Today there are hundreds of Steganography tools available. Join Lisa Bock as she demonstrates Steganography, using S-Tools. Observe how she takes two exact images, and then embeds a secret message in one and then encrypt the payload. See how the document has not visibly changed. Discover how you can reveal the secret document.
- [Voiceover] There are literally hundreds of steganography tools available out there today. However the one that I like to show and is easy to follow along with is one of the original steganography tools, which is called S Tools. I'm at this website here, Professor Tennenbaum's website. And here we can download S Tools so you can try it out. I'll place my cursor right here and download and save the zip file, which I have done and unzipped it and I placed it at my desktop.
I've opened the folder where it's at and it's at this icon right here, S Tools, which is the application. Let's open it. I've also opened a picture folder that's on my desktop and there are two small bit map files, Jasper1 and Jasper2. Now I've opened this because I want to show you that these two images are exactly the same size because I simply copied the one and made it into Jasper2. I also have a secret text document there and I'm going to put that into Jasper1.
Now let's take a look. I'll slide over Jasper1 and Jasper2. I'm gonna resize the window but I'm gonna hold that open because we want this secret text document to be inputed into Jasper1. to be inputed into Jasper1. Give myself some more landscape. And now let's compare. When looking at Jasper1 and Jasper2 you really can't see any difference. Of course cause they are essentially the same image. Let's take a look at that secret document, which is a small text file.
I'm gonna put it in Jasper1. Now it's asking me for a passphrase so it can encrypt it. I'm simply gonna type C-A-T and verify the passphrase, C-A-T, and we'll say okay. Now here's where we can see Jasper, which has hidden data. I'll say save as. And we put it in the same folder and we'll say Jasperhide.bmp. and we'll say Jasperhide.bmp.
Now again we won't be able to see any difference because it was a really small text file. Now within this is actually that secret file and how do I get it? I'm gonna right click and I'll say reveal. I'll put the same passphrase, C-A-T. Verify, C-A-T. And up here we see the revealed text file, secret.txt. And up here we see the revealed text file, secret.txt. Now I can save it back into my folder. I'll say save as.
I'm going to put SecretDoc.txt, I'm going to put SecretDoc.txt, let's help it so we add an extension. And say save. Now I can get that secret doc. And we can see what I put in to that message, this is a secret message. So we can see using steganography, we can hide documents in plain sight.
These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Acquiring passwords
- Generating rainbow tables
- Understanding where passwords are stored
- Defending against privilege escalation
- Understanding spyware
- Protecting against keylogging
- Detecting steganography
- How hackers cover their tracks