User Controls
Steganography....help plz....
-
2016-06-03 at 2:04 AM UTC
Stego PNG
Pretty sure I'm missing/not doing something correctly when trying to extract. -
2016-06-03 at 2:39 AM UTCLike i posted in the other thread. You talking about the images along the lines of what was in /perfectpokeables/? Think the board got nuked btw. If so, there's a browser addon but i forget it's name. Other than that you gotta' be more specific.
-
2016-06-03 at 3:24 AM UTCyeah be more specific
if the hidden data is just appended to the png file, you should be able to open it with a text editor and, working off the png file layout standard, determine which part doesn't belong and can just be exported to a separate file. if it's not encrypted, that should do you fine.
it's also possible to embed the 'hidden' data in the image data itself, either through cryptography or even just xor'ing it. keep in mind doing that will visually change the image, even if it's just to a slight degree. an old friend of mine spent some time working with the DSD (kind of like our NSA but it reports to the military); one of their favourite ways to detect hidden data in image files (aside from the obvious stuff like comparing resolution x colour depth to the filesize) was to run the image through a barrage of photoshop enhancements and colour adjustments to see if it presented unpredictable results
reading over that again it's really not that helpful because you didn't explain much of anything -
2016-06-03 at 8:14 AM UTC
Like i posted in the other thread. You talking about the images along the lines of what was in /perfectpokeables/? Think the board got nuked btw. If so, there's a browser addon but i forget it's name. Other than that you gotta' be more specific.
maybe along those lines....
Theres the spot for the input file, which I'm pretty sure is the spot for the file with the hidden data in it.
And then theres the spot to enter the "file for extracted data" ....which confused me, because I thought it was just supposed to extract the data out of the input file? -
2016-06-03 at 9:45 PM UTCPeople posting pictures.... with shit hidden inside...
Apparently you can hide an entire video. ...Or videos. ...lol
And I'm fuckin curious.... That is why I want to figure this shit out. -
2016-06-03 at 10:27 PM UTC
People posting pictures…. with shit hidden inside…
Apparently you can hide an entire video. …Or videos. …lol
And I'm fuckin curious…. That is why I want to figure this shit out.
One does not simply figure steganography out. Also if like you alluded to it's the same technique they used at mchan for the perfect pokeables i'll tell you this much: We have a saying in IT and it goes a little like this: RTFM. But for real if it's with regards to the browser extension surely there's documentation you can read? You might get an answer faster considering i have 0 experience with the browser addon.
Now figure it out. I appended something to this image, if you've been paying attention there's a prize for you inside. -
2016-06-03 at 10:41 PM UTCNext up, i'll append an encoded string to an image then it's your job to figure out the encoding scheme, decode it and get the prize, for top lol i'll add a time limit of 48 hours. Trust me you're going to want this prize. Mmm.
Whenever you're ready fam, it's like a scavenger hunt. -
2016-06-04 at 1:03 AM UTCStego PNG does bitmaps & PNG's
SteganPEG can do Jpeg's
Also these are not browser add-on's
.....reading up on shiz right now... -
2016-06-04 at 1:18 AM UTC
Stego PNG does bitmaps & PNG's
SteganPEG can do Jpeg's
Also these are not browser add-on's
…..reading up on shiz right now…
Oh it's an app, why didn't you say so. Output file is simply the name for the new file saved. So you put: Extracted dot format after the directory structure like: C:\AFJ\desktop\hiddenfile.*
PROTIP: In compsci nerdspeak programmaning lingo asterisk means wildcard so in this case it would be the extension for the file you have extracted whether it be txt, jpeg or whatever.
Also you have not been paying attention to the thread, divert your gaze to post 3 and you'll have your prize. -
2016-06-04 at 2:36 AM UTC"xkinder"
Oh jesus, I don't even want to know.
