Home
Forums
New posts
Search forums
What's new
New posts
New profile posts
Latest activity
Members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Search forums
Menu
Log in
Register
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Home
Forums
CARDING & HACKING
Anonimity & Security
Hiding information in an audio file
Message
<blockquote data-quote="Prime" data-source="post: 223" data-attributes="member: 18"><p>I tell you how to hide absolutely any information in the song of your favorite artist</p><p></p><p>Greetings to all, dear friends!</p><p></p><p>Still, the best way to protect your information is to make sure that your files don't even look encrypted. For this purpose, steganography is also used, that is, the transfer of information masking the very fact of its transfer.</p><p></p><h4>Why is steganography better than a cryptographic container?</h4><p>Let's say that you have an ancient CD that contains an audio collection of songs from your youth and you decide to transfer an archive with important documents on it that you would like to restrict access to. <em>If you use a cryptographic container as one of the files, you may notice that the file is not played in the player audio player-the chance of burning out during manual viewing is quite small, but if automated entropy assessment tools are used, then cryptographic containers are searched for once</em> or twice... And then, if the "enemies" found the stash, it's only a matter of time before they split it.</p><p></p><p>It's a different matter if you have an audio disc where all tracks are listened to. The " enemy” will simply have no reason to distrust the files and there is a high probability that the attention will be focused on something else.</p><p></p><h4>How is this possible?</h4><p>Simple as that. Modern ways of representing data can be quite redundant, leaving unused data blocks inside the file. Or, in high-density files, you can try to “smear” the extraneous file in such a way that the quality of the original donor file is only slightly affected.… And then, with the help of automated tools “ "knock out" these pieces and assemble our secret file in its original form.</p><p></p><h4>I've seen that in the movies!</h4><p>Exactly, Elliot Aldersen from the TV series Mr. Robot recorded audio discs with all the dirt on those he hacked. He used the DeepSound program, which will be discussed later.</p><p></p><h4>Action plan</h4><p>Download the DeepSound 2.0 program.</p><p></p><p>Download (use existing) music in popular formats.</p><p></p><p>Open the audio file in the DeepSound program (by clicking the Open carrier files button):</p><p></p><p><img src="https://telegra.ph/file/ee7d61706603dea64c476.png" alt="ee7d61706603dea64c476.png" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p></p><p>You can also select the quality of the output file. The higher the quality, the less the output file will be damaged, but the smaller the amount of data that can be “smeared " inside. The output data format is FLAC / APE / WAV, so it is advisable to search for the input data in a similar format (although mp3 will also work).</p><p></p><p>Adding our hidden files (Add secret files button):</p><p></p><p><img src="https://telegra.ph/file/150d344ccba113f614109.png" alt="150d344ccba113f614109.png" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p></p><p>At the same time, we can see how the progress bar on the right side is filling up.If you can't exceed the volume, you can either degrade the file quality or split the data into other audio files.</p><p></p><p>Click the Encode secret files button</p><p></p><p><img src="https://telegra.ph/file/ed614c0abac5065778be3.png" alt="ed614c0abac5065778be3.png" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p></p><p>You will be prompted to encrypt the AES256 files based on the password. Let's agree. At the bottom is the “Encode secret files " button.</p><p></p><p>PROFIT.</p><p></p><p>To extract information, follow these steps::</p><p></p><p>Launching the DeepSound program.</p><p></p><p>Adding audio files (or only the desired one).</p><p></p><p>We respond to the suggestion of entering a password....with a password</p><p></p><p>In the window that opens, click the Extract secret files button:</p><p></p><p><img src="https://telegra.ph/file/a03f36793efd29e1a5424.png" alt="a03f36793efd29e1a5424.png" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p></p><p>The files will be extracted to the output directory.</p><p></p><p>Ready!</p><p></p><p>As you can see, there is nothing complicated in this. And yes, the "charged" audio file plays perfectly in the player and does not look suspicious at all.</p></blockquote><p></p>
[QUOTE="Prime, post: 223, member: 18"] I tell you how to hide absolutely any information in the song of your favorite artist Greetings to all, dear friends! Still, the best way to protect your information is to make sure that your files don't even look encrypted. For this purpose, steganography is also used, that is, the transfer of information masking the very fact of its transfer. [HEADING=3]Why is steganography better than a cryptographic container?[/HEADING] Let's say that you have an ancient CD that contains an audio collection of songs from your youth and you decide to transfer an archive with important documents on it that you would like to restrict access to. [I]If you use a cryptographic container as one of the files, you may notice that the file is not played in the player audio player-the chance of burning out during manual viewing is quite small, but if automated entropy assessment tools are used, then cryptographic containers are searched for once[/I] or twice... And then, if the "enemies" found the stash, it's only a matter of time before they split it. It's a different matter if you have an audio disc where all tracks are listened to. The " enemy” will simply have no reason to distrust the files and there is a high probability that the attention will be focused on something else. [HEADING=3]How is this possible?[/HEADING] Simple as that. Modern ways of representing data can be quite redundant, leaving unused data blocks inside the file. Or, in high-density files, you can try to “smear” the extraneous file in such a way that the quality of the original donor file is only slightly affected.… And then, with the help of automated tools “ "knock out" these pieces and assemble our secret file in its original form. [HEADING=3]I've seen that in the movies![/HEADING] Exactly, Elliot Aldersen from the TV series Mr. Robot recorded audio discs with all the dirt on those he hacked. He used the DeepSound program, which will be discussed later. [HEADING=3]Action plan[/HEADING] Download the DeepSound 2.0 program. Download (use existing) music in popular formats. Open the audio file in the DeepSound program (by clicking the Open carrier files button): [IMG alt="ee7d61706603dea64c476.png"]https://telegra.ph/file/ee7d61706603dea64c476.png[/IMG] You can also select the quality of the output file. The higher the quality, the less the output file will be damaged, but the smaller the amount of data that can be “smeared " inside. The output data format is FLAC / APE / WAV, so it is advisable to search for the input data in a similar format (although mp3 will also work). Adding our hidden files (Add secret files button): [IMG alt="150d344ccba113f614109.png"]https://telegra.ph/file/150d344ccba113f614109.png[/IMG] At the same time, we can see how the progress bar on the right side is filling up.If you can't exceed the volume, you can either degrade the file quality or split the data into other audio files. Click the Encode secret files button [IMG alt="ed614c0abac5065778be3.png"]https://telegra.ph/file/ed614c0abac5065778be3.png[/IMG] You will be prompted to encrypt the AES256 files based on the password. Let's agree. At the bottom is the “Encode secret files " button. PROFIT. To extract information, follow these steps:: Launching the DeepSound program. Adding audio files (or only the desired one). We respond to the suggestion of entering a password....with a password In the window that opens, click the Extract secret files button: [IMG alt="a03f36793efd29e1a5424.png"]https://telegra.ph/file/a03f36793efd29e1a5424.png[/IMG] The files will be extracted to the output directory. Ready! As you can see, there is nothing complicated in this. And yes, the "charged" audio file plays perfectly in the player and does not look suspicious at all. [/QUOTE]
Name
Verification
Post reply
Home
Forums
CARDING & HACKING
Anonimity & Security
Hiding information in an audio file
Top