Lawful Intercept

This category contains 10 posts

Automatically decompiling virii

While looking for better and faster ways of analyzing virii to attack CNCs faster I ended up finding some new tools out in the world these days. You guys keep me on my toes with coming out with open source tech constantly! There is a free .Net compiler called JustDecompile recently release by Telerik(ok of … Continue reading

Audio Steganography PT5: Estimating Size of Data Hidden by MP3Stego

Analyzing the size of the hidden information After confirming MP3Stego encoder, the size of the hidden information can be determined by calculating the changes of block length’ variance, because the variance changes obviously between the mp3 data with or without information-hiding. Let x denote the block length, and ∑x denote the summation of n blocks … Continue reading

Audio Steganography PT4: detecting MP3Stego

A new method to detect MP3Stego When encoding a MP3 file, the frame length is in byte according to the bit stream format, but at the time of quantization and encoding, the Main Data is a bit stream. So when data is packed to frames, it may produce 1 to 7 padding bits to satisfy … Continue reading

Audio Steganography PT3: Understanding MP3Stego’s Technique

MP3Stego’s Information-hiding method was the research result of the Fraunhofer-IIS Institute. The MP3 audio encoding process is shown in Figure 1. The important parts that carry out the MP3 encoding are the two loops. The inner loop is a quantization and encoding loop. If the bits produced by quantization and encoding exceed the available max_length … Continue reading

Audio Steganography PT2: Attacking MP3Stego

MP3Stego was developed by Cambridge University for the purpose of hiding information in MP3s. While being a purely academic exercise I am sure, its source code and binaries are available online, and have been used as the basis of a lot of steganographic programs. As MP3 is the most commonly distributed music format, using the … Continue reading

Audio Steganography PT1: Using MP3Stego

How to Hide data (Steganography) into MP3 file – mp3stego Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity MP3Stego will hide information in MP3 files during the … Continue reading

Detecting Steganography in JPG Images

If you read my article on using MITM attacks on Tor you might be wondering about practical purposes other than stealing passwords and personal information. The fact is that I have no interest whatsoever in targeting specific people. I do what I do for 2 reason, I find the synergy and flow of data sexy, … Continue reading

An Introduction to Steganography aka Stenography

What is Steganography Steganography is the art and science of hiding that communication is happening. Classical steganography systems depend on keeping the encoding system secret, but modern steganography is detectable only if secret information is known, e.g. a secret key. Because of their invasive nature, steganography systems leave detectable traces within a medium’s characteristics. This … Continue reading

MITM Attack against Tor SSL for Deep Packet Analysis

Tor is wonderful tool to ensure your privacy on the Internet. Tor prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor achieves this by bouncing through other Tor users via an anonymous and encrypted interchange. In short a series … Continue reading

Detect nude images and pornography without using OpenCV

OpenCV (Open Source Computer Vision) is a library of programming functions for processing video and images. The library has more than 2500 optimized algorithms. Usage ranges from interactive art, to mines inspection, stitching maps on the web or through advanced robotics. Below is some code copied from that OpenCV group that gives a mask for … Continue reading