hacker Software
  141. Hacker Tool Kit
  142. Hacker Security Tools
  143. Hack Website Online Tool
  144. Hacker Tools Mac
  145. Pentest Tools
  146. Hacking Tools Online
  147. Hacker Security Tools
  148. Hack Tools 2019
  149. What Are Hacking Tools
  150. Hacking Tools Usb
  151. Hacking Tools Hardware
  152. How To Hack
  153. Hacking Tools For Kali Linux
  154. Underground Hacker Sites
  155. Pentest Tools For Ubuntu
  156. Pentest Tools Android
  157. Hacker Tools For Pc

No comments:

Post a Comment