Steganography -
================= hdjdnmldkdndnm
Hjsjsnbsbsbsbjskkeiendnmxmdldkxbbxnxmm
Steganography greewho bbbxndnxxbxbxbjdndmdnxbbxbdjjjwhdjkdonxbxbxhjdndnnxjxjxjxnxnnjcxnnxnxnxndnnndnndnddnndndndndnndndndndnndnd
Easy-to-understand terms,
Buried in a file in the file open
The naked eye can not see hidden bxndnmxnxnnxnxnxnmxmxmmxxkkkdjddmmdmd.x.xm
Well ....
For example, in a photo or video An xnxnbdhsjksmsndnxnxnxnnxnxjxjjjjhdjdfjdjfffnnfjdftransport layer
Add the text file, program file.
If the ordinary and simple photo audio video ...
On this November or Goh said.
In this tutorial are included by default in Kali Pi
using steghide wipe off.
If steghide not yet been
apt-get install steghide install.
! [Image] ()
GUI is not going to work with the command from the terminal.
Bnxkxjbdndnsjsjshdhdhdbdnnd
Let's okay ... ....
Nxnjdmmnfncncmkdhdndnmcjcbnc
==================================================
(Displays each image below to add) bxnmddjvdxnmxhdhxbjxjxgdbndkdidygdndkdudhfbnckchxbxmxuh
Hdndjjdjdjddndjjxjxjxjxjxjxjxjxjxjjdjjjxjdjjdjdj xnxhbdmdjdhddbjdhdjdhdbbdbdjdjjfhfnbn
Gbnjhnjhvnjjhbnnj
(1) steghide --help
How's the usual options before using.
We will see the so called ls.
In my folder stego.jpg
I pre-created test.txt
There are two file.
test.txt in any written already saved .bnnmjbdndnxbnxmxjjsnsdnmd
Jnsnslsuddbmsjsbndkxxn
==================================================
(2) steghide embed -cf stego.jpg -ef test.txt
Let us use the command ပြန်ရှင်း -djndmxkhxbx
Bhsjskwhvsnsmdjbdbdnndbdndndmxmmdndnd.mdmdmdmdmmdkdndnmdmd
embed is now indicating that it will add will have embeded
-cf cover file or the original file
You can --coverfile
I stego.jpg of file selection.
Bdmxmkddndndmmdjdd.x.mx
-ef will embed the file.
--embedfile also can be used.
I'll select a pre-created file test.txt.
It will be asked to enter a password when you click.
Opposing twice Tapas alone.
It will be a convenient, if done.
Xnmdkdjdndnzlajjwjwhejnndndmdkjd
==================================================
(3) steghide info stego.jpg
Xbndmkwbsnsjsjdndnjdjdjjdjdnbdndndnndndnnxnxnxnnx
Mdmdkdkjdnd
Jjsjsnmldjndmdkejenmd
In Level 3, we recently when a text file
We will check whether called stego in jpg.
info do not think we need an option
during the photo
Check whether a file using steganography techniques and then combined .ndnms [wjsbndmdkkd
D
Dndhkdkemd bdnmdjdjndndmmdmmddmdmdmmdndmdm
Try to get information about embedded data? (Y / n)
မေးလာရင် data within clause
Type y when will request a password
The previous password to enter.
Nxndkejhendnmdkdkdjndmd
As you can see in the picture ....
embedded file "test.txt":
size: 24.0 Byte
So I know that in the file test.txt speaker ....
=========================== ndjdjjehennd
Jsjjeme
Ejj
Hejednheuekem
Jeieolemdheuiele.dbhdkekvdgdukekdhdhiekekndnd
Bnsjdhndndkdkhdndndndjdjjdjjdj =======================
(4) steghide extract -sf stego.jpgndkdueggebdndjfwcsbnd
extract option onto the picture
Extracted file test.txt down.
I will request a password
This recently given password.
We have a file test.txt to Son
overwirte're absolutely .dnndjdjekkdmdnndndmm
Therefore, if there is no peace. Sbjsjsgsbsnsjhddndnmdmmdkdjdhdnndmdkbd
Hshjsksbxghsiwmxvgeiwonxgydjekbxhdhjdnbxhdjdkdjkdndndkd will extract in the future.
I finally chose y.
wrote extracted data to "test.txt".
cat test.txt
During test.txt will see the List of Content.
Dnndjdjemekekdjhdndndkkdjjjjjjjjkkdndndjdkdkmnjjdkkdkdkdmncnndjdkdmmdnbdbfnfjk
I explain my very basic.
Probiotics help ...
Then study suggests.
! [Image] ()
To see more Stegano Crypto hjsmnwiiwmwbdhdjsn
with respectjkskensbshjekemsbvxnslwjwgdmdjgwkwisgdbdmkdhdh
! [Image] (https: //img.este
respectjkskensbshjekemsbvxnslwjwgdmdjgwkwisgdbdmkdhdh