LightBlog

Thursday 29 November 2018

Ethical Hacking Tutorials - What is Stegnography?

Ethical-Hacking-Tutorials-Stegnography






Ethical Hacking Tutorials - What is Steganography?


Greek Words: Steganography is a practice to hide a file, message, image, or video within another file, message, image or video. Steganography combines the Greek words

STEGABOS - "Covered"

GRAPHIE - "Writing"

  • Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message.
  • This can be achieved by concealing the existence of information within seemingly harmless carriers of cover.
  • Carrier: Steganography con used in the text, images, videos, audio and etc.
Steganography includes hidden information within computer files. In digital steganography, electronic communication may include steganographic coding within a transport layer, such as a document file, image file, program, or protocol. 

Media files are ideal for steganographic transmission due to their large size.

Ethical-Hacking-Tutorials-Stegnography


For example, a sender might start with an innocent image file and can adjust the color of each hundred pixels corresponding to one letter in the alphabet. 

The change is so subtle that the person who is not specifically searching for it, that change is not likely to be kept in mind


History and Evolution of STEGNOGRAPHY



Steganography techniques have been used for ages and they date back to ancient Greece. The aim of steganographic communication back then and now, in modern applications, is the same: to hide secret data (a sonogram) in an innocently who is aware of the information hiding procedure. 

In an ideal situation, the existence of hidden communication cannot be detected by third parties.

Herodotus 

The first use of steganography is reported by Herodotus, the so-called father of history, who mentions that in ancient Greek, the hidden text was written on wax tablets
  1. write a message on a tablet and covered it with wax
  2. Secret letters can be hidden in the messengers' shoe soles
  3. Use pigeons to carry secret notes
  4. Woman's earrings
  5. A very common steganographic scheme in history was the use. Invisible ink (like urine or milk), is still be used by a lot of children (e.g. lemon-based ink)

Types of STEGNOGRAPHY


  1. Tech Steganography
  2. Image Steganography
  3. Audio Steganography
  4. Video Steganography

It Uses Ethical Hacking and Non-Ethical Hacking


Steganography is widely used for centuries. Here are some

  • Hacker can embed all sorts of Malware to an unsuspecting user. Typically, an image file is attached to an email with an attractive header, the user clicks on it and the embedded file gets executed.
  • The terrorist can embed the message
  •  Attackers send Illegal stuff with normal video
  • Hidden messages on papers written in secret ink.
  • In the form of small parts (such as words or letters) between the other words of less suspect cover text, hidden messages are delivered according to a certain rule or key. This particular form of steganography is called a zero.
  • Messages written in Morse code on the front and then knitted message in pieces of clothing worn by a courier.
  • A message wrote on the envelope in the area covered by postage stamps

Tools are Used in  Steganography


  1. Xiao Stegnography
  2. StegSpy
  3. Steghide
  4. QuickStego
  5. Open Stego
  6. OpenPuff
  7. SilentEye

Related: 

Tags: steganography,what is steganography,what is steganography and how it works,stegnography,stenography,steganography in hindi,image steganography,image steganography tutorial,what is use steganography,what is steganography in hindi,what is steganography in cryptography,what is steganography on technical vani,stegonography,what is security,what is incryption,steganography practical tutorial

No comments:

Post a Comment