{"id":562,"date":"2013-12-17T00:08:51","date_gmt":"2013-12-16T23:08:51","guid":{"rendered":"http:\/\/under12oot.noblogs.org\/?p=562"},"modified":"2013-12-17T00:28:00","modified_gmt":"2013-12-16T23:28:00","slug":"steganografia-take-it-easy","status":"publish","type":"post","link":"https:\/\/under12oot.noblogs.org\/?p=562","title":{"rendered":"Steganografia&#8230;. take it easy&#8230;"},"content":{"rendered":"<p>Ultimo articolo della serie <em>&#8220;proviamoci&#8221;&#8230;.<\/em><\/p>\n<p>Vedremo come usare la <em>steganografia<\/em> in modo semplice, faremo qualche <em>esempio pratico<\/em> e vedremo di combinare delle tecniche che abbiamo appreso negli articoli precedenti. A differenza di quello visto finora la steganografia \u00e8 qualcosa di pi\u00f9<em> &#8220;oscuro&#8221;<\/em> , non sempre se ne parla anche se a pensarci bene \u00e8 <em>forse<\/em> la tecnica p<em>i\u00f9 efficace e sicura<\/em> per nascondere\/trasportare file e documenti importanti che <em>devono essere mantenuti segreti<\/em>. Da<em> wikipedia<\/em> vediamo il significato: &#8220;La <a href=\"http:\/\/it.wikipedia.org\/wiki\/Steganografia\" target=\"_blank\"><b>steganografia<\/b> <\/a>\u00e8 una tecnica che si prefigge di nascondere la comunicazione tra due interlocutori, infatti il termine \u00e8 composto appunto dalle parole greche <i>\u03c3\u03c4\u03b5\u03b3\u03b1\u03bd\u03cc\u03c2<\/i> (nascosto) e <i>\u03b3\u03c1\u03b1\u03c6\u03af\u03b1<\/i> (scrittura).&#8221;<\/p>\n<p>Vediamo prima qualche esempio<em> senza l&#8217;utilizzo<\/em> di alcun tool ma semplicemente usando la<em> shell.<\/em> Per questo esempio useremo un&#8217;immagine, il wallpaper di <em>under_r00t:<\/em><\/p>\n<p>Cominciamo con scrivere un messaggio su file di nome 1(uno):<\/p>\n<pre>$ echo \"Domani alle 14:30 net-strike al sito di forza nuova\" &gt; 1<\/pre>\n<p>E comprimiamolo con<em> gz:<\/em><\/p>\n<pre>$ gzip 1<\/pre>\n<p>Ora possiamo provare a dare un&#8217;occhiata al contenuto:<\/p>\n<pre>$ cat 1.gz\r\n\ufffd(\ufffdR\u00031s\ufffd\ufffdM\ufffd\ufffdTH\ufffd\ufffdIU04\ufffd26P\ufffdK-\ufffd-.)\ufffd\ufffdN\ufffd*\u0014g\ufffd\ufffd+\ufffdd*\ufffd\ufffd\u0017U%*\ufffd\ufffd\ufffd\ufffd%r\u0001}\ufffd\ufffd~4%<\/pre>\n<p>E&#8217; molto importante <em>(indispensabile)<\/em> conoscere la grandezza <em>esatta<\/em> del file appena creato, possiamo visualizzarlo con <em>wc<\/em>:<\/p>\n<pre>$ wc -c 1.gz\r\n73 1.gz<\/pre>\n<p>Vediamo di appendere il contenuto di 1.gz ad un file immagine, potrebbe anche essere un <em>file audio o video o qualsiasi altro formato<\/em>:<\/p>\n<pre>$ cat 1.gz &gt;&gt; wall_undr00t_steg_prova.png<\/pre>\n<p>Ovviamente la nostra immagine <em>non viene modificata,<\/em> se non nella grandezza del file che abbiamo appeso, ma rester\u00e0 pur sempre <em>visibile come immagine<\/em>. Diamo un&#8217;occhiata agli ultimi bit della nostra immagine con tail:<\/p>\n<pre>$ tail wall_undr00t_steg_prova.png\u00a0 \r\n\ufffd(Y\ufffd+\ufffd\ufffd;FU\ufffd}\ufffd\ufffd\\d\ufffd\ufffdYb\ufffd\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 N7\ufffd7\/\ufffd\u0019\ufffd\ufffd&amp;\ufffd\ufffd\ufffd\u0011I,\ufffd\ufffd\u0001-\ufffd\ufffd\ufffd\ufffd\/\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \ufffd\ufffd0\ufffd\ufffdH\ufffd\ufffd\ufffd\ufffd(n\ufffd\r\n\ufffdcal!