//
archives

Deep Packet Analysis

This category contains 11 posts

Port 4567 on Centurylink and Verizon PT2

Since some people still don’t get it and have resorted to calling me a “nigger” to prove their argument as sound…. I am posting this followup article that also includes pretty pictures. HERE, picture 1 And here are the basic features of such remote administration. Service activation and reconfiguration Initial configuration of the service as … Continue reading

Port 4567 on Centurylink and Verizon

Little disturbed buzz about 4567 over the last day or two as a few newfags realized that 4567 is open to the world. Well how exactly did you expect that your DSL tech support can tell whether or not your modem is working properly and run speed tests on the link? MAGIC?? 4567 is registered … Continue reading

Audio Steganography PT5: Estimating Size of Data Hidden by MP3Stego

Analyzing the size of the hidden information After confirming MP3Stego encoder, the size of the hidden information can be determined by calculating the changes of block length’ variance, because the variance changes obviously between the mp3 data with or without information-hiding. Let x denote the block length, and ∑x denote the summation of n blocks … Continue reading

Audio Steganography PT4: detecting MP3Stego

A new method to detect MP3Stego When encoding a MP3 file, the frame length is in byte according to the bit stream format, but at the time of quantization and encoding, the Main Data is a bit stream. So when data is packed to frames, it may produce 1 to 7 padding bits to satisfy … Continue reading

Audio Steganography PT3: Understanding MP3Stego’s Technique

MP3Stego’s Information-hiding method was the research result of the Fraunhofer-IIS Institute. The MP3 audio encoding process is shown in Figure 1. The important parts that carry out the MP3 encoding are the two loops. The inner loop is a quantization and encoding loop. If the bits produced by quantization and encoding exceed the available max_length … Continue reading

Audio Steganography PT2: Attacking MP3Stego

MP3Stego was developed by Cambridge University for the purpose of hiding information in MP3s. While being a purely academic exercise I am sure, its source code and binaries are available online, and have been used as the basis of a lot of steganographic programs. As MP3 is the most commonly distributed music format, using the … Continue reading

Audio Steganography PT1: Using MP3Stego

How to Hide data (Steganography) into MP3 file – mp3stego Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity MP3Stego will hide information in MP3 files during the … Continue reading

Detecting Steganography in JPG Images

If you read my article on using MITM attacks on Tor you might be wondering about practical purposes other than stealing passwords and personal information. The fact is that I have no interest whatsoever in targeting specific people. I do what I do for 2 reason, I find the synergy and flow of data sexy, … Continue reading

MITM Attack against Tor SSL for Deep Packet Analysis

Tor is wonderful tool to ensure your privacy on the Internet. Tor prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor achieves this by bouncing through other Tor users via an anonymous and encrypted interchange. In short a series … Continue reading

Digital image steganography of encrypted text

Paranoia allows a user to securely transfer a text message by hiding it in a digital image file. 128 bit AES encryption is used to protect the content of the text message even if its presence were to be detected. Currently, no methods are known for breaking this kind of encryption within a reasonable period … Continue reading