Also something worth mentioning: stegano is not a cryptographic strategy, it's not really an academic field and we have no good reason to believe any stegano scheme thus far presented represents a real obstacle to a determined attacker. You shouldn't depend on it to obscure illegal activities. Probably works to slip things under the noses of mods on molester chan but you should operate on the assumption LEO can see right through it. -
2016-06-04 at 2:46 AM UTC
"xkinder"
Oh jesus, I don't even want to know.
Also something worth mentioning: stegano is not a cryptographic strategy, it's not really an academic field and we have no good reason to believe any stegano scheme thus far presented represents a real obstacle to a determined attacker. You shouldn't depend on it to obscure illegal activities. Probably works to slip things under the noses of mods on molester chan but you should operate on the assumption LEO can see right through it.
Lol no, Gadmin is a capable programmer he'll have your guts for garters if you put pizza in an image. And by that i mean he'll reset your post count to zero so you have to do over 9000 captchas again. And yeah crypto > stegano. -
2016-06-06 at 2:52 AM UTCI can't decode anything without having the key that was used to hide the stuff with tho?! ....I can't atleast....
-
2016-06-06 at 3:18 AM UTC
-
2016-06-06 at 3:48 AM UTC
-
2016-06-07 at 3 AM UTCThats what I mean tho... no matter what, it always says I need a key A.K.A. password to see whatevers been hidden.
If someone is/was able to show me the picture I hid inside the one above, then that would mean its issues with the programs I'm using... and NOT that I'm misunderstanding how to extract something. -
2016-06-07 at 3:40 AM UTC
Thats what I mean tho… no matter what, it always says I need a key A.K.A. password to see whatevers been hidden.
If someone is/was able to show me the picture I hid inside the one above, then that would mean its issues with the programs I'm using… and NOT that I'm misunderstanding how to extract something.
Obviously if you're encrypting the data after you inserted it into an image you will need a key to decrypt it again. Do you have the option to import or export encryption keys? The way you get the prize out of the intel inside image is not with any fancy software. Like i mentioned i appened something to the data. That means i just added a string of characters, in this case an onion adress to the end of the data. It's not encoded or anything of the sort. if you are on windows, download Notepad++ and open the image with Notepadf++, if you have access to Linux utilities you can just 'cat' the image.
-
2016-06-08 at 10:13 AM UTC
Do you have the option to import or export encryption keys?
yeah, you must enter one thats 16-64 characters to create one, and then to extract one, you must have the key for that steg to extract.
You could give all the stegs the same key, or not.The way you get the prize out of the intel inside image is not with any fancy software. Like i mentioned i appened something to the data. That means i just added a string of characters, in this case an onion adress to the end of the data. It's not encoded or anything of the sort. if you are on windows, download Notepad++ and open the image with Notepadf++, if you have access to Linux utilities you can just 'cat' the image.
Lol...Oh... thats why I wasnt getting it then. -
2016-06-09 at 6:55 AM UTC
aldra@nadir:~/Images/stegasaurus$ tail -n1 642008.jpg
çWž1´;·8×_®6úw7÷mÓ'’÷ëYLÜÔòzciÅ nM1쎇4W9²Ã6ŸêË{¹¯à áoWsn®uS-PÿÙ[B][URL="http://xkinder5eseudi2h.onion"]http://xkinder*[/URL][/B]
regret -
2016-06-09 at 7:31 AM UTC
Find and post whats in this picture …..I know it works.
I will also accept the name of the person in it.
Its nothing crazy, completely SFW.
Just an actual persons face.
trying to work out where it's stored; looking at the content of the PNG it has the standard PNG header at the beginning and the IEND block like 4 bytes from the end (and no multiple instances of IEND) so it's not just appended to the file,. it's actually embedded somewhere in the PNG image structure. looks like there are a few IDAT chunks out of place, so maybe the data's hidden in there, where most viewers/readers will ignore it? it doesn't look like the image data is mangled; just some shitty artifaccts from where it was converted from a jpg, so I'd doubt it's encoded within the chunks that actually comprise the image.
are you using an open source tool? I'd be curious to see where it's putting the hidden data. -
2016-06-09 at 7:47 AM UTCIs linking to that legal?