Conceal Secret Messages or Data Through Steganography with Steghide [Tutorial]

Поделиться
HTML-код
  • Опубликовано: 28 авг 2024
  • How to Hide Data in Audio or Image Files
    Full Tutorial: nulb.app/x47ol
    Subscribe to Null Byte: goo.gl/J6wEnH
    Kody's Twitter: / kodykinzie
    Cyber Weapons Lab, Episode 031
    Steganography was in the news recently when Russian hackers used Instagram photos to control compromised routers. On this episode of Cyber Weapons Lab, we'll explain how to encode secret information on an image or audio file using Steghide.
    To learn more, check out the article: nulb.app/x47ol
    Follow Null Byte on:
    Twitter: / nullbyte
    Flipboard: flip.it/3.Gf_0
    Website: null-byte.com
    Weekly newsletter: eepurl.com/dE3Ovb
    Vimeo: vimeo.com/chan...

Комментарии • 145

  • @Magicwinguy
    @Magicwinguy 6 лет назад +55

    Absolutely loving the videos on this channel!

  • @DanDan-hf2qy
    @DanDan-hf2qy 5 лет назад +16

    I cant uNdErStAnD people who dislike this kind of videos, great videos you have on your channel bro

    • @erikkrakauskas1009
      @erikkrakauskas1009 3 года назад

      i doth think that they are haters i think that they just dont like an elament in the video for example(it takes to long to get to the point)

  • @Magicwinguy
    @Magicwinguy 6 лет назад +20

    A steg tool I've used in the past is the digital invisible ink toolkit, it has a GUI for people that like that, and allows you to use different methods of implanting your file in the image it's pretty cool :)

  • @DDBAA24
    @DDBAA24 6 лет назад +3

    Wow, you guys are really pumping these videos out. I am grateful. I remember using SilentEYE on windows a long time ago. Even cooler was encoding encrypted files into MP3's like my boy Elliot on mr robot lol. Acutally I believe you guys even did an artical on DeepSound probably 3 or 4 years ago now.

    • @DDBAA24
      @DDBAA24 6 лет назад

      Nice, you tagged the old article from 2015 in the new article for this tutorial. I was watching a video a couple months ago that was a cool topic. Compromising iOS and Android phones has become difficult without user interaction. So the key to the castle is compromising the WiFi stack. Every phone is broadcasting Beacon and probe frames calling out desperatly trying to find trusted networks such as the Home network. So using airplay you record these frames obtaining the actual names of trusted and home networks. Then create an AP with the same name and it fools the WiFi card into thinking " home sweet home" MEANWHILE lol ... Then they get home and see their cell is strangley already connected to the home network or they dont, either way you've had your fun in the in-between time. I also saw some guy do it at Blackhat some of the names of the networks were hilarious.. Most people live on their phones and tablets, everyone is walking around with a phone, often not a laptop. So that is the point of entry atleast the way I see it. A lot of videos are about exploits, temporary in nature, but what really interests me is true malware and infecting the devices, with something self replicating like a worm that they will take home with them lol. This way when they connect to the network, or plug into their PC it spreads from device to device. Then they are "pwned" and we can start talking about botnets, RAT's and such. Its like a lost art because anti-virus software has become so effiecient, but when there is a will there is a way. The point is to get it done with little to no user interaction which is very difficult without physical access. But you're cyber weapons Sensai , I'm just here to learn. Jus throwing somethings out there for this new platform you spoke about. Thanks again Kody.

  • @EricBoxers
    @EricBoxers 6 лет назад +9

    I really love your channel's videos! Full of information. Thank you so much!

  • @mellyor225
    @mellyor225 6 лет назад +11

    Great Work. The best hacking channel that I have ever watched on RUclips!!

