Sie sind auf Seite 1von 17

ComputerSecurityStudent (CSS)

HOME UNIX WINDOWS SECURITY TOOLS LECTURES FORENSICS SHOPPING CONTACT_US

|FORENSICS >> Steganography

|Views: 1782

(Steganography: Lesson 1)
{ Using Quick Stego to Embed Secret Messages Into Pictures } Section 0: Background Information
1. What is Steganography Steganography is the science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. 2. What is QuickStego QuickStego lets you hide text in pictures so that only other users of QuickStego can retrieve and read the hidden secret messages. Once text is hidden in an image the saved picture is still a 'picture', it will load just like any other image and appear as it did before. The image can be saved, emailed, uploaded to the web (, the only difference will be that it contains hidden text.
Investigator's Guide to Steganograph... Gregory Kipper Buy New

Privacy Information

Demo Version - MagneticPdf

3. Reference Link: http://quickcrypto.com/free-steganography-software.html 4. Legal Disclaimer As a condition of your use of this Web site, you warrant to computersecuritystudent.com that you will not use this Web site for any purpose that is unlawful or that is prohibited by these terms, conditions, and notices. InaccordancewithUCC2-316, this product is provided with "no warranties, either express or implied." The information contained is provided "as-is", with "no guarantee of merchantability." In addition, this is a teaching website that does not condone malicious behavior of any kind. Your are on notice, that continuing and/or using this lab outside your "own" test environment is considered malicious and is against the law. 2013 No content replication of any kind is allowed without express written permission.

Digital Watermarking and Steganograp... Frank Y. Shih Best Price $50.61 or Buy New $82.26

Privacy Information

Digital Watermarking and Steganograp... Ingemar Cox, Matth... Best Price $74.64 or Buy New $80.18

Section 1: Power On PENTEST-WXP


1. Edit Virtual Machine Settings Instructions: 1. Click on PENTEST-WXP n PENTEST-WXP is a Windows XP SP3 Virtual Machine. 2. Click on Edit virtual machine

Privacy Information

EnCase Computer Forensics, includes ... Steve Bunting Best Price $10.33 or Buy New

Privacy Information

Computer Forensics Linda Volonino, Re... Best Price $28.14 or Buy New $49.99

Privacy Information

File System Forensic Analysis Brian Carrier Best Price $24.69 or Buy New $46.98

2. Configure Network Adapter Instructions: 1. Select Network Adapter 2. Click the radio button "Bridged: Connected directly to the physical network." 3. Click the Okay button

Privacy Information

Guide to Computer Forensics and Inve... Bill Nelson, Ameli... Best Price $31.99 or Buy New $71.99

Privacy Information

Demo Version - MagneticPdf

Windows Forensic Analysis DVD Toolki... Harlan Carvey Best Price $7.84 or Buy New $55.12

Privacy Information

3. Start PENTEST-WXP Instructions: 1. Click on PENTEST-WXP 2. Click on Play virtual machine

Computer Forensics JumpStart Michael G. Solomon... Best Price $12.66 or Buy New $19.16

Privacy Information

Metasploit Toolkit for Penetration T... David Maynor, Thom... Best Price $7.44

or Buy New $43.37

Privacy Information

4. Send Ctrl+Alt+Del Instructions: 1. Virtual Machine --> Send Ctrl+Alt+Del

Penetration Tester's Open Source Too... Jeremy Faircloth, ... Best Price $14.76 or Buy New

Privacy Information

Demo Version - MagneticPdf

Writing Security Tools and Exploits James C. Foster, V... Best Price $19.30 or Buy New $41.56

Privacy Information

5. Logging into PENTEST-WXP. Instructions: 1. Username: administrator 2. Password: Provide the Password

Dissecting the Hack Jayson E. Street, ... Best Price $9.94 or Buy New $18.74

Privacy Information

SSH, The Secure Shell Daniel J. Barrett,... Best Price $3.98 or Buy New $27.43

Privacy Information

Pro OpenSSH

6. Open a Command Prompt Instructions: 1. Start --> All Programs --> Accessories --> Command Prompt

Michael Stahnke Best Price $9.52 or Buy New $26.90

Privacy Information

Implementing SSH Himanshu Dwivedi Best Price $0.01 or Buy New $26.40

Privacy Information

UNIX Shells by Example Ellie Quigley Best Price $15.24 or Buy New $37.98

7. Obtain PENTEST-WXP's IP Address Instructions: 1. ipconfig Note(FYI): Demo Version - MagneticPdf IP Address is 192.168.1.111. n In my case, PENTEST-WXP's Your IP Address will be different. n

Privacy Information

A Practical Guide to Linux Commands,... Mark G. Sobell Best Price $19.00 or Buy New

Privacy Information

Linux Pocket Guide Daniel J. Barrett Best Price $0.01 or Buy New

Privacy Information

Section 2: Download Quick Stego


1. Start Firefox Instructions: 1. Start --> All Programs --> Mozilla Firefox --> Mozilla Firefox

Linux Administration Wale Soyinka Best Price $11.90 or Buy New $26.70

Privacy Information

Beginning Ubuntu Linux Keir Thomas, Andy ... Best Price $1.98 or Buy New $29.39

Privacy Information

Practical Guide to Fedora and Red Ha...

