- This topic has 11 replies, 5 voices, and was last updated 9 years, 1 month ago by
El33tsamurai.
-
AuthorPosts
-
-
December 4, 2011 at 5:07 pm #7111
El33tsamurai
Participanthttp://rtncyberjobs.com/#.TtW5RZJBC10.wordpress
Raytheon Have a Cyber Warrior challenge going on and I need a steganography tool for the first challenge but all the steg tools I have found online are out of date or done work with jpgs. Anyone know where I can find a tool where the website and tool works?
-
December 4, 2011 at 11:45 pm #44264
eth3real
ParticipantThanks for the link, I love getting involved in stuff like this.
Unfortunately, I don’t know of any tools to help, but if I come across anything, I’ll let you know.
-
December 5, 2011 at 5:22 pm #44265
El33tsamurai
ParticipantThanks alot man, yeah the challenge is alot of fun :-D.
-
December 5, 2011 at 6:21 pm #44266
Ignatius
ParticipantThere’s a very recent article about Image and Audio Steganography on Infosec Institute (http://resources.infosecinstitute.com/steganography-tutorial/). I haven’t looked at it in detail, but he uses Linux-based tools when dealing with .jpeg files (as well as .png). It might be worth your having a look through it. Perhaps you could post a comment in the thread and the author (a researcher with ISI) might be able to give you some guidance.
-
December 5, 2011 at 6:32 pm #44267
El33tsamurai
ParticipantI will defiantly check it and let you know.
-
December 6, 2011 at 7:44 pm #44268
Don Donzal
KeymasterIt’s a few years old, but James Shewmaker of Bluenotch and SANS did a preso at ChicagoCon:
Le’go My Stego
James Shewmaker, Bluenotch, SANSWhat happens when viral marketing meets hidden data? In the new media world of Web 2.0, massive content can hide massive data. How can steganographic techniques survive media conversion? This talk will discuss the impact, potential, and demonstration using freely available remote storage to stash your data.
James Shewmaker has over 15 years experience in IT, primarily developing appliances for automation and security for broadcast radio, internet, and satellite devices. He is one of the first GIAC Platinum certified Malware (GSM) experts. Jim has written and audited questions for GIAC and is on the Advisory Board. Jim is a founder and active consultant for Bluenotch which focuses on investigations, penetration testing, and analysis. He has contributed to the courseware in various SANS courses including Security Essentials and Reverse Engineering Malware: Advanced Techniques.
Hope that helps,
Don -
December 7, 2011 at 7:46 am #44269
alan
ParticipantCheck the long list of them on here: http://www.jjtc.com/Steganography/tools.html
Good luck on becoming a cyber warrior, it’s a fun puzzle!
-
December 7, 2011 at 6:12 pm #44270
El33tsamurai
ParticipantAll the jpegs on that site don’t work :-D.
-
December 7, 2011 at 8:04 pm #44271
alan
Participantwhat about the jpg ones?
EDIT: sent you a pm
-
December 7, 2011 at 8:05 pm #44272
El33tsamurai
ParticipantThe programs intended for jpeg stegs do not work!
-
December 10, 2011 at 8:18 pm #44273
Ignatius
Participant@El33tsamurai wrote:
The programs intended for jpeg stegs do not work!
There have been a couple of segments in recent episodes from Hak5 that dealt with Steganalysis. Check them out … the most recent is here.
-
December 11, 2011 at 9:18 pm #44274
El33tsamurai
ParticipantI will thanks alot.
-
-
AuthorPosts
- You must be logged in to reply to this topic.