  • @thewebmaster1
    @thewebmaster1 2 года назад +1

    as usual an extremely clear explanation. Took me ten minutes to figure it out and get some messages in cipher embedded within image. Must add though it does not recognize png, but does jpg. U got a like and a sub from me. And i added this video to a playlist on my channel

  • @equallyridiculous8878
    @equallyridiculous8878 5 лет назад +14

    Thats amazing. I would like to know wether it is possible to execute a script when open the image file

    • @curiosity1331
      @curiosity1331 4 года назад +1

      Yep thats possible... It's called binding a payload

  • @themonkeyminds7252
    @themonkeyminds7252 6 лет назад +37

    How bots upadate themselves using steganography ...?? Please make a video on it ..
    Keep it up
    Peace :)

    • @emok1ttyk4t
      @emok1ttyk4t 3 года назад

      my guess is the embedded message executes code when received that in turn installs an update

    • @Joe-zg9eq
      @Joe-zg9eq 3 года назад +1

      The bot regularly looks if the insta acc has posted smth new. If it has, it downloads the pic and extracts info from it, and then do wtv it says

  • @leonelfernandez7565
    @leonelfernandez7565 6 лет назад +2

    I’ve been waiting for this for so long

  • @CodeWithComments
    @CodeWithComments 5 лет назад +1

    Your video really teaches the viewers... Love your videos....

  • @thunderjr1996
    @thunderjr1996 6 лет назад +7

    wow that cat is huge and perfect, I wish I had one like that

  • @aalizwel2061
    @aalizwel2061 6 лет назад +6

    Steganography is Cool!

  • @Daniel_CLopes
    @Daniel_CLopes 5 лет назад +2

    Just another great video. Not surprised!

  • @odpen14
    @odpen14 2 года назад

    Great delivery of the gist!

  • @peterokumu670
    @peterokumu670 5 лет назад

    Dude,You are a perfect teacher

  • @vuleproduction443
    @vuleproduction443 5 лет назад +2

    Ur channel is so god damn awesome

  • @sk42sk221
    @sk42sk221 6 лет назад +1

    Nice videos. What laptop do you use?

  • @namanyadav5668
    @namanyadav5668 11 месяцев назад

    Excellent! Thankyou for the thorough video.

  • @orelg00
    @orelg00 6 лет назад +1

    Great tutorial. Thank you.

  • @KaelAdamTV
    @KaelAdamTV 4 года назад

    Great tutorial, easy to understand, Thanks!

  • @MrDecaliostro
    @MrDecaliostro 5 лет назад

    Incredible! Never heard of this kind of hiding

  • @anuvindtiwari8229
    @anuvindtiwari8229 4 года назад +1

    Hello it's great video.I want to know whether we can use this for file upload vulnerability

  • @robpolk9986
    @robpolk9986 5 лет назад +2

    Since info can be embedded into an image file, makes me wonder if code that's embedded into a photo image could easily be executed by simply viewing that image?

    • @R839jdkk83nHd
      @R839jdkk83nHd 4 года назад +1

      No! To know why, try to read the principle on which Steghide (and similar tools) work. To be short, the code though embedded in the image file, is not in an executable form. You would be obliged to first retrieve the code from the image file before executing it.

  • @sayonaradarling3851
    @sayonaradarling3851 5 лет назад +1

    Thank you null byte.👍👌

  • @cyber222
    @cyber222 5 лет назад

    Awesome knowledge!!!
    very thankful that you share that knowlwge!!!

  • @OrgoneDevices47
    @OrgoneDevices47 4 года назад

    You cover so many things I really wanna learn more... I'm not sure why but after watching mr robot something tells me hacking may suit me lol

  • @nemanjanenadic1192
    @nemanjanenadic1192 5 лет назад +5

    Now I see why you have cat photos in your room

  • @redpilledpatriot6868
    @redpilledpatriot6868 4 года назад

    Commands used: apt install steghide, man steghide (this command shows a description of what the program does), steghide embed -ef '/root/virus.txt' -cf '/root/Image.jpg' -p password (-ef: embedfile -cf: coverfile -p: passphrase), steghide extract -sf '/root/Image.jpg' -p password -xf '/root/viruses.txt' (-sf: stegofile -xf: extractfile).

