newcomer steg query
Page 1 of 2 12 LastLast
Results 1 to 10 of 14

Thread: newcomer steg query

  1. #1
    Junior Member
    Join Date
    Jul 2007
    Posts
    3

    newcomer steg query

    hope this hasn't been asked b4 -

    I've read about steg. Not questioning the math, ok. But has anyone heard of any real, non-trivial examples of crooks, terrorists etc actually using steg?

    It's great technique for a spy novel. but really in life?

  2. #2
    Senior Member
    Join Date
    Oct 2003
    Location
    MA
    Posts
    1,053
    http://www.wired.com/politics/law/news/2001/02/41658


    That is the closest I could find. Since it is not easily detectable I do not think it would be common for some one to find such evidence - ever. I think in most cases there was only suspicion of its use.

  3. #3
    Super Moderator: GMT Zone nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,191
    Hello dinee, and welcome to AO,

    I don't know of any IRL examples but I am not sure where you are coming from with your question.

    I do have some software that detects it, and I will look for the link if you respond with an affirmative.............

    I am looking from the tekkie side here like you might want to get a steggie tool then try my tool to crack it?

    If your question is purely historical, then I am afraid I don't have any examples.....
    If you cannot do someone any good: don't do them any harm....
    As long as you did this to one of these, the least of my little ones............you did it unto Me.
    What profiteth a man if he gains the entire World at the expense of his immortal soul?

  4. #4
    Senior Member WolfeTone's Avatar
    Join Date
    Jun 2007
    Location
    Ireland
    Posts
    197
    It is an interesting concept and something to is hard to detect.

    Nihil, I wouldn't mind a look at that app if you could be so good as to locate it?

    Cheers,
    Wolfe

  5. #5
    Senior Member
    Join Date
    Oct 2003
    Location
    MA
    Posts
    1,053
    I think an app like that is only semi-useful. It can only detect known ways/algos for hiding things. If some one really wanted to hide something like that they would develop their own way of hiding it..

  6. #6
    Senior Member Aardpsymon's Avatar
    Join Date
    Feb 2007
    Location
    St Annes (aaaa!)
    Posts
    434
    I would encrypt it before hiding it too.
    If the world doesn't stop annoying me I will name my kids ";DROP DATABASE;" and get revenge.

  7. #7
    Senior Member
    Join Date
    Oct 2003
    Location
    MA
    Posts
    1,053
    True. Encrypted with a unique method = good luck finding it.

    Personally I still have not found a practical use for stego. Maybe I am not sketchy enough :-p

  8. #8
    Senior Member Aardpsymon's Avatar
    Join Date
    Feb 2007
    Location
    St Annes (aaaa!)
    Posts
    434
    The problem with worrying about hidden messages is that you can see them anywhere. Just like a brute force decryption can yield every possible message, you can find SOME way of only using certain letters/words of any legitimate document and making it into a message to be worried about. A la "A beautiful mind".
    If the world doesn't stop annoying me I will name my kids ";DROP DATABASE;" and get revenge.

  9. #9
    Senior Member
    Join Date
    Oct 2003
    Location
    MA
    Posts
    1,053
    Only the government would worry about such a thing :-p

  10. #10
    Super Moderator: GMT Zone nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,191
    Hi Wolfe,

    The detection tool is here:

    http://www.outguess.org/detection.php

    If you cannot do someone any good: don't do them any harm....
    As long as you did this to one of these, the least of my little ones............you did it unto Me.
    What profiteth a man if he gains the entire World at the expense of his immortal soul?

Similar Threads

  1. Creating an Excel query...
    By RebelToTheEnd in forum General Computer Discussions
    Replies: 0
    Last Post: January 11th, 2005, 02:01 PM
  2. Replies: 0
    Last Post: August 3rd, 2004, 05:32 PM
  3. selection to generate query
    By poppy_123 in forum Web Development
    Replies: 2
    Last Post: May 1st, 2004, 07:49 AM
  4. Foot Printing with Host
    By SonofGalen in forum The Security Tutorials Forum
    Replies: 7
    Last Post: February 9th, 2004, 10:14 AM
  5. Remote Data Service 1.5 Query Page
    By linuxcomando in forum Microsoft Security Discussions
    Replies: 0
    Last Post: March 19th, 2003, 09:29 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides