quinta-feira, 29 de fevereiro de 2024

Collaboration request

Hi there

How would you like to earn a 35% commission for each sale for life by
selling SEO services

Every website owner requires the use of search engine optimizaztion (SEO)
for their websites. Think about it, this is really hot

Simply register with us, generate your affiliate links and incorporate them
on your websites, thats it.
It takes only a few minutes to set up everything and the payouts are sent
by each end of the month

Click here to sign up with us, totally free:
https://www.creative-digital.co/join-our-affiliate-program/

See you inside
Lenna

domingo, 28 de janeiro de 2024

Steghide - A Beginners Tutorial




All of us want our sensitive information to be hidden from people and for that we perform different kinds of things like hide those files or lock them using different softwares. But even though we do that, those files  attractive people to itself as an object of security. Today I'm going to give you a slight introduction to what is called as Steganography. Its a practice of hiding an informational file within another file like you might have seen in movies an image has a secret message encoded in it. You can read more about Steganography from Wikipedia.


In this tutorial I'm going to use a tool called steghide, which is a simple to use Steganography tool and I'm running it on my Arch Linux. What I'm going to do is simply encode an image with a text file which contains some kind of information which I don't want other people to see. And at the end I'll show you how to decode that information back. So lets get started:


Requirements:

1. steghide
2. a text file
3. an image file

After you have installed steghide, fire up the terminal and type steghide




It will give you list of options that are available.


Now say I have a file with the name of myblogpassword.txt which contains the login password of my blog and I want to encode that file into an Image file with the name of arch.jpg so that I can hide my sensitive information from the preying eyes of my friends. In order to do that I'll type the following command in my terminal:


steghide embed -ef myblogpassword.txt -cf arch.jpg




here steghide is the name of the program

embed flag is used to specify to steghide that we want to embed one file into another file
-ef option is used to specify to steghide the name (and location, in case if its in some other directory) of the file that we want to embed inside of the another file, in our case its myblogpassword.txt
-cf option is used to specify the name (and location, in case if its in some other directory) of the file in which we want to embed our file, in our case its an image file named arch.jpg

After typing the above command and hitting enter it will prompt for a password. We can specify a password here in order to password protect our file so that when anyone tries to extract our embedded file, they'll have to supply a password in order to extract it. If you don't want to password protect it you can just simply hit enter.


Now myblogpassword.txt file is embedded inside of the image file arch.jpg. You'll see no changes in the image file except for its size. Now we can delete the plain password text file myblogpassword.txt.


In order to extract the embedded file from the cover file, I'll type following command in the terminal:


steghide extract -sf arch.jpg -xf myblogpass.txt




here steghide is again name of the program
extract flag specifies that we want to extract an embedded file from a stego file
-sf option specifies the name of the stego file or in other words the file in which we embedded another file, in our case here its the arch.jpg file
-xf option specifies the name of the file to which we want to write our embedded file, here it is myblogpass.txt
(remember you must specify the name of file with its location if its somewhere else than the current directory)

After typing the above command and hitting enter, it will prompt for a password. Supply the password if any or otherwise just simply hit enter. It will extract the embedded file to the file named myblogpass.txt. Voila! you got your file back but yes the image file still contains the embedded file.


That's it, very easy isn't it?


It was a pretty basic introduction you can look for other things like encrypting the file to be embedded before you embed it into another file and so on... enjoy
:)

