Steganography : Hacking Whitespace - HIDE ANYTHING by snow !! Day_08

Steganography Hacking - HIDE ANYTHING!! #cehv12 #ethicalhacker #steganography A steganography technique involves hiding sensitive information within an ord...

Rohit Sharma, PhD - Cyber Security51 views8:01

About this video

Steganography Hacking - HIDE ANYTHING!! #cehv12 #ethicalhacker #steganography A steganography technique involves hiding sensitive information within an ordinary, non-secret file or message, so that it will not be detected. The sensitive information will then be extracted from the ordinary file or message at its destination, thus avoiding detection. Steganography is an additional step that can be used in conjunction with encryption in order to conceal or protect data. *********************************************************** Resouces :-- https://darkside.com.au/snow/ ********************Notes********************************* Hide Data Using Whitespace Stegnography- snow -C -m "My realname is rocky" -p "man" rohit1.txt rohit22.txt (man is password and your secret is stored in rohit2.txt along with the content of rohit1.txt) To Display Hidden Data- snow -C -p "man" rohit2.txt (then it will show the content of readme2.txt content) *********************************************************** I Hope you enjoy/enjoyed the video. If you have any questions or suggestions feel free to ask them in the comments section or on my social networks. ************************************************************** 🚀My name is Rohit Sharma. Pursuing PHD in Cyber Security and CEH, OSCP, Pentest+, CCNA, CNSS, Autopsy, Azure Security & McAfee Product Specialist certified. Experience in WhiteHat & BlackHat Hacker, SIEM Engineering, Cloud Security, Red Teaming & Blue teaming environment. 🔥About Cyber Red 🔥 Mostly, we are planning to cover lots off Cyber Security Series, (a) CEH 100%Practical (b) Attack & Defense Strategies (Red & Blue Team)100%Practical (c) Complete Python for Penetration testing (d) Cyber Threat Hunting100%Practical (e) Python Regular Expression (Reg-EX) (f) learn Bug Bounty Hunting & Web Security Testing (g) Memory forensics (Windows & Linux) 100% practical (h) SIEM Engineering (Qradar & Splunk) 100% practical (I) Mobile Hacking (Pen Test) 😊Fun Byte Kali Linux - Cover Mostly Hacking Tools for Entertainment 🤝 LET'S CONNECT 🤝 Subscribe😊 Thanks everyone😊

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.

Video Information

Views
51

Total views since publication

Duration
8:01

Video length

Published
Sep 23, 2023

Release date

Quality
hd

Video definition

Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in France under the topic 'h'.

Share This Video

SOCIAL SHARE

Share this video with your friends and followers across all major social platforms. Help spread the word about great content!