1 00:00:00,280 --> 00:00:05,650 And Lou everybody when it comes to my advanced ethical hacking networking penetration testing goes 2 00:00:16,490 --> 00:00:23,420 in this video we are going to cover the concept of steganography steganography for many report. 3 00:00:23,420 --> 00:00:27,100 It's something that was coming from the older generation. 4 00:00:27,290 --> 00:00:32,540 It was not something about cryptography but it was just something about hiding stuff. 5 00:00:32,630 --> 00:00:44,330 But it comes back in about nineteen eighties and truly it means that so you hide something in something 6 00:00:44,430 --> 00:00:54,170 away you inside Freud you encrypt it or you can touch even cheat so that all you have is secret file 7 00:00:54,220 --> 00:00:57,470 or a secret text in favor of another file. 8 00:00:57,870 --> 00:00:58,590 OK. 9 00:00:58,620 --> 00:01:07,430 So in windows there is a common tool which names open both open book and then and then there is everyone 10 00:01:07,470 --> 00:01:10,910 on code which name is openness table. 11 00:01:11,060 --> 00:01:20,230 There you can try to message if I cover some fighters in how data extract data from them. 12 00:01:20,360 --> 00:01:28,300 Generates was senior to embed watermark or verify your watermark verify watermark and then you will 13 00:01:28,340 --> 00:01:30,800 have a very good option. 14 00:01:30,800 --> 00:01:34,410 It is the face of encryption algorithm. 15 00:01:34,610 --> 00:01:38,520 Then you could put your passport and then you would not confirm it in. 16 00:01:38,990 --> 00:01:40,310 You're going to hide data. 17 00:01:40,850 --> 00:01:45,280 But what about when the encryption phase then commission phase. 18 00:01:45,380 --> 00:01:46,040 It's easy. 19 00:01:46,250 --> 00:01:57,050 So in open stage in the limited session I mean in a baboon too you can have you have as an option A 20 00:01:57,110 --> 00:02:07,190 E S or one hundred twenty eight and then you have a s encryption two hundred fifty six. 21 00:02:07,220 --> 00:02:08,530 You have only two options. 22 00:02:08,550 --> 00:02:08,770 What. 23 00:02:08,800 --> 00:02:09,250 OK. 24 00:02:09,350 --> 00:02:16,570 Since we are on the Mac operating system we are going to show you how it works in your life and how 25 00:02:16,580 --> 00:02:21,250 you can hide it particular football if you don't want. 26 00:02:21,290 --> 00:02:27,250 If you want to send a photo to the web and you want to hide your ticks inside it. 27 00:02:27,470 --> 00:02:30,420 So it's a really well known tool. 28 00:02:30,550 --> 00:02:38,230 It's it's a really well known tool in my wedding system that you can use it and then the name is. 29 00:02:38,280 --> 00:02:40,810 I know it takes encryption. 30 00:02:40,850 --> 00:02:41,270 All right. 31 00:02:41,390 --> 00:02:42,310 So good defend. 32 00:02:42,600 --> 00:02:43,190 OK. 33 00:02:43,430 --> 00:02:52,040 Before getting into the practical part let's have a really quick view about what is exactly steganography 34 00:02:52,730 --> 00:02:57,260 in what is the meaning of it what it is used for. 35 00:02:57,590 --> 00:03:01,170 So how can we use it in your life. 36 00:03:01,270 --> 00:03:02,370 Right. 37 00:03:02,540 --> 00:03:07,350 So Steganography is the process of hiding one file in certain order. 