\ufffd\ufffd\ufffd&lt;\ufffd\u06b2\ufffd\/l\ufffd\ufffd!\u0004^\ufffd@,&gt;\ufffd2\ufffd\ufffdK\ufffd\ufffd\ufffd_D\u001c\ufffd\ufffd\u0012\ufffd0\u0003\ufffd1\ufffd\ufffd\u0449\ufffd\ufffd\u061eo\u050e\ufffd\ufffd&amp;\ufffdW\u0011\ufffd@\ufffdY\ufffd\/\ufffd\ufffd_\r\n\ufffd&lt;\ufffd\ufffd\u001f\ufffd~\/\ufffd\u04fd\u0010\ufffd\u0753\ufffd\ufffd\ufffd\ufffd+&gt;\ufffd6\u001a\ufffdb \ufffd\ufffd\u001a\ufffd\ufffd\u0019 @\r\ncW\ufffd\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \r\n\ufffd\u00014\ufffd\u0016I\ufffd \ufffd\ufffdhQ\u072b~J\ufffd~j\u0017\ufffd\ufffd3R,AO\u0016\ufffd\ufffd\ufffdv\ufffd\ufffd\ufffdwA\ufffdy\ufffd\ufffdz\ufffdBy\u0769\ufffdG,N\r\n]\ufffd4\ufffdo \u0002\u02a2\u0013\ufffd\ufffd\ufffd\u0410\ufffd$\u0002u\ufffd\ufffd5]&lt;\ufffdq\ufffd\ufffd\ufffdI\ufffd\ufffd\ufffd@\ufffd\ufffd\ufffdZ}'.\ufffd\ufffd[\ufffd\ufffd{g\ufffd\u001c'\r\n\r\n D\ufffd\u06c2!\u0303\ufffdI\ufffd\ufffd\ufffd\u042e\ufffd\ufffd\u0133\u0283Bj\u01b3\ufffd@\ufffd=\ufffd\u001a\ufffd[\u0002\ufffd\ufffd\ufffd\u001fr\ufffd\ufffd!\ufffd$L\ufffdstZs3\ufffdo\ufffdNs\u0015\ufffd\u0010\ufffd\u001e%\ufffd\ufffd\ufffd$\ufffd\u00194\ufffd\ufffd!\ufffd\ufffdF\ufffdl*\r\n\ufffd\ufffd\ufffd\ufffd\ufffdsZu\ufffd\ufffd\u0003\ufffd-\u0292\u0018\ufffd\ufffd\u0018*&amp;\u021bK.\ufffd\ufffd\ufffd\ufffd\u0013\ufffd)\ufffd&gt;\u0281\u07f3\ufffd!\ufffd\ufffd\r\n?v\ufffd\ufffd\ufffd\ufffdk\ufffd\ufffd\ufffd\u0596\ufffd\u001a\ufffd\ufffd\u001f\ufffdm\ufffd\u02de\r\n\r\n~\ufffd\ufffd\ufffdj[q\ufffd\ufffd&lt;\ufffd\ufffd\ufffda\ufffd\ufffd\ufffd\ufffdz\ufffd\ufffd+\ufffdz\ufffdH9\ufffd\ub9a6I\ufffd\u0013S\ufffd\ufffd\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \ufffd\ufffd\"\u0011\ufffd\ufffd\u0017\ufffd\ufffd\ufffd\ufffd\ufffd2?\ufffd\ufffdec\ufffd,\ufffd\ufffd\ufffd:\ufffd\ufffdo\ufffd]\ufffd\ufffd\ufffdx\r\n\ufffd\u001a{\ufffd\ufffd\u001f!\ufffd\u03bb\ufffd\ufffd\u07e7\ufffd A\ufffd\ufffdF\ufffdOd\ufffd\ufffd\u01d8m\u0014\ufffd \ufffd-\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \ufffd9\ufffd=\ufffd\u041b\ufffd\ufffd\ufffd_$m(\ufffd\ufffd\u0342\ufffd#\ufffd$A\ufffd\u03cd\u01b6\u0006~\u001d\u0004G\u0006\ufffd\r\n\ufffd\ufffd,P\u0002&lt;m\ufffd@=\ufffdQ\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \ufffd4\u0004@-@\u0016!IpVO\ufffd\u001a9\r\ng@\ufffd\ufffd\ufffd\u0012X\ufffd\ufffd\ufffd\ufffd@E\u001c\"\u0011q\ufffd\ufffduv\ufffd\ufffdEA\ufffdY\ufffd;\ufffd\ufffd\u001a\ufffd(\u0014\u0002\ufffd\ufffdZ\u0001-\u0017v\ufffdr&amp;\u0002\ufffd\u0019\ufffd\ufffd\\P+\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd6R\u0018\ufffd^\ufffd\ufffd~|\r\n,\u0014\u0006I\ufffd=\u001c\u029f\ufffd\ufffd\ufffd\u01f8A\ufffdP\u001a\ufffd\ufffd\ufffd_\ufffd\ufffd\u0016\ufffdm\ufffddx\u0010R\u0016\u0315\ufffd\u001f\ufffd\u0010R\u001e6C\ufffdR\ufffd\u0006f\u001e\ufffd\u001f\ufffd\ufffd\ufffd\ufffdL\ufffd\ufffdF\u00a0\u00a0 \u00a0\u0770\r\nK[\ufffd\ufffdi\ufffdM\ufffdr%f\ufffd\ufffdo\ufffdv}r\ufffd\ufffd\ufffd\ufffdO\ufffd\ufffd\u0014\ufffd(\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \ufffd\u0010%C[\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \ufffd+\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffd\ufffdK\ufffd\u001cz\ufffd]7\ufffd\ufffd\ufffdz\ufffdz\ufffd\ufffd\u001f\ufffdY\ufffd\u0691\ufffd\ufffd\ufffdp\ufffd\ufffd2\u001d7\r\n\ufffde\ufffd\u0016\u001c\ufffd\u0247\ufffd\u0012Q\/\ufffd\ufffd\ufffdRmy\ufffd\ufffd\ufffd\u0018t_S\u001d\ufffd{7\ufffd?