Stay aware of the latest security updates and prevent your network from vulnerability exploits.

Steganography

Steganography is an art of hiding a message, image, or file within another message, image, or file.

Most images are used to hide the data. The flexibility of using images means that information can be hidden in a variety of ways. It can be scattered all over the image or inserted straight inside.

If data is inserted straight inside. we can find it easily using the below technique,

Hex Editor

like HexEdit, HxD on windows

using :%!xxd command on Linux

FF D8

FF D9

EOI (End Of Image) marker

Here is an example to insert data straight inside the image without any tool on windows:

  1. Create a test file with some data to hide. ( Here i used “hidden data.txt” )
  2. Take an image to which you need to hide. ( Here i used “original.jpg” )
  3. In Command prompt use the below command to hide the content.

copy /b original.jpg + "hidden data.txt" "hidden image.jpg"

windows-copy-cmd

A new image will be created with your data hidden. You can open and view that image normally.

But, to view the hidden content open that image in any Hex editor as mentioned above and see the hidden data at the end after the EOI marker.

Hex view

Later, a quick obfuscation layer is added (Password or key) to hide the visibility of the data in the HEX format. To view the original message we need that key or password.

Here is an example to insert data inside the image using Outguess tool:
outguess is one of the tool that allows the insertion of hidden information into
the redundant bits of data sources.

Data Hiding : outguess -k "secretkey" -d hidden.txt image.jpg out.jpg

outguess-hide

Data Retrieval : outguess -k "secretkey" -r out.jpg hidden.txt

(more…)

Comments Off on Steganography

CUPS IPP Use-After-Free Denial of Service Vulnerability Proof of Concept [CVE-2010-2941]

Fellas,
SecPod Research Team member “Veerendra GG” has written a valid working POC to crash CUPS Service. The POC is written based on the information provided in RedHat Bugzilla (CVE-2010-2941) which sends a malformed IPP (Internet Printing Protocol) packets over TCP. For more information on this vulnerability, you can refer here. You can manage these Vulnerabilities with the help of a good Vulnerability Management Tool. Well, inline comments inside the Python script can help you more to figure out how the bug was reproduced to crash the service. The Vulnerability Management System can resolve these issues and keep your infrastructures safe. For brevity, the poc is posted below as well. (more…)

2 Comments

End of content

No more pages to load