38 00:03:07,430 --> 00:03:16,400 As we said earlier you can hide it text file into a image via most popular hiding a file within a picture 39 00:03:16,730 --> 00:03:23,330 if you are or are you are your phone of Mr. Wilburn you are likely already some of some somewhat familiar 40 00:03:23,330 --> 00:03:23,900 with this. 41 00:03:24,310 --> 00:03:24,820 Okay. 42 00:03:25,040 --> 00:03:29,260 So how are you going to find a lot of information and you can even use this. 43 00:03:29,450 --> 00:03:33,740 This only exists that I I'd to hide. 44 00:03:33,750 --> 00:03:36,930 There is not a complete state on most clinics disclose. 45 00:03:37,080 --> 00:03:42,890 Well it it is in most different policy twelve is including four are in a to meet. 46 00:03:43,310 --> 00:03:51,920 So there you cannot type pseudo man and then minus is state that still hide minus are in for one provision 47 00:03:52,000 --> 00:03:55,390 when I use this but when I tried to install this for us. 48 00:03:55,420 --> 00:04:04,010 Oh well you can try to install it by typing sudo aptitude I find I often get installed get it installed. 49 00:04:04,380 --> 00:04:09,470 OK the state does not have its ups and downs. 50 00:04:09,470 --> 00:04:16,280 One upside is that it is a lot better at hiding and can easily hide any final type. 51 00:04:16,280 --> 00:04:17,350 That's great. 52 00:04:17,390 --> 00:04:25,430 It does so by using an advanced I'm going to hide it within the image of all you file without changing 53 00:04:25,430 --> 00:04:25,850 the look. 54 00:04:25,850 --> 00:04:27,050 That's perfect. 55 00:04:27,050 --> 00:04:27,730 Over the file. 56 00:04:28,070 --> 00:04:36,180 So this is also means that without using state or state aid or at least this Democratic code approach 57 00:04:36,250 --> 00:04:41,390 as state aid it is very difficult to extract the heat and virus from the image. 58 00:04:41,390 --> 00:04:49,310 Much more on this when you when you hide or when you use the still graphic for hiding these teens in 59 00:04:49,310 --> 00:04:58,700 most cases just software you use for hiding the file you don't a person should use exactly the same 60 00:04:58,700 --> 00:05:03,300 software sometimes if you hide it instead of hide and then meet. 61 00:05:03,340 --> 00:05:03,810 I am. 62 00:05:04,040 --> 00:05:11,540 I know that I am on open to stay or go Guys I'm telling you in most cases it won't work. 63 00:05:11,900 --> 00:05:18,300 We have to have both side this same version decent version but the same software. 64 00:05:18,300 --> 00:05:18,970 All right. 65 00:05:19,050 --> 00:05:25,690 So many of you have so many comments that you can type if your own Terry not or if you are familiar 66 00:05:25,690 --> 00:05:29,810 with a Jew I interpret it maybe better. 67 00:05:29,830 --> 00:05:30,080 OK. 68 00:05:30,120 --> 00:05:35,850 This is a very well known Web site so that you can quote more information and test the more information 69 00:05:36,180 --> 00:05:40,720 you know to find out exactly what it is and how it works stuff right. 70 00:05:41,050 --> 00:05:41,600 OK. 71 00:05:41,820 --> 00:05:46,730 So now let's go into the main part which is the practical part. 72 00:05:47,160 --> 00:05:47,680 All right. 73 00:05:47,850 --> 00:05:51,460 So we have this software and then you click on it. 74 00:05:51,460 --> 00:05:52,760 So by clicking on it. 75 00:05:52,770 --> 00:05:53,880 So what do we want. 76 00:05:54,240 --> 00:06:01,320 We want to hide it takes in into any image and send that image to a friend. 77 00:06:01,650 --> 00:06:09,270 And then that will by clicking on that image he or she might think that it's just an image but the EU 78 00:06:09,480 --> 00:06:13,260 as you know you wanted your text to be secret. 