\ufffdX\ufffd*\u0011\ufffd\ufffd5\" \ufffd\ufffd\ufffd\ufffd\ufffd\ufffdO\u0016\u0011;\u00a0\u00a0 \u00a0\r\nUr\ufffd\ufffd&gt;\ufffd\ufffd\ufffd\u0001x\ufffd0\" \ufffd\ufffdt\ufffd?B\u001a\ufffd\u0017\ufffd\ufffdAV$\ufffdP\ufffd\ufffd\ufffd\ufffd?H8\u0018p\ufffd\ufffdx \ufffd7\/\ufffd\ufffd]\ufffdQ\\\ufffd\u0015\ufffd\ufffd:$\u0089vr\ufffdF\u0001\/\ufffd\ufffdxC\ufffdd\ufffd_\ufffd\ufffd\r\n\ufffd\ufffd\ufffd\u00bf.IEND\ufffdB`\ufffd<span style=\"color: #ff0000\">\ufffd(\ufffdR\u00031s\ufffd\ufffdM\ufffd\ufffdTH\ufffd\ufffdIU04\ufffd26P\ufffdK-\ufffd-.)\ufffd\ufffdN\ufffd*\u0014g\ufffd\ufffd+\ufffdd*\ufffd\ufffd\u0017U%*\ufffd\ufffd\ufffd\ufffd%r\u0001}\ufffd\ufffd~4%\u00a0<\/span><\/pre>\n<div id=\"attachment_566\" style=\"width: 275px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/under12oot.noblogs.org\/files\/2013\/12\/Prima_immagine.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-566\" class=\"size-medium wp-image-566\" style=\"margin: 7px\" title=\"Prima_immagine\" alt=\"Prima_immagine\" src=\"https:\/\/under12oot.noblogs.org\/files\/2013\/12\/Prima_immagine-300x124.png\" width=\"265\" height=\"127\" \/><\/a><p id=\"caption-attachment-566\" class=\"wp-caption-text\">steganografia da shell<\/p><\/div>\n<p>Riconoscete la stringa appesa? Si confrontandole noi le riconosciamo ma ad una<em> prima occhiata<\/em> il nostro messaggio <em>sembra ben nascosto e incomprensibile<\/em>, a chiunque, dunque anche ai nostri destinatari rendendo <em>di fatto<\/em> inutile il lavoro appena svolto. Per riuscire a leggere il messaggio che \u00e8 stato nascosto nell&#8217;immagine <em>dovremo fare i passaggi inversi<\/em> a quelli compiuti finora. Ricordate che prima vi ho fatto stampare la grandezza esatta del fiel 1.gz, questo serve ora perch\u00e8<em> &#8220;ritagliando&#8221;<\/em> la grandezza esatta del file appeso all&#8217;immagine potremo poi <em>decomprimerla<\/em> e riottenere il messaggio originale, quindi basta far sapere a chi di dovere &#8220;<em>un numero&#8221;<\/em> e il destinatario sapr\u00e0 di quanto <em>&#8220;tagliare&#8221;<\/em> la coda dell&#8217;immagine:<\/p>\n<pre>$ tail -c 73 wall_undr00t_steg_prova.png &gt; 1-estr.gz\r\n$ gunzip 1-estr.gz\r\n$ cat 1-estr\r\nDomani alle 14:30 net-strike al sito di forza nuova<\/pre>\n<p><em>Ecco nel terminale come si presenta completamente:<\/em><\/p>\n<div id=\"attachment_568\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/under12oot.noblogs.org\/files\/2013\/12\/Seconda_immagine.