steganography yaniv miron aka lament 24/5/09. whois /me entrepreneur & organizer of the il.hack...
TRANSCRIPT
![Page 1: Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws](https://reader036.vdocuments.mx/reader036/viewer/2022062809/5697bf9e1a28abf838c944e6/html5/thumbnails/1.jpg)
Steganography
Yaniv Miron
aka Lament
24/5/09
![Page 2: Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws](https://reader036.vdocuments.mx/reader036/viewer/2022062809/5697bf9e1a28abf838c944e6/html5/thumbnails/2.jpg)
Whois /me
Entrepreneur & Organizer of The IL.Hack 2009 Convention
Publisher of information security flaws
5 Year of official information security experience
Information Security researcher & Consultant
Mamram CISO in the past
24/5/09
![Page 3: Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws](https://reader036.vdocuments.mx/reader036/viewer/2022062809/5697bf9e1a28abf838c944e6/html5/thumbnails/3.jpg)
What is Steganography ?
The word steganography is of Greek origin and
means "concealed writing".
24/5/09
![Page 4: Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws](https://reader036.vdocuments.mx/reader036/viewer/2022062809/5697bf9e1a28abf838c944e6/html5/thumbnails/4.jpg)
What Steganography used for?
• Steganography can be used to maintain the confidentiality of valuable information, to protect the data from possible sabotage, theft, or unauthorized viewing
• Some other stuff (that we don’t care right now…)
24/5/09
![Page 5: Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws](https://reader036.vdocuments.mx/reader036/viewer/2022062809/5697bf9e1a28abf838c944e6/html5/thumbnails/5.jpg)
Steganography vs. Cryptography
• Steganography goal is to keep the presence of a message secret, or hide the fact that communication is taking place
• Cryptography goal is to obscure a message or communication so that it cannot be understood
24/5/09
![Page 6: Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws](https://reader036.vdocuments.mx/reader036/viewer/2022062809/5697bf9e1a28abf838c944e6/html5/thumbnails/6.jpg)
Steganography ?!
24/5/09
![Page 7: Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws](https://reader036.vdocuments.mx/reader036/viewer/2022062809/5697bf9e1a28abf838c944e6/html5/thumbnails/7.jpg)
Test Case 1: Picture
24/5/09
![Page 8: Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws](https://reader036.vdocuments.mx/reader036/viewer/2022062809/5697bf9e1a28abf838c944e6/html5/thumbnails/8.jpg)
Test Case 1: Picture
24/5/09
![Page 9: Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws](https://reader036.vdocuments.mx/reader036/viewer/2022062809/5697bf9e1a28abf838c944e6/html5/thumbnails/9.jpg)
Test Case 1: Picture
• Let’s change some hex in here …
• 3D -> 8F
24/5/09
![Page 10: Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws](https://reader036.vdocuments.mx/reader036/viewer/2022062809/5697bf9e1a28abf838c944e6/html5/thumbnails/10.jpg)
Test Case 1: Picture
24/5/09
![Page 11: Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws](https://reader036.vdocuments.mx/reader036/viewer/2022062809/5697bf9e1a28abf838c944e6/html5/thumbnails/11.jpg)
Test Case 2: Audio
• Some ATB Music . . .
24/5/09
![Page 12: Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws](https://reader036.vdocuments.mx/reader036/viewer/2022062809/5697bf9e1a28abf838c944e6/html5/thumbnails/12.jpg)
Test Case 2: Audio
• Lets see what’s going on in the backstage . . .
24/5/09
![Page 13: Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws](https://reader036.vdocuments.mx/reader036/viewer/2022062809/5697bf9e1a28abf838c944e6/html5/thumbnails/13.jpg)
Test Case 2: Audio
24/5/09
![Page 14: Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws](https://reader036.vdocuments.mx/reader036/viewer/2022062809/5697bf9e1a28abf838c944e6/html5/thumbnails/14.jpg)
Test Case 2: Audio
• .---- ----- --... ..... -.... .---- ..--- ----- ....- ---.. .---- .---- ----. ..... ...-- ----. ---.. ----. ---.. .---- .---- --... .---- .---- ...--
24/5/09
![Page 15: Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws](https://reader036.vdocuments.mx/reader036/viewer/2022062809/5697bf9e1a28abf838c944e6/html5/thumbnails/15.jpg)
Test Case 2: Audio
• Morse to English : 1075612048119539898117113
24/5/09
![Page 16: Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws](https://reader036.vdocuments.mx/reader036/viewer/2022062809/5697bf9e1a28abf838c944e6/html5/thumbnails/16.jpg)
Test Case 2: Audio
• Now we will divide the numbers to logical ASCII numbers as: 107 56 120 48 119 53 98 98 117 113
24/5/09
![Page 17: Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws](https://reader036.vdocuments.mx/reader036/viewer/2022062809/5697bf9e1a28abf838c944e6/html5/thumbnails/17.jpg)
Test Case 2: Audio
24/5/09
![Page 18: Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws](https://reader036.vdocuments.mx/reader036/viewer/2022062809/5697bf9e1a28abf838c944e6/html5/thumbnails/18.jpg)
Test Case 2: Audio
• The password is: k8x0w5bbuq
24/5/09
![Page 19: Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws](https://reader036.vdocuments.mx/reader036/viewer/2022062809/5697bf9e1a28abf838c944e6/html5/thumbnails/19.jpg)
Questions ?
->
Google.COM
24/5/09