This commit is contained in:
bt3gl 2014-11-14 16:01:03 -05:00
parent 6228cf47ff
commit 0d769e8c4e
2 changed files with 71 additions and 0 deletions

View File

@ -7,6 +7,8 @@
- xor_bytes
- color crypto
!()[http://i.imgur.com/5IBxKbF.png]
___
## Command Line:

69
Steganography/README.md~ Normal file
View File

@ -0,0 +1,69 @@
# Steganography
## Images
- Adding two images
- xor_bytes
- color crypto
___
## Command Line:
- Pull out the audio with ffmpeg:
```
$ ffmpeg -i windows.mp4 windows.wav
```
- Make a gif from video using [ffmpeg](https://www.ffmpeg.org/download.html)
```sh
$ ffmpeg -i windows.mp4 windows.gif
```
- Online tool for images:
* [utilitymill](http://utilitymill.com/utility/Steganography_Decode)
* [pngcheck](http://www.libpng.org/pub/png/apps/pngcheck.html)
* [Paranoid.jar](https://ccrma.stanford.edu/~eberdahl/Projects/Paranoia/)
____
### Metadata
[Image metadata](http://regex.info/exif.cgi)
- To find information inside a picture, we can use package [pnginfo] or [pngcheck].
- If we need [base64 decoding] (for example a PGP key with a picture).
- Weird pieces of bytes may need to be XORed.
- If we have a decrypted message and a key:
1. Import the private key to use it to decrypt the message with ```gpg --allow-secret-key-import --import private.key```
2. Decrypt with ```gpg --decrypt message.pgp```.
- [ExifTool](http://www.sno.phy.queensu.ca/~phil/exiftool/index.html)
[Bacon's cipher]:http://en.wikipedia.org/wiki/Bacon's_ciphe
[Carpenter's Formula]:http://security.cs.pub.ro/hexcellents/wiki/writeups/asis_rsang
[pngcheck]: http://www.libpng.org/pub/png/apps/pngcheck.html
[karmadecay]: http://karmadecay.com/
[tineye]: https://www.tineye.com/
[images.google.com]: https://images.google.com/?gws_rd=ssl
[base64 decoding]: http://www.motobit.com/util/base64-decoder-encoder.asp
[subbrute.py]: https://github.com/SparkleHearts/subbrute
[pnginfo]: http://www.stillhq.com/pngtools/
[namechk]: http://namechk.com