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-568\" class=\"size-medium wp-image-568\" style=\"margin: 7px\" title=\"Seconda_immagine\" alt=\"Seconda_immagine\" src=\"https:\/\/under12oot.noblogs.org\/files\/2013\/12\/Seconda_immagine-300x137.png\" width=\"300\" height=\"137\" srcset=\"https:\/\/under12oot.noblogs.org\/files\/2013\/12\/Seconda_immagine-300x137.png 300w, https:\/\/under12oot.noblogs.org\/files\/2013\/12\/Seconda_immagine-1024x470.png 1024w, https:\/\/under12oot.noblogs.org\/files\/2013\/12\/Seconda_immagine.png 1366w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-568\" class=\"wp-caption-text\">Steganografia da shell 2<\/p><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Questo \u00e8 un<em> primo passo molto semplice<\/em>, usando solo la<em> potenza<\/em> della nostra shell&#8230; Potremmo aggiungere un ulteriore <em>livello di sicurezza,<\/em> prima di comprimere il file si potrebbe <em>criptare<\/em>, potremmo usare <em>gpg, oppure\u00a0<\/em> un altro utile programma chiamato<em> aescrypt<\/em> che potete trovare <a href=\"http:\/\/www.aescrypt.com\/download\/\" target=\"_blank\">qui<\/a><\/p>\n<p>Procediamo pi\u00f9 velocemente:<\/p>\n<pre>$ echo \"Domani net-strike alle 14:30\" &gt; secret.txt\r\n$ aescrypt -e -p P4ss-m0lt0-Ro.bust4 secret.txt\r\n$ gzip secret.txt.aes\r\n$ wc -c secret.txt.aes.gz\r\n241 secret.txt.aes.gz<\/pre>\n<pre>$ cat secret.txt.aes.gz &gt;&gt; Wall_AES.png\r\n$ tail -c 241 Wall_AES.png &gt; Primo_estratto.gz\r\n$ gunzip Primo_estratto.gz\r\n$ mv Primo_estratto Primo_estratto.txt.aes\r\n$ aescrypt -d -p P4ss-m0lt0-Ro.bust4 \/\r\n-o secret_estratto.txt Primo_estratto.txt.aes \r\n$ cat secret_estratto.txt\r\nDomani net-strike alle 14:30<\/pre>\n<div id=\"attachment_567\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/under12oot.noblogs.org\/files\/2013\/12\/Prova_AES.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-567\" class=\"size-medium wp-image-567\" style=\"margin: 7px\" title=\"Prova_AES\" alt=\"Prova_AES\" src=\"https:\/\/under12oot.noblogs.org\/files\/2013\/12\/Prova_AES-300x92.png\" width=\"300\" height=\"92\" srcset=\"https:\/\/under12oot.noblogs.org\/files\/2013\/12\/Prova_AES-300x92.png 300w, https:\/\/under12oot.noblogs.org\/files\/2013\/12\/Prova_AES-1024x317.png 1024w, https:\/\/under12oot.noblogs.org\/files\/2013\/12\/Prova_AES.png 1365w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-567\" class=\"wp-caption-text\">Steganofia e criptazione da shell<\/p><\/div>\n<p>E&#8217; stato necessario <em>rinominare<\/em> &#8220;mv Primo_estratto Primo_estratto.txt.aes&#8221; in quanto <em>aescrypt<\/em> dava un errore, probabilmente non riconoscendo il file,<em> strano<\/em> perch\u00e8 sui sistemi linux non esistono le estensioni, <em>ma cos\u00ec ho dovuto fare<\/em>&#8230; In pi\u00f9 ho <em>commesso un errore grammaticale<\/em>, ho scritto rUbusta invece che rObusta\u00a0 vabb\u00e8! Capita =)<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Se volessimo invece fare le cose in modo <em>decisamente pi\u00f9 sicuro e sofisticato<\/em> <em>steghide<\/em> \u00e8 un ottimo programma, lo si trova nei <em>repository<\/em>. Noi vedremo <em>l&#8217;utilizzo pi\u00f9 semplice<\/em>, per una visione completa vi rimando alla <em>lettura del manuale<\/em>. Ci tenevo per\u00f2 a mostrarvi questo (preso <em>ovviamente<\/em> dal man):<\/p>\n<p><em>\u00a0The default encryption algorithm is Rijndael with a key size of 128 bits (which is AES &#8211; the advanced encryption standard) in the cipher block chaining mode. If\u00a0 you\u00a0 do\u00a0 not trust this combination for whatever reason feel free to choose another algorithm\/mode combination (information about all possible algorithms and modes is displayed by the <strong>encinfo<\/strong> command).