  • @semtex2978
    @semtex2978 5 лет назад

    brilliantly done. and clear. The best.👍

  • @bernardovallezajr7490
    @bernardovallezajr7490 2 года назад

    Thank you so much for sharing. I'm new with everything with my phone,apps,to what your teaching me. I'm asking and hoping you'll take me under your wing. I want to learn everything that you know. Only if you want to and have time to. I will respect your decision. Hope to hear from you. B. V.

  • @undrhil
    @undrhil 2 года назад

    I played around with this back in the early 00s with Wjndows software.

  • @salmanxd2820
    @salmanxd2820 5 лет назад +2

    Hello... Um .. I have a doubt .. what if we change the filters of the image . Does it affect the data encoded on the pic ... 😘😍

  • @dagamer9978
    @dagamer9978 3 года назад +1

    *Fat cat is now officially an Fat bird*

  • @kemonoyama2084
    @kemonoyama2084 6 лет назад +2

    Awesome!

  • @bialutki999
    @bialutki999 5 лет назад

    Awesome work !

  • @zephyr1018
    @zephyr1018 6 лет назад +3

    Hey I've seen videos like these I really want to know more about these

  • @mamoun4626
    @mamoun4626 4 года назад +1

    i get : can't find the package steghide
    what to do ?

  • @maomxesoax2471
    @maomxesoax2471 5 лет назад

    I think you would like my Fontepx prog. It creates one time pads (many time pads) and random character sets, and embeds within a steg pic. It also captures mouse movements for random values. Not released it yet.

  • @TornTech1
    @TornTech1 5 лет назад

    Looking at it from the forensic side of infosec, Is there a way to find out if a file has something embedded in it / if this tool has been used on an image.
    Great video!

    • @glowingone1774
      @glowingone1774 5 лет назад

      yes you would compare the original, if you have one....

  • @pexalt8009
    @pexalt8009 5 лет назад +3

    it also works on parrot os

  • @denissetiawan566
    @denissetiawan566 6 лет назад +1

    plath's lazarus, nice pick

    • @NullByteWHT
      @NullByteWHT  6 лет назад

      One of my favorites

    • @pr0xy_5ph1nx8
      @pr0xy_5ph1nx8 6 лет назад

      Can you give a tutorial on spoofing file extensions

  • @ahsanbulbul8512
    @ahsanbulbul8512 3 года назад

    Hey man, got a question...🤔
    If I again zip the steganographed image for the sake of retaining original image quality, can it cause any harm to the hidden data?

  • @OmDahake
    @OmDahake 6 месяцев назад

    Thanks really helpful

  • @_productivity__nill_1131
    @_productivity__nill_1131 6 лет назад +2

    Useful

  • @jamesanderson2009
    @jamesanderson2009 4 месяца назад

    Can install geolocation victims clicked on pic then grabbing Current location..??its possible or not

  • @bavaleshakthi2961
    @bavaleshakthi2961 2 года назад

    Very helpful thank you kedy. 🤩🤩🤩🤩

  • @leonardommarques
    @leonardommarques 6 лет назад

    How do you use kali? is this a dual boot or a bootable usb? I heard bootlable usbs are not a good idea for mac

  • @spazzolatorefolle
    @spazzolatorefolle 5 лет назад +1

    Woooow great!!!!

  • @PandusTech
    @PandusTech 6 лет назад +1

    Can we embed .exe files?

  • @cdenver
    @cdenver 5 лет назад

    So, how does one (say a police officer trying to solve a crime), go about looking at photos and seeing if there is any hidden files within the picture? How can one list hidden files within? If someone is trying to catch a bad guy, we wont know the filename or if it has a password. Would Ollydbg work for that?

