Presentation is loading. Please wait.

Presentation is loading. Please wait.

FOOTPRINTING STEGANOGRAPHY.

Similar presentations


Presentation on theme: "FOOTPRINTING STEGANOGRAPHY."— Presentation transcript:

1 FOOTPRINTING STEGANOGRAPHY

2 FOOTPRINTING History and Evolution of STEGANOGRAPHY
Steganographic techniques have been used for ages and they date back to ancient Greece. The aim of steganographic communication back then and now, in modern applications, is the same: to hide secret data (a steganogram) in an innocently looking cover and send it to the proper recipient who is aware of the information hiding procedure. In an ideal situation the existence of hidden communication cannot be detected by third parties. 

3 Herodotus FOOTPRINTING
The first use of steganography is reported by Herodotus, the so-called father of history, who mentions that in ancient Greek, hidden text was written on wax tablets write message on a tablet and covered it with wax Secret letters can be hidden in the messengers' shoe soles    use pigeons to carry secret notes women's ear rings A very common steganographic scheme in history was the use. Invisible ink (like urine or milk), is still be used by a lot of children (e.g. lemon-based ink

4 Technique for Steganography
FOOTPRINTING Technique for Steganography

5 Technique for Steganography
FOOTPRINTING Technique for Steganography This Is Steganography practical This Is Steganography practical

6 TYPES OF STEGANOGRAPHY
FOOTPRINTING TYPES OF STEGANOGRAPHY

7 Ethical And Non-Ethical Hacking
FOOTPRINTING Ethical And Non-Ethical Hacking With Digital Steganography… Hacker can embed all sorts of malware to an unsuspecting user. Typically , an image file is attached to an with an attractive header , the user click on it and the embedded file get executed. Terrorist can embed message Attackers send Illegal stuff with normal video

8 TOOLs FOOTPRINTING StegSpy Steghide QuickStego Open Stego OpenPuff
SilentEye

9 Stealth files FOOTPRINTING
Stealth Files compresses, encrypts, and then hides any type of file inside many other types of files, including EXE, DLL, OCX, COM, JPG, GIF, ART, MP3, AVI, WAV, DOC, BMP, and most other types of video, image, and executable files.

10 h@ckin9 kit FOOTPRINTING 10 NETWORK SECURITY + HACKING BOOKS
Footprinting penetration testing NETWORK SECURITY + HACKING BOOKS LAB PRACTICE VM + OS +SERVER OS …………. MORE THEN THIS


Download ppt "FOOTPRINTING STEGANOGRAPHY."

Similar presentations


Ads by Google