Skip to main content

Questions tagged [steganography]

Steganography is the art of hiding data within other data. Ann sends a message to Bob. With encryption Eve could see the message but not read it. With steganography Eve would not see the message.

0 votes
0 answers
53 views

EEPROM with HDD calibration data

I understand that in a Hard Disk Drive (HDD) there is EEPROM which stores calibration data. This is not directly accessible by any ring-3 (usermode) or ring-0 (kernel mode) programs. I was curious as ...
user5623335's user avatar
2 votes
1 answer
268 views

Is hiding passwords in an image file a safe place to store them?

I don't even know if this counts as steganography, but I have some passwords that are randomly generated characters. I have saved them by simply opening a picture file using a text viewer and pasting ...
ajax's user avatar
  • 21
0 votes
1 answer
124 views

Covert channel definition conflicts regarding steganography

I'm under the impression that stegonographic manipulation of file names or packet timing would qualify as a storage covert channel and a timing covert channel respectively. I came across this ...
P Malak's user avatar
4 votes
0 answers
337 views

Detecting messages embedded in a jpg image with OutGuess

To begin, please someone correct me if I am wrong, but I believe OutGuess was definitively broken in the paper "Attacking the OutGuess" in 2002 and this attack was never patched. It seems ...
Chessnerd321's user avatar
1 vote
1 answer
146 views

Secrecy of the method in steganography

Is it considered a bad practice to use a secret method to encode data in steganography? We all know that it is a bad practice in cryptography, for at least two reasons: A public method can be checked ...
reed's user avatar
  • 15.8k
-1 votes
1 answer
251 views

Steganographically hide encrypted packets for VPN, Tor, etc?

We all know about different encryption methods used today in secured connections like VPN, Tor, etc. However, there is an issue with usage of those. Even if the outsider can not decrypt the message, ...
user184868's user avatar
1 vote
0 answers
526 views

How to encrypt and hide a GNU/Linux operating system and create a decoy system?

My goal is to be protected against key disclosure laws and possible extortion. I know dm-crypt can be used to perform full disk encryption for GNU/Linux distros. However, it is not enough. I want to ...
Curiosus Hominem's user avatar
1 vote
1 answer
243 views

Real-world application of network steganography

I recently came across a topic of network steganography, mostly connected with modifying the headers of IP, TCP, ICMP. I was looking for some real-world examples of malware that uses it. I only found ...
roffensive's user avatar
0 votes
0 answers
229 views

Are any social media sites sanitizing images?

I'm new to steganography. I have some questions about images on social media sites. I saw that Facebook recently patched a vulnerability on Instagram, but I was wondering whether any of the major ...
Lyndey's user avatar
  • 1
1 vote
2 answers
670 views

Hiding text string with steganographic method - practical problem

I'd like to ask for small hint with following problem: Using the steganographic method of the least significant bits, hide the text string "Kra" in four pixels of color with RGB code . Hide ...
Filip CZ's user avatar
0 votes
1 answer
715 views

Steganography CTF question

I have recently participated in a CTF competition and failed in the following stage where the solution was never revealed. After a really hard job I got access to a text file that contains a really ...
user245607's user avatar
0 votes
0 answers
41 views

What can a jpg with a small width and height hide? [duplicate]

I'm new to cybersecurity. I am participating in the cybersec challenge. I have an image to analyze. This image is small but super heavy. I thought that there was a message hidden behind but all my ...
Revolucion for Monica's user avatar
0 votes
0 answers
55 views

How to analyze files for malware using steganography? [duplicate]

There are ways that a file [.jpg, .pdf, .png, etc..] can contain a malware using steganography. How can a file be analyze in order to verify it doesn't contain any malware?
fp007's user avatar
  • 101
0 votes
1 answer
2k views

How to detect malware in images

Do commercial AV suites examine image files (pictures) for potential malware that might be imbedded via steganography? Is this a concern for most? I deal with a lot of imagery data and am wondering ...
wazzu62's user avatar
0 votes
2 answers
3k views

Which would be the best "keyfile" for KeepassXC and/or Veracrypt?

I am a Mac user. I opened a keyfile generated by Veracrypt and one generated by KeepassXC. The texts in both of them were quite short. Which keyfile is best (i.e., most random and harder to break ...
bash27's user avatar
  • 3

15 30 50 per page
1
2 3 4 5
9