  • @SriramVad
    @SriramVad 6 лет назад +2

    So Instagram can destroy encoded data? Cuz it reduces dimensions

    • @NullByteWHT
      @NullByteWHT  6 лет назад

      Yes, anything that changed the pixels too much can

  • @nikhilkamboj7161
    @nikhilkamboj7161 5 лет назад

    Sir, can you please explain how we can encrypt our data by using steghide option -e ??

  • @andresfrr100
    @andresfrr100 6 лет назад +1

    Steganography. Trying to put a message inside and old audio cassette...

  • @bharatg3906
    @bharatg3906 3 года назад

    You said that we can add audio files (.MP3) but it's showing error like not supported format.

  • @mush_mouf
    @mush_mouf 3 года назад

    my stego files are decrypting with only 3 characters in the file. does this mean thats wll thats in the file?

  • @harshitsharma-ml9ov
    @harshitsharma-ml9ov 5 лет назад

    Thanks mate, but can you also tell us how to do this on an audio file, is tge process same

  • @md.akashhossain1003
    @md.akashhossain1003 3 года назад

    How did you get the image and secret file on Kali Linux ? I just newly started.

  • @iblackfeathers
    @iblackfeathers 6 лет назад

    wouldn't uploading an image to instagram or other service alter the originally uploaded image file to the point of damaging the hidden file? for example, facebook compresses their images.

    • @NullByteWHT
      @NullByteWHT  6 лет назад

      Yes, unless you had an image that was already the right size and dimension

  • @navarrogdl
    @navarrogdl 2 года назад

    Not need KALI for steghide, it can use with your favorite distro.

  • @091thepablo
    @091thepablo 5 лет назад

    Did you try Terminator?

  • @bhubesh.m8999
    @bhubesh.m8999 5 лет назад

    Is it possible to encode autorun scripts and apka into the image in this way?

  • @melting9419
    @melting9419 5 лет назад

    Is there a link for the wallpaper? look cool

  • @carolinarojano7298
    @carolinarojano7298 2 года назад

    What if i need to extract the info from an image but i dont know the password

  • @threepoint1434
    @threepoint1434 6 лет назад

    Just wondering; Is that a mac, or linux computer, or something else?
    Cause I'm thinking about getting a computer some time...

    • @NullByteWHT
      @NullByteWHT  6 лет назад

      I do not recommend my setup. I use an old lenovo running kali and a macbook pro using virtualbox

  • @apophis5213
    @apophis5213 6 лет назад

    Can you use soemthing like this to hide a image inside a image ?

  • @silversplinter2414
    @silversplinter2414 3 года назад

    me suscribí subes muy buen contenido gracias por explicar
    y ame tu intro con Vivbrasphere 7u7r
    2020

  • @crecio1827
    @crecio1827 5 лет назад

    every time i try to embed something steghide just tells me that it can't open the file. can anyone help me? i need this for my cybersecurity course.

  • @paritoshkr5232
    @paritoshkr5232 5 лет назад

    It says 'not able to open' secret.txt. what should I do ?

  • @masr4mz134
    @masr4mz134 4 года назад

    thanks dude.

  • @nd1997a
    @nd1997a 3 года назад

    Can you help me with two questions that I figure out now?
    1. What about I have been given a photo and told me to extract hidden data from the photo without providing password?
    2. I have told to find a hidden message in a text which can be like that:
    Find the hidden message from this text: mcikg jnxko vbgnp ksi
    This may help you M3-B-III-1,17,12-AAA

  • @harshalingale3953
    @harshalingale3953 3 года назад

    Its asking for Passphrase which I dont know....Please Help me out.

  • @mageshkanna6781
    @mageshkanna6781 5 лет назад

    is that possible to embed a image to an audio file ?

  • @nimrodquimbus912
    @nimrodquimbus912 6 лет назад +4

    Like the Beatles and Led Zeppelin

  • @Leonidas975
    @Leonidas975 5 лет назад

    Amazing just amazing

  • @ujjvalw2684
    @ujjvalw2684 6 лет назад +2

    Grt

  • @ankitchetri2968
    @ankitchetri2968 3 года назад

    Thanks

  • @jokerclash3820
    @jokerclash3820 6 лет назад +2

    How to bind apk payload into img??