79 00:06:13,260 --> 00:06:19,890 You said a misstep or a miss is something that you're going out finally to find out. 80 00:06:19,890 --> 00:06:25,300 I use this software on that software and then that password that I've used to encrypt it. 81 00:06:25,320 --> 00:06:33,780 Is this is this at the time when he download the file or your picture from Facebook or from Google form 82 00:06:33,870 --> 00:06:41,530 anything and then you will not be able to see the text or while using the software that you sent earlier 83 00:06:41,670 --> 00:06:42,140 to him. 84 00:06:42,360 --> 00:06:47,040 So he might get disposability to read you two with your text. 85 00:06:47,040 --> 00:06:47,450 OK. 86 00:06:47,480 --> 00:06:51,430 So let's quote make it well here. 87 00:06:52,010 --> 00:06:55,610 You have to type your password or key your password. 88 00:06:55,610 --> 00:06:58,120 I can see no password. 89 00:06:58,220 --> 00:07:06,540 OK I type your password I can be sure to see OK this is how it looks. 90 00:07:06,590 --> 00:07:06,850 OK. 91 00:07:06,860 --> 00:07:09,930 Your password are small letters. 92 00:07:10,070 --> 00:07:10,910 All right. 93 00:07:11,030 --> 00:07:17,990 Blowfish is a type of encryption serpent to fish. 94 00:07:18,460 --> 00:07:20,350 Just go go with them guys. 95 00:07:20,360 --> 00:07:23,620 They are fairly well known but us. 96 00:07:23,690 --> 00:07:36,470 We use the R E S Two hundred and fifty six because its foot was not the best but E N I S T from USA 97 00:07:36,500 --> 00:07:41,780 did considering it as a very well and a good encryption standard. 98 00:07:42,050 --> 00:07:43,270 So many people use it. 99 00:07:43,280 --> 00:07:50,020 It's so popular and it's so powerful as well for encrypting things so you can use it instead of these 100 00:07:50,020 --> 00:07:50,530 older ones. 101 00:07:50,530 --> 00:07:58,490 What I didn't say these are not powerful but it is I do know at 100 percent if you hide things it will 102 00:07:58,490 --> 00:08:02,900 take a long long long long long long long time to the attacker to decode. 103 00:08:03,390 --> 00:08:03,750 OK. 104 00:08:03,890 --> 00:08:07,700 So we are not in the video of talking about it. 105 00:08:07,730 --> 00:08:13,370 Now we will see it in the next video because we have it part on we should that we are going to talk 106 00:08:13,370 --> 00:08:15,890 about cryptographic fees. 107 00:08:15,920 --> 00:08:16,520 All right. 108 00:08:16,520 --> 00:08:25,640 So we which was is and then here we want that type of message we can type blah blah blah blah or let's 109 00:08:25,640 --> 00:08:28,820 go here and copy some ticks. 110 00:08:29,000 --> 00:08:29,540 Let's go. 111 00:08:29,540 --> 00:08:40,820 This could be corporate mistakes and then you go back and you can place in there if you want. 112 00:08:40,830 --> 00:08:43,000 It doesn't matter if we get it. 113 00:08:43,880 --> 00:08:44,570 All right. 114 00:08:44,870 --> 00:08:47,470 So now you're going to click on input. 115 00:08:48,020 --> 00:08:50,700 Why did you click on include. 116 00:08:50,720 --> 00:08:57,260 It will encrypt your text and then then put the index would be here by the 8. 117 00:08:57,320 --> 00:09:00,530 You can just copy the text which would be going to hear. 118 00:09:00,560 --> 00:09:01,020 OK. 119 00:09:01,260 --> 00:09:01,580 OK. 120 00:09:02,420 --> 00:09:03,470 Which would be good to hear. 121 00:09:03,470 --> 00:09:14,260 And then you can send it to a friend as a encrypting text but you might want as well to embed your texts 122 00:09:15,610 --> 00:09:21,370 into any image we're going to showing you both steps. 