How to Hide (Steganography) Files in the Photo | MP3 | Video and Email Free with free latest software
What is the steganography?
- Hidden information in the Text Files
- Hidden information in the Image Files
- Hidden information in the Document Files
- Hidden information in the Video Files
- Hidden information in the Audio Files
- Hidden information in the E-Mails
How to Hide the File behind an Images:
The Document Steganography hide you file in the document:
How to Hide the File behind Audio [Audio Steganography]
How to Hide the File’s behind the Video (Video Steganography)
How to Send the Hidden Text in the Mail (Email Steganography)
The Spam Mimic
The Spam Mimic to visit the website .
What is the use of Steganography?
There are many ways to conceal information using Steganography. The most common method is by embedding information into digital images. We all know that digital images say, a JPEG image, contains several megabytes of data in the form of pixels. This allows some room for someone to embed steganographic information within the digital file. With the use of steganographic applications, a hacker alters the least significant bits of the data file and embeds a malicious code into the image. Once the targeted user downloads and opens the image file in their computer, the malware is activated. Depending on its programming, the malware can now open a leeway for the attacker to gain control over the user’s device or network. The danger of Steganography is that the difference between the original image and the steganographic image is subtle and the two cannot be distinguished by the naked eye.
Is Steganography still used?
Yes, Steganography is still popular among cyber criminals. Recent attacks show that security researchers found a new malware campaign that used WAV audio files to hide their malware. It is believed that the attackers used Steganography to embed the malicious code inside the WAV audio file.
3 Techniques used in Steganography
1. Least Significant Bit
In this Steganography method, the attacker identifies the least significant bits of information in the carrier image and substitutes it with their secret message, in this case, malicious code. When the target downloads the carrier file, they introduce the malware into their computer which allows the attacker access to this device and the hack begins. Cybersecurity professionals commonly use sandboxes to detect these corrupt files. However, black hat hackers have invented various methods of bypassing sandboxes like sleep patching. Sleep patched malware is not easily detected by the sandbox since it poses as benign and buys time while studying the timing artifacts of the sandbox and executes when the sandbox is vulnerable.
2. Palette Based Technique
This technique also uses digital images as malware carriers. Here, the attackers first encrypt the message and then hide it in a stretched palette of the cover image. Even though this technique can carry a limited amount of data, it frustrates threat hunters since the malware is encrypted and takes a lot of time to decrypt.
3. Secure Cover Selection
This is a very complex technique where the cyber criminals compare the blocks of the carrier image to the blocks of their specific malware. If an image with the same blocks as the malware is found, it is chosen as the candidate to carry the malware. The identical malware blocks are then carefully fitted into the carrier image. The resulting image is identical to the original and the worst part is that this image is not flagged as a threat by detection software and applications.
These are just but a few methods by which black hat hackers frustrate ethical hackers using Steganography. Steganography allows attackers to operate in stealth mode while conducting a serious attack. Most of these attacks are zero-day exploits which give threat hunters sleepless nights. Some preventive measures against Steganography include the deployment of security patches, updating software, and educating end-users.
Receiving ethical hacking training from EC-Council will equip you with the knowledge and skill to learn how the adversaries are breaking into networks and wreaking havoc. Once professionally trained, you will receive the Certified Ethical Hacker (CEH) certification. This will show organizations that you are well-versed in over 340 attack technologies that are commonly used by black hat hackers and white hat hackers, alike.
thanks for reading . if you like so comment below.
7 comments:
nice noman
thanks hasan
Fantastic blog and love this blog because this is the best way for me.
Hello, i think that i saw you visited my weblog
thus i came to “return the favor”.I'm attempting to find things to improve my web site!I suppose its ok to use a few of your ideas!!
Also visit my blog post; http://dermolytereview.com
can u mail me source code for oursecret s/w.....
vino.siva.raja@gmail.com
can u mail me source code of oursecret s/w...
vino.siva.raja@gmail.com
Acting deals with very delicate emotions. It is not putting up a mask. Each time an actor acts he
does not hide; he exposes himself. See the link below for more info.
#hide
www.ufgop.org
Post a Comment