\u00a0 The checksum is calculated using the <strong>CRC32<\/strong> algorithm.<\/em><\/p>\n<pre>$ steghide encinfo \r\nencryption algorithms:\r\n&lt;algorithm&gt;: &lt;supported modes&gt;...\r\ncast-128: cbc cfb ctr ecb ncfb nofb ofb\r\ngost: cbc cfb ctr ecb ncfb nofb ofb\r\nrijndael-128: cbc cfb ctr ecb ncfb nofb ofb\r\ntwofish: cbc cfb ctr ecb ncfb nofb ofb\r\narcfour: stream\r\ncast-256: cbc cfb ctr ecb ncfb nofb ofb\r\nloki97: cbc cfb ctr ecb ncfb nofb ofb\r\nrijndael-192: cbc cfb ctr ecb ncfb nofb ofb\r\nsaferplus: cbc cfb ctr ecb ncfb nofb ofb\r\nwake: stream\r\ndes: cbc cfb ctr ecb ncfb nofb ofb\r\nrijndael-256: cbc cfb ctr ecb ncfb nofb ofb\r\nserpent: cbc cfb ctr ecb ncfb nofb ofb\r\nxtea: cbc cfb ctr ecb ncfb nofb ofb\r\nblowfish: cbc cfb ctr ecb ncfb nofb ofb\r\nenigma: stream\r\nrc2: cbc cfb ctr ecb ncfb nofb ofb\r\ntripledes: cbc cfb ctr ecb ncfb nofb ofb<\/pre>\n<p>Potrebbe <em>non capirsi una mazza<\/em>, ed effettivamente cos\u00ec \u00e8 se prima non leggete\u00a0 il manuale ed utilizzate <em>steghide<\/em> un paio di volte, ma facendovi vedere le <em>potenzialit\u00e0<\/em> spero che non vi fermiate agli esempi che vi proponiamo qui, che sono <em>solo semplici esempi<\/em> di utilizzo senza <em>nessuna pretesa!<\/em><\/p>\n<p>Supponiamo di voler nascondere <em>&#8220;messaggio_segreto.txt&#8221;<\/em> all&#8217;interno di una immagine, il wallpaper di under_r00t, la <em>sintassi<\/em> sarebbe questa:<\/p>\n<pre>$ steghide embed -cf wallpaper_under_r00t.png -ef messaggio_segreto.txt\r\n Enter passphrase:\r\n Re-Enter passphrase:\r\n embedding \"messaggio_segreto\" in \"wallpaper_under_r00t.png\"... done<\/pre>\n<p>Mentre per <em>estrarre<\/em> il messaggio:<\/p>\n<pre>$ steghide extract -sf wallpaper_under_r00t.png\r\n Enter passphrase:\r\n wrote extracted data to \"messaggio_segreto.txt\".<\/pre>\n<p>Pensiamo ora di trovarci nella situazione in cui ci arriva una<em> innoqua canzone<\/em> formato .wav da un nostro amico, potremmo voler ottenere delle <em>informazioni<\/em> prima di estrarre il messaggio. <em>Steghide<\/em> ci fornisce info sul <em>contenitore, il formato e la grandezza,<\/em> dopo di che ci chiede se vogliamo ottenere informazioni sul <em>messaggio steganografato<\/em> (chiamato <em>embedded<\/em>), fornendo la password <em>esatta<\/em> ci verranno stampate a video le info che riguardano <em>&#8220;messaggio_segreto.txt&#8221;<\/em> come la grandezza, l&#8217;algoritmo di criptazion, il modo e e se \u00e8 stato compresso:<\/p>\n<pre>$ steghide info canzone_punk.wav\r\n \"canzone_punk.wav\":\r\n format: wave audio, PCM encoding\r\n capacity: 6.3 KB\r\n Try to get information about embedded data ? (y\/n) y\r\n Enter passphrase:\r\n embedded file \"messaggio_segreto.txt\":\r\n size: 2.8 KB\r\n encrypted: rijndael-256, cbc\r\n compressed: