Master Steganography: Hide Anything Using Whitespace ๐ | Day 8 of Ethical Hacking Series
Learn how to conceal sensitive data within whitespace using steganography techniques. Perfect for ethical hackers and cybersecurity enthusiasts! #steganography #ethicalhacker

Rohit Sharma, PhD - Cyber Security
51 views โข Sep 23, 2023

About this video
Steganography Hacking - HIDE ANYTHING!! #cehv12 #ethicalhacker #steganography
A steganography technique involves hiding sensitive information within an ordinary, non-secret file or message, so that it will not be detected. The sensitive information will then be extracted from the ordinary file or message at its destination, thus avoiding detection.ย Steganography is an additional step that can be used in conjunction with encryption in order to conceal or protect data.
***********************************************************
Resouces :-- https://darkside.com.au/snow/
********************Notes*********************************
Hide Data Using Whitespace Stegnography-
snow -C -m "My realname is rocky" -p "man" rohit1.txt rohit22.txt (man is password and your secret is stored in rohit2.txt along with the content of rohit1.txt)
To Display Hidden Data- snow -C -p "man" rohit2.txt (then it will show the content of readme2.txt content)
***********************************************************
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks.
**************************************************************
๐My name is Rohit Sharma. Pursuing PHD in Cyber Security and CEH, OSCP, Pentest+, CCNA, CNSS, Autopsy, Azure Security & McAfee Product Specialist certified. Experience in WhiteHat & BlackHat Hacker, SIEM Engineering, Cloud Security, Red Teaming & Blue teaming environment.
๐ฅAbout Cyber Red ๐ฅ
Mostly, we are planning to cover lots off Cyber Security Series,
(a) CEH 100%Practical
(b) Attack & Defense Strategies (Red & Blue Team)100%Practical
(c) Complete Python for Penetration testing
(d) Cyber Threat Hunting100%Practical
(e) Python Regular Expression (Reg-EX)
(f) learn Bug Bounty Hunting & Web Security Testing
(g) Memory forensics (Windows & Linux) 100% practical
(h) SIEM Engineering (Qradar & Splunk) 100% practical
(I) Mobile Hacking (Pen Test)
๐Fun Byte Kali Linux - Cover Mostly Hacking Tools for Entertainment
๐ค LET'S CONNECT ๐ค Subscribe๐
Thanks everyone๐
A steganography technique involves hiding sensitive information within an ordinary, non-secret file or message, so that it will not be detected. The sensitive information will then be extracted from the ordinary file or message at its destination, thus avoiding detection.ย Steganography is an additional step that can be used in conjunction with encryption in order to conceal or protect data.
***********************************************************
Resouces :-- https://darkside.com.au/snow/
********************Notes*********************************
Hide Data Using Whitespace Stegnography-
snow -C -m "My realname is rocky" -p "man" rohit1.txt rohit22.txt (man is password and your secret is stored in rohit2.txt along with the content of rohit1.txt)
To Display Hidden Data- snow -C -p "man" rohit2.txt (then it will show the content of readme2.txt content)
***********************************************************
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks.
**************************************************************
๐My name is Rohit Sharma. Pursuing PHD in Cyber Security and CEH, OSCP, Pentest+, CCNA, CNSS, Autopsy, Azure Security & McAfee Product Specialist certified. Experience in WhiteHat & BlackHat Hacker, SIEM Engineering, Cloud Security, Red Teaming & Blue teaming environment.
๐ฅAbout Cyber Red ๐ฅ
Mostly, we are planning to cover lots off Cyber Security Series,
(a) CEH 100%Practical
(b) Attack & Defense Strategies (Red & Blue Team)100%Practical
(c) Complete Python for Penetration testing
(d) Cyber Threat Hunting100%Practical
(e) Python Regular Expression (Reg-EX)
(f) learn Bug Bounty Hunting & Web Security Testing
(g) Memory forensics (Windows & Linux) 100% practical
(h) SIEM Engineering (Qradar & Splunk) 100% practical
(I) Mobile Hacking (Pen Test)
๐Fun Byte Kali Linux - Cover Mostly Hacking Tools for Entertainment
๐ค LET'S CONNECT ๐ค Subscribe๐
Thanks everyone๐
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
51
Duration
8:01
Published
Sep 23, 2023
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.