TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Steganography: The Art and Science of Hiding Things in Other Things – Part 4

BHIS · 2016-11-11 · Read original ↗

ATT&CK techniques detected

6 predictions
T1027.003Steganography
71%
"steganography : the art and science of hiding things in other things – part 4 steganography : the art and science of hiding things in other things – part 4 dakota nelson * / / part 4 : resilient steganography this is it. the end. the last of a four part series covering image steg…"
T1027.003Steganography
69%
"##ganographically hide data which we ’ ve run through a hamming encoder so that we can correct errors caused by compression ( or anything else ). all of the code for this article can be found on github – i ’ ll walk you through it below, but you can always go take a look for your…"
T1001.002Steganography
46%
"that ’ s what this matrix does. we multiply the message by this hamming code matrix, then mod the result by two ( that is, take the remainder of each entry in the resulting array divided by 2 ) and we have ourselves a hamming - encoded message. ( if you still don ’ t like me not …"
T1001.002Steganography
45%
"............. 0000d62d : 0000 0000 0000 0000 0000 0000 0000 0000................ 0000d63d : 0000 0000 0000 0000 0000 0000 0000 0000................ 0000d64d : 0000 0000.... that ’ s it – we corrected a message using a hamming code! whereas before we had to repeat each character 9…"
T1001.002Steganography
37%
"##graphy should be pretty familiar to you by now. ( if not, go back and read part 2 for a discussion of image steganography techniques. ) once we ’ ve retrieved our message from the image that our steganography algorithm put it into, how do we fix errors? that ’ s the whole point…"
T1027.003Steganography
31%
"##graphy should be pretty familiar to you by now. ( if not, go back and read part 2 for a discussion of image steganography techniques. ) once we ’ ve retrieved our message from the image that our steganography algorithm put it into, how do we fix errors? that ’ s the whole point…"

Summary

Dakota Nelson* // Part 4: Resilient Steganography This is it. The end. The last of a four part series covering image steganography. You can get started with part 1, part […]

The post Steganography: The Art and Science of Hiding Things in Other Things – Part 4 appeared first on Black Hills Information Security, Inc..