yes<\/pre>\n<p>&nbsp;<\/p>\n<p>Finito anche a sto giro&#8230; Ancora bla bla se ci sono orrori scrivete, se blabla le solite cose! Vi lascio una lista non esaustiva di altri tool che potrebbero tornare utili, sia dal lato privacy sia dal lato forense (cio\u00e8 provate sulla vostra macchina a vedere se riuscite ad ottenere informazioni sensibili):<\/p>\n<p><span style=\"text-decoration: underline\">Lato Provacy:<\/span><\/p>\n<p><a href=\"https:\/\/lab.dyne.org\/Tomb\" target=\"_blank\">Tomb <\/a><\/p>\n<p><a href=\"http:\/\/manned.org\/sdmem\/acd0b8d1\" target=\"_blank\">sdmem<\/a><\/p>\n<p><a href=\"http:\/\/srm.sourceforge.net\/\" target=\"_blank\">srm<\/a><\/p>\n<p><a href=\"http:\/\/wipe.sourceforge.net\/\" target=\"_blank\">wipe<\/a><\/p>\n<p><a href=\"http:\/\/bleachbit.sourceforge.net\/\" target=\"_blank\">BleachBit<\/a><\/p>\n<p><em><strong>Ottima<a href=\"https:\/\/www.thc.org\/papers\/anonymous-unix.html\" target=\"_blank\"> lettura<\/a> ultra consigliata!!! c&#8217;\u00e8 pure un download con una &#8220;suite&#8221; di tool utili.<\/strong><\/em><\/p>\n<p><span style=\"text-decoration: underline\">Lato Forense<\/span>:<\/p>\n<p><a href=\"http:\/\/guymager.sourceforge.net\/\" target=\"_blank\">Guymanager<\/a><\/p>\n<p><a href=\"http:\/\/www.digital-forensic.org\/\" target=\"_blank\">dff<\/a><\/p>\n<p><a href=\"http:\/\/www.xplico.org\/\" target=\"_blank\">Xplico<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ultimo articolo della serie &#8220;proviamoci&#8221;&#8230;. Vedremo come usare la steganografia in modo semplice, faremo qualche esempio pratico e vedremo di combinare delle tecniche che abbiamo appreso negli articoli precedenti. A differenza di quello visto finora la steganografia \u00e8 qualcosa di pi\u00f9 &#8220;oscuro&#8221; , non sempre se ne parla anche se a pensarci bene \u00e8 forse [&hellip;]<\/p>\n","protected":false},"author":5820,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[79,13,60,78,77],"class_list":["post-562","post","type-post","status-publish","format-standard","hentry","category-howto","tag-analisi-forense","tag-hack","tag-privacy","tag-sicurezza","tag-steganografia"],"_links":{"self":[{"href":"https:\/\/under12oot.noblogs.org\/index.php?rest_route=\/wp\/v2\/posts\/562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/under12oot.noblogs.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/under12oot.noblogs.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/under12oot.noblogs.org\/index.php?rest_route=\/wp\/v2\/users\/5820"}],"replies":[{"embeddable":true,"href":"https:\/\/under12oot.noblogs.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=562"}],"version-history":[{"count":13,"href":"https:\/\/under12oot.noblogs.org\/index.php?rest_route=\/wp\/v2\/posts\/562\/revisions"}],"predecessor-version":[{"id":578,"href":"https:\/\/under12oot.noblogs.org\/index.php?rest_route=\/wp\/v2\/posts\/562\/revisions\/578"}],"wp:attachment":[{"href":"https:\/\/under12oot.noblogs.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/under12oot.noblogs.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/under12oot.noblogs.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}