Mark G. Sobell Best Price $0.76 or Buy New

2. Download Stego Instructions: 1. Place the following address in your Firefox browser. n http://quickcrypto.com/products/QS12Setup.zip n Click here if link is dead. 2. Select the Save File radio button 3. Click the OK button

Privacy Information

Beginning the Linux Command Line Sander van Vugt Best Price $7.95 or Buy New $23.52

Demo Version - MagneticPdf

Privacy Information

Unix and Linux System Administration... Evi Nemeth, Garth ... Buy New

Privacy Information

3. Open Containing Folder Instructions: 1. Right Click on QS12Setup.zip 2. Click on Open Containing Folder

Sun Paul Sanghera Best Price $5.74 or Buy New $37.10

Privacy Information

Solaris Operating Environment Boot C... David Rhodes, Domi... Best Price $0.01 or Buy New

Privacy Information

AIX 5L Administration Randal K. Michael Best Price $0.23 or Buy New $33.58

Privacy Information

4. Extract Stego Instructions: 1. Right Click on QS12Setup.zip 2. Click on Extract All...

AIX for UNIX Professionals Bonnie L. Miller Best Price $3.99 or Buy New $58.00

Privacy Information

Demo Version - MagneticPdf


HP-UX Asghar Ghori Best Price $42.96 or Buy New $50.01

Privacy Information

HP-UX 11i Version 2 System Administr... Marty Poniatowski

Best Price $8.39 or Buy New $34.63

5. Start Extraction Wizard Instructions: 1. Click on the Next button

Privacy Information

BSD UNIX Toolbox Christopher Negus,... Buy New

Privacy Information

6. Select a Destination Instructions: 1. Click on the Next button

Demo Version - MagneticPdf

7. Extraction Complete Instructions: 1. Check "Show extracted files" 2. Click on the Finish button

Section 3: Install Quick Stego


1. Start Installation Instructions: 1. Right Click on QS12Setup 2. Click Open

Demo Version - MagneticPdf

2. Open Fire - Security Warning Instructions: 1. Click Run

3. Setup - Quick Stego Instructions: 1. Click Next

Demo Version - MagneticPdf

4. License Agreement Instructions: 1. Click the "I accept the agreement" radio button. 2. Click the Next button

5. Select Destination Location Instructions: 1. Click the Next button

Demo Version - MagneticPdf

6. Select Additional Tasks Instructions: 1. Check Create a Desktop Icon 2. Check a Quick Launch Icon 3. Click the Next button

7. Ready to Install Instructions: 1. Click the Install Button

Demo Version - MagneticPdf

8. Completion Instructions: 1. Click the Finish Button

Section 4: Download Picture


1. Download Trojan Horse Picture Instructions: 1. Place the following address in your Firefox browser n http://www.computersecuritystudent.com/FORENSICS/Steganography/lesson1/index.44.jpg 2. Right Click on the picture, Select Save Image As...

Demo Version - MagneticPdf

2. Save As bmp Instructions: 1. Name the file "horse.bmp" n Make sure you add the .bmp extension. 2. Click the Save button.

Section 5: Run Quick Stego


1. Run Quick Stego Instructions: 1. Click on the Quick Stego Icon

Demo Version - MagneticPdf

2. Open Image Instructions: 1. Click on the Open Image button

3. Open Horse Image Instructions: 1. Navigate to the Downloads Directory 2. Select the horse.bmp image 3. Click the Open button

4. Hide Text Instructions: Demo Version - MagneticPdf 1. Notice the message that say "This image does not secret text message" 2. Add a message to the black rectangle 3. Click the Hide Text button

5. Save Image

Instructions: 1. Notice the message that say "The text message is now hidden in the image" 2. Click the Save Image button

6. Save New Image Instructions: 1. File name: horse-secret.bmp 2. Click the Save button

Demo Version - MagneticPdf

Section 6: Compared the images.


1. Open My Computer

Instructions: 1. Start --> My Computer

2. Compare Images Instructions: 1. Navigate to the Download directory 2. Notice that the byte size of horse-secret.bmp is much bigger than horse.bmp.

Demo Version - MagneticPdf

Section 7: Proof of Lab


1. Open a Command Prompt Instructions:

1. Start --> All Programs --> Accessories --> Command Prompt

2. Proof of Lab Proof of Lab Instructions 1. cd "My Documents\Downloads" 2. dir horse* 3. date /t 4. echo "Your Name" n Replace the string "Your Name" with your actual name. n e.g., echo "John Gray" 5. Press the <Ctrl> and <Alt> key at the same time. 6. Press the <PrtScn> key. 7. Paste into a wordDemo document Version - MagneticPdf 8. Upload to Moodle