  • @ThisFinalHandle
    @ThisFinalHandle 5 лет назад

    This sounds useful in copyright for images. Perhaps a bot that searches for images with an owner's stenography to claim image rights if they get appropriated.
    Edit: I wrote this before watching the whole video.

  • @abeliniguez9705
    @abeliniguez9705 4 года назад

    What sucks for me is my machine says “unable to locate package”

  • @prodbycure.
    @prodbycure. 3 года назад

    it says it cant locate the package

  • @HGAMES69
    @HGAMES69 3 года назад

    Any way to do this on Windows?

  • @imnoname9259
    @imnoname9259 2 года назад

    Thanks ❤️❤️❤️❤️❤️❤️❤️❤️

  • @taufikhidayat497
    @taufikhidayat497 5 лет назад

    Where can i get password passprase . cause its always fail when i type anything to extract .

  • @darkspace5762
    @darkspace5762 6 лет назад

    I don't really understand the point of this. If you're trying to communicate in secret with someone, you wouldn't use steganography, you can just use an end-to-end encryption app based on public key encryption.

    • @NullByteWHT
      @NullByteWHT  6 лет назад +6

      You're missing the point. End to end encryption you are obviously sending encrypted data. The point here is to hide one file in another file so it's not clear anything is being sent at all.

    • @trooperthatsall5250
      @trooperthatsall5250 6 лет назад

      Its often used by Pedos to send pictures hidden inside pictures -- hidden in plain sight. that type of thing.

    • @joe_schmoe_420
      @joe_schmoe_420 6 лет назад

      Except the file size of the image is much larger than it should ever be
      Its more for plain sight public transferers than transmission based communication

    • @glowingone1774
      @glowingone1774 5 лет назад

      @@joe_schmoe_420 no, you loose information as you hide information

  • @mullicktamimahsan7518
    @mullicktamimahsan7518 3 года назад

    How to extract data if we dont know the password?

  • @user-eq1er5lh3d
    @user-eq1er5lh3d 6 лет назад +2

    Nice)))

  • @abinashpradhan2940
    @abinashpradhan2940 4 года назад

    How to decrypt from another computer if you dont know the file name

  • @wifinesesi
    @wifinesesi 2 года назад

    pretty cool

  • @nitishreddy3699
    @nitishreddy3699 6 лет назад +1

    Your are so cool bro....

  • @AIInsights23
    @AIInsights23 4 года назад

    hello i was looking this i want to use for my Affiliate links

  • @ghostgil7006
    @ghostgil7006 6 лет назад

    What the use of secret.txt? where to get it?

    • @NullByteWHT
      @NullByteWHT  6 лет назад +2

      that's whatever info you want to hide.

  • @foozzycat8516
    @foozzycat8516 6 лет назад

    Metadata?

  • @bradydanfordtalented
    @bradydanfordtalented 4 года назад

    When I try to install steghide it says access denied does anyone know how to fix this?

  • @vtp7256
    @vtp7256 4 года назад

    There is a program in github.com/mostafavtp/cs_projs/blob/master/DataOnImage repository that use one bit per color to hide data on image. It is open source and a small program. It has a GUI on windows also.

  • @mooni1980
    @mooni1980 2 года назад

    Interesting.. So we could easily get all kinds of s*it in our phones via just downloading a few pics from a friend whose computer/phone has been hacked?

  • @videogameplaythrough7043
    @videogameplaythrough7043 3 года назад

    Long Live Rock

  • @wessywes24
    @wessywes24 6 лет назад +2

    First!

  • @AndyPandy33
    @AndyPandy33 5 лет назад

    But you still need password to decode...

  • @davidfibber1094
    @davidfibber1094 6 лет назад +2

    Second