InterviewSolution
| 1. |
Solve : Hide File in picture? |
|
Answer» How is it done. I really don't think we should be discussing this here. Although your intentions may not be malicious, this sort of information could be used to do a lot of damage. Every bit of information and code given on here could do damage in the wrong hands even the delete command so why not give advice on this subject?. I have figured out how to do this through hard searching all i can say is that i am disappointed in this site. I came here to learn and that i cannot because of people like you who wont help others because you fear that the information will get in to the wrong hands. Just delete my account and forget it. I will find another forum where i can learn from real programmers. Quote I came here to learn and that i cannot because of people like you who wont help others because you fear that the information will get in to the wrong hands.You could hide a keylogger in a picture and send it to someone. When they open the file, the keylogger would be active and it could send keystrokes via email. Or you could hide a batch file that would delete c:\ and when they open the picture, their computer is useless. This is why we don't discuss these topics here. Most of us aren't real programmers, we are just good troubleshooters and we help people with problems, not give other people new problems. If you want to become a programmer that makes viruses and spyware, go ahead. I couldn't care less. Even though it could throw you in court. Quote Every bit of information and code given on here could do damage in the wrong handsYeah, and I don't think this post can be used to destroy a computer. Quote from: kentguy07 on June 22, 2007, 05:34:26 PM I have figured out how to do this through hard searching all i can say is that i am disappointed in this site. Obviously, you're fully capable of finding the information on your own, so I suppose you didn't need us in the first place. Keep in mind that this is a free help site and we have certain guidelines that we abide by. It won't break my heart to see you leave, but if you change your mind, you're still more than welcome to stop by for advice. Just keep in mind that certain subjects may be a bit on the touchy side.I personally don't see that discussion of steganography is any more DANGEROUS than discussing sticking down an envelope before mailing a letter, or password protecting rar or zip files. Carbon DudeOxide, if an executable file were "hidden" steganographically in an image file, simply opening that image file in a viewer would most definitely ***NOT*** cause the executable file to be run. You would have to choose to run the image file through a program that would retrieve the buried file and write it out to disk. There are no image viewers that are capable of dong this. What kentguy seems to want is, ie, open the image and extract & execute the hidden file is, I agree, potentially capable of malicious mischief and I very much doubt his motives in asking about it. If steganography is so dangerous, why do so many people concerned with their privacy use Steganos to communicate securely via email, protect passwords, and do quite a few other perfectly legitimate things? man, this is interesting ......... what did you say ?If an image file uses 24 bits per pixel, 8 each for red, green, and blue, you can throw away the lowest-order bit of each pixel R,G,B value and the picture won't look much different to the naked eye. Those bits could be replaced by the bits of a message. A one million pixel image could therefore hide 3 million bits or nearly 400 Kbytes of information, quite a big text file. If you only needed to hide a short text file, say 1 Kbyte, you could get quite imaginative with where you put the bits. The only trouble is, you can't do this with jpeg images which are compressed. You'd need a bmp type image. Other possibilities are the wav files that make up audio CDs. (but not mp3s for the same reason) This is called "steganography". The word "Steganography" is of Greek origin and means "covered, or hidden writing". Its ancient origins can be traced back to 440 BC. Herodotus mentions two examples of Steganography in The Histories of Herodotus . Demeratus sent a warning about a forthcoming attack to Greece by writing it on a wooden panel and covering it in wax. Wax tablets were in common use then as re-usable writing surface, sometimes used for shorthand. Another ancient example is that of Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it. After his HAIR had grown the message was hidden. The purpose was to instigate a revolt against the Persians. Later, Johannes Trithemius's book Steganographia is a treatise on cryptography and steganography disguised as a book on black magic. The CIA has computers capable of finding hidden MESSAGES in image and audio files, I read somewhere. "I'm glad your around" * nice reads !!!!!!!!!!!! |
|