If you read my article on using MITM attacks on Tor you might be wondering about practical purposes other than stealing passwords and personal information. The fact is that I have no interest whatsoever in targeting specific people. I do what I do for 2 reason, I find the synergy and flow of data sexy, and I don’t like internet predators. An internet predator can take the shape of many different things, a botnet operator, a child predator, or a terrorist bent on destroying innocent human life.
After some deep packet analysis of Tor data, information can be categorized and discarded. In my case I am only interested in images, songs, and anything antivirus flags. Various programs can then attack the data for signs of predator behaviour. For instance my image and facial recognition software looks for weapons, and compares any faces to those appearing on most wanted sites. Images and songs are passed through various steganography detection programs to look for hidden data.
OutGuess is a universal steganographic tool that allows the insertion of hidden information into the redundant bits of data sources. The nature of the data source is irrelevant to the core of OutGuess. The program relies on data specific handlers that will extract redundant bits and write them back after modification. In this version the PNM and JPEG image formats are supported.
At first glance, they would sound like the bad guys helping people subvert prying eyes, however they have some other toys out there as well. StegBreak and StegDetect are also available in their toolkit. These tools can be ran on pretty much any environment to process your incoming data.