123 00:09:21,430 --> 00:09:25,620 First thing first let's check any good. 124 00:09:25,700 --> 00:09:26,440 All right. 125 00:09:26,490 --> 00:09:28,650 So this is the text that we get. 126 00:09:28,650 --> 00:09:33,840 So you just copy eat Kobe after occupying it. 127 00:09:33,840 --> 00:09:39,900 You put it here and then you can send it to your friend and then say say to him that hey I use this 128 00:09:39,900 --> 00:09:44,420 software analytics intuition for privacy and this vision is a vision. 129 00:09:44,460 --> 00:09:49,950 I use Android s to five six and then my password was this was this. 130 00:09:49,950 --> 00:09:57,180 And then we were going to get these tics back in and what if we want to send that text in an image file. 131 00:09:57,450 --> 00:09:58,730 Okay. 132 00:09:58,740 --> 00:10:01,700 So we will do it OK. 133 00:10:01,790 --> 00:10:09,830 So we have shown you earlier how you can just just copy the text and an encrypted and then send it to 134 00:10:09,830 --> 00:10:10,750 your phone. 135 00:10:10,760 --> 00:10:17,960 But what I would put the plain tags into any message so that we hide it into any image and then we send 136 00:10:17,960 --> 00:10:19,340 that image to friends. 137 00:10:19,400 --> 00:10:19,730 OK. 138 00:10:20,000 --> 00:10:22,480 So this is the time. 139 00:10:22,520 --> 00:10:24,410 Now we want to do it. 140 00:10:24,440 --> 00:10:33,930 You go there and then just copy comments see or just click and click ok and copy it. 141 00:10:34,090 --> 00:10:36,030 Now we're going to pass it to you. 142 00:10:36,340 --> 00:10:38,150 You cannot take anything. 143 00:10:38,150 --> 00:10:40,210 Oh okay. 144 00:10:40,250 --> 00:10:42,320 Kill kill kill kill kill kill kill. 145 00:10:42,650 --> 00:10:43,340 That's good. 146 00:10:43,370 --> 00:10:44,270 That's good. 147 00:10:44,300 --> 00:10:44,690 Yeah. 148 00:10:44,690 --> 00:10:46,610 Did you get anything. 149 00:10:46,620 --> 00:10:54,040 So now we're going to be I'm going to click on input because we want to insert these states into any 150 00:10:54,040 --> 00:10:54,710 image fire. 151 00:10:55,130 --> 00:10:55,640 All right. 152 00:10:55,640 --> 00:10:56,690 So let's go to you. 153 00:10:57,330 --> 00:11:02,330 Oh so that you can see of good software within one woman. 154 00:11:03,380 --> 00:11:04,440 OK. 155 00:11:04,550 --> 00:11:10,240 So you can heal then you could include and make Stina the steam guy. 156 00:11:10,250 --> 00:11:12,050 No ground jumping right. 157 00:11:12,500 --> 00:11:13,190 Yeah. 158 00:11:13,420 --> 00:11:20,630 OK we are music fans are looking to this player and then we crack open but this is the image that we 159 00:11:20,630 --> 00:11:25,610 are going to include we could continue it. 160 00:11:25,850 --> 00:11:26,780 It's working. 161 00:11:26,840 --> 00:11:27,540 All right. 162 00:11:27,560 --> 00:11:34,270 So it seems to all that this fight is in users a deep path. 163 00:11:34,280 --> 00:11:40,630 My P.T. e fries strictly stick nanograms path we click. 164 00:11:40,640 --> 00:11:41,030 Okay. 165 00:11:41,050 --> 00:11:42,890 So now go back. 166 00:11:43,670 --> 00:11:44,770 Let's go. 167 00:11:44,990 --> 00:11:45,690 You. 168 00:11:46,300 --> 00:11:47,210 This is my music. 169 00:11:47,210 --> 00:11:48,050 We don't need it anymore. 