Related links


  1. New Hacker Tools
  2. Tools For Hacker
  3. Hack Apps
  4. Pentest Tools Kali Linux
  5. Hacker Tools 2019
  6. Tools For Hacker
  7. Hacker Tools
  8. Hack Tools Pc
  9. Hacking Tools Kit
  10. Hacker Tools For Mac
  11. Install Pentest Tools Ubuntu
  12. Hack And Tools
  13. Hack Tools For Windows
  14. New Hack Tools
  15. Pentest Tools For Mac
  16. How To Hack
  17. Hack And Tools
  18. Hacking Tools For Windows Free Download
  19. Hack Tools Download
  20. What Is Hacking Tools
  21. Hacker Tools
  22. Bluetooth Hacking Tools Kali
  23. Hack Rom Tools
  24. Pentest Tools Download
  25. Hack Tools Pc
  26. Hacking Tools Software
  27. Hack Rom Tools
  28. Nsa Hack Tools Download
  29. Pentest Tools Windows
  30. New Hacker Tools
  31. Pentest Tools For Ubuntu
  32. Hack Tools Pc
  33. Hacker Tools 2019
  34. Pentest Tools Subdomain
  35. Hacker Tools 2020
  36. Underground Hacker Sites
  37. Nsa Hack Tools
  38. Hacker Tools Free
  39. Pentest Tools Open Source
  40. Hacker Tools List
  41. Install Pentest Tools Ubuntu
  42. Hacking Tools Pc
  43. Pentest Tools For Windows
  44. Ethical Hacker Tools
  45. Hacker Tools Software
  46. Hack Tools Github
  47. Hack Tools Online
  48. Hacking App
  49. Pentest Tools List
  50. World No 1 Hacker Software
  51. Hacker Tools Linux
  52. Hack Tools Mac
  53. Hacker Tools Online
  54. Hack Tools For Ubuntu
  55. Hack Tools Pc
  56. Hacker Tools For Mac
  57. What Are Hacking Tools
  58. Hack App
  59. Hacker Tools 2019
  60. Hack Tools
  61. Pentest Tools For Mac
  62. Hacks And Tools
  63. Hack Tools For Pc
  64. Hackers Toolbox
  65. Hacker Tools Software
  66. New Hacker Tools
  67. Hacking Tools Hardware
  68. Tools 4 Hack
  69. Hacking Tools Usb
  70. Pentest Tools Url Fuzzer
  71. Physical Pentest Tools
  72. Pentest Reporting Tools
  73. Pentest Tools Find Subdomains
  74. Pentest Tools Port Scanner
  75. Hack Tools Download
  76. Pentest Tools Review
  77. Pentest Tools List
  78. Hackers Toolbox
  79. Pentest Tools For Ubuntu
  80. Pentest Tools Subdomain
  81. Nsa Hack Tools Download
  82. Pentest Tools Open Source
  83. Pentest Tools Find Subdomains
  84. Pentest Tools Linux
  85. Usb Pentest Tools
  86. Hack Rom Tools
  87. Pentest Tools Port Scanner
  88. Hacking Tools 2020
  89. Hack App
  90. Github Hacking Tools
  91. Pentest Tools For Mac
  92. Hacker Security Tools
  93. Pentest Tools Url Fuzzer
  94. Termux Hacking Tools 2019
  95. Black Hat Hacker Tools
  96. Pentest Tools Online
  97. Best Hacking Tools 2020
  98. Pentest Tools Subdomain
  99. Hacker Hardware Tools
  100. Hak5 Tools
  101. Tools 4 Hack
  102. Hack Apps
  103. Hacking Tools Usb
  104. Hacker Tools Windows
  105. Tools Used For Hacking
  106. Hacking Tools Windows
  107. Pentest Tools Url Fuzzer
  108. Hacker Tools Free
  109. Hacker Tools Hardware
  110. Pentest Tools Github
  111. Hack App
  112. Hackers Toolbox
  113. Hacking Tools For Kali Linux
  114. Pentest Tools Online
  115. Pentest Tools Linux
  116. Hacking Tools Windows 10
  117. Hack And Tools
  118. Pentest Reporting Tools
  119. Pentest Tools Framework
  120. Usb Pentest Tools
  121. Pentest Tools Online
  122. Hacking Tools For Kali Linux
  123. Hacking App
  124. Pentest Tools Linux
  125. Pentest Tools Review
  126. Pentest Tools Open Source
  127. Hacks And Tools
  128. Hack Tools Online
  129. Pentest Tools For Windows
  130. Hacker Tools Apk Download
  131. Hacker Tool Kit
  132. Hack Tools Online
  133. Beginner Hacker Tools
  134. Hack App

PHoss: A Password Sniffer


"PHoss is a sniffer. A normal sniffer software is designed to find problems in data communication on the network. PHoss is designed to know some protocols which use (or may use) clear text passwords. Many protocols are designed to use secure authentication. For fallback they define a lowest level of authentication using clear text. Many companies use this lowest fallback definition as standard setting to make the product working in many environments." read more...

Download: http://www.phenoelit-us.org/phoss/download.html

Related posts

New Consulting Series Financial Statement Workshop

 I added a new video to the consulting series playlist today... This is for creating and managing your personal financial statements,  your budgeting of income/expenses from various sources and how to allocate those automatically to investments to build and track over time.... 

If you learn something.. Like and leave a comment...   Cheers... 




Related word

sábado, 27 de janeiro de 2024

Memoryze


"MANDIANT Memoryze is free memory forensic software that helps incident responders find evil in live memory. Memoryze can acquire and/or analyze memory images, and on live systems can include the paging file in its analysis." read more...

Download: http://fred.mandiant.com/MemoryzeSetup.msi

Related posts