From the course: Ethical Hacking: System Hacking
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
Using steganography
From the course: Ethical Hacking: System Hacking
Using steganography
- [Instructor] Steganography works as a way to hide in plain sight. In this segment, we'll outline ways to conceal data using Steganography. Steganography is the practice of concealing messages or information within data to avoid detection. Now closely related is a watermark. Steganography has three basic elements. We need some type of carrier such as music, image, or document. Then we have the payload which is generally the secret message. This then becomes the hidden message that appears harmless. Now no one outside of the sender and receiver should suspect anything. To date, there are hundreds of steganography tools that we can use to embed a payload using a variety of carriers such as images, documents, audio, or video. For example, MP3Stego works with MP3 files. S-Tools works with bitmap, GIF, and WAV files, and OpenPuff can use a variety of media files such as images, audio, video, text, or documents. Now while there are many different steganography techniques, let's talk about…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.