From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Using steganography

Using steganography

From the course: Ethical Hacking: System Hacking

Start my 1-month free trial

Using steganography

- [Narrator] Steganography is hiding in plain sight and dates back to over 2,500 years. Steganography has three basic elements. We need some type of carrier, such as music or an image that must be able to pass as the original and appear harmless. Then we have the payload which is generally the secret message. Then that using steganography software becomes the hidden message. Now no one outside of the sender and the receiver should suspect anything. Because of digital technology, we can embed a payload in any number of carriers; images, documents, video, or audio. Closely related to steganography is a watermark. Now there are literally hundreds of steganography tools. Some examples include MP3Stego, which can utilize MP3s. S-Tools which can use bitmaps, GIFs or WAVs. And OpenPuff is a professional steganography tool that has a wide range of carriers it can use, including PNGs, MP3s, or even PDFs. I'm at the command…

Contents