170 00:11:48,050 --> 00:11:49,800 We can go to that path. 171 00:11:49,880 --> 00:11:51,180 This one. 172 00:11:51,320 --> 00:11:52,740 Let's go to this one. 173 00:11:52,760 --> 00:11:53,550 Okay. 174 00:11:53,570 --> 00:11:54,890 This is it. 175 00:11:54,890 --> 00:11:55,530 This one. 176 00:11:55,820 --> 00:11:57,780 Let's go and double it. 177 00:11:58,050 --> 00:12:00,060 Oh it's nice. 178 00:12:00,320 --> 00:12:03,920 You always saying that inside this image. 179 00:12:03,920 --> 00:12:05,210 There is a text. 180 00:12:05,330 --> 00:12:06,940 No one would say that you know. 181 00:12:07,280 --> 00:12:14,330 So let's let's check the size of it. 182 00:12:14,350 --> 00:12:27,090 Get in for it's 1 7 9 nine eight seven right so too much. 183 00:12:27,490 --> 00:12:30,470 Okay let's go back to you. 184 00:12:30,470 --> 00:12:31,210 It hurts. 185 00:12:31,320 --> 00:12:35,480 Oh I mean it's too easy to get in for. 186 00:12:35,530 --> 00:12:39,360 You see guys some different some different. 187 00:12:40,060 --> 00:12:42,700 Okay so now what are we going to do. 188 00:12:42,760 --> 00:12:49,570 What are we going to do is we have to sing that fire to old friends and then so that he can get it and 189 00:12:51,190 --> 00:12:59,080 use the same software as we use the same password as we used and then the A E is we're going to tell 190 00:12:59,080 --> 00:13:00,780 you what why is that. 191 00:13:00,790 --> 00:13:05,270 It's the same password because a guest is Sue me tweak encryption. 192 00:13:05,290 --> 00:13:07,120 When are we going to get into that. 193 00:13:07,120 --> 00:13:09,190 Call me when I explain you. 194 00:13:09,190 --> 00:13:14,410 What is this symmetric encryption and what is the encryption key. 195 00:13:14,710 --> 00:13:18,950 So what does it give you symmetric encryption. 196 00:13:18,970 --> 00:13:24,640 Use the same password for encrypting for a pretty symmetric encryption. 197 00:13:24,640 --> 00:13:26,470 Does it use the same password. 198 00:13:26,470 --> 00:13:27,310 All right. 199 00:13:27,370 --> 00:13:28,300 So this is it. 200 00:13:28,360 --> 00:13:30,180 Now we can close this. 201 00:13:30,280 --> 00:13:31,350 We don't use it anymore. 202 00:13:31,570 --> 00:13:32,210 OK. 203 00:13:32,420 --> 00:13:33,260 What are you going to do. 204 00:13:33,270 --> 00:13:36,830 I'm going to try to we'll need to go through it. 205 00:13:37,060 --> 00:13:44,890 We went looking at that password was nor was your password. 206 00:13:45,390 --> 00:13:47,760 Let's check you sort of make it OK. 207 00:13:47,770 --> 00:13:48,970 It's already. 208 00:13:49,110 --> 00:13:51,270 Now we have to decode that file. 209 00:13:51,360 --> 00:13:53,790 Let's say that we are not that point. 210 00:13:54,060 --> 00:14:00,120 You have to click on decrypt decreed that we are going to hit me click here. 211 00:14:00,990 --> 00:14:01,770 It's working. 212 00:14:01,770 --> 00:14:02,940 Here we go guys. 213 00:14:02,990 --> 00:14:04,080 Here we are. 214 00:14:04,110 --> 00:14:04,880 Everything. 215 00:14:04,890 --> 00:14:05,700 Everything. 216 00:14:05,700 --> 00:14:08,260 This empathic quote and this thing. 217 00:14:08,520 --> 00:14:17,630 Let's say if we want to know the password Lucy was one and then we tried to put again this implied we 218 00:14:17,630 --> 00:14:22,210 shouldn't at any organization it code password or anybody. 219 00:14:22,490 --> 00:14:25,800 Steve Gano glad you see this is exactly how it works. 220 00:14:25,870 --> 00:14:29,640 So I hope this feeling was very informative for you. 221 00:14:29,940 --> 00:14:32,910 And then we are looking forward to seeing the next video. 222 00:14:32,940 --> 00:14:34,600 Thank you for watching. 223 00:14:34,680 --> 00:14:35,000 By.