//
archives

counter intelligence

This tag is associated with 22 posts

Tracking Website Visitors Pt5: Installation Script

/tracker/install.php Tracking Website Visitors Pt1: Masking Image Requests Tracking Website Visitors Pt2: Returning Image From Database Tracking Website Visitors Pt3: Returning Tracking Information Tracking Website Visitors Pt4: Uploading Image to MySql Tracking Website Visitors Pt5: Installation Script

Tracking Website Visitors Pt4: Uploading Image to MySql

/tracker/upload_image.php Tracking Website Visitors Pt1: Masking Image Requests Tracking Website Visitors Pt2: Returning Image From Database Tracking Website Visitors Pt3: Returning Tracking Information Tracking Website Visitors Pt4: Uploading Image to MySql Tracking Website Visitors Pt5: Installation Script

Tracking Website Visitors Pt3: Returning Tracking Information

This is just a simple page for reading the hits from the database with your tracking information for the image id involved. /tracker/status.php Tracking Website Visitors Pt1: Masking Image Requests Tracking Website Visitors Pt2: Returning Image From Database Tracking Website Visitors Pt3: Returning Tracking Information Tracking Website Visitors Pt4: Uploading Image to MySql Tracking Website … Continue reading

Tracking Website Visitors Pt2: Returning Image From Database

/tracker/return_image.php Tracking Website Visitors Pt1: Masking Image Requests Tracking Website Visitors Pt2: Returning Image From Database Tracking Website Visitors Pt3: Returning Tracking Information Tracking Website Visitors Pt4: Uploading Image to MySql Tracking Website Visitors Pt5: Installation Script

Tracking Website Visitors Pt1: Masking Image Requests

Email marketers commonly use small images embedded in email messages as tracking mechanisms. These email tracking images enable marketers to track approximately how many people viewed a particular email campaign. The same technology has implications in security. Now and then I am asked to consult on Bond skips. Bounty hunters will ask me to help … Continue reading

Automatically decompiling virii

While looking for better and faster ways of analyzing virii to attack CNCs faster I ended up finding some new tools out in the world these days. You guys keep me on my toes with coming out with open source tech constantly! There is a free .Net compiler called JustDecompile recently release by Telerik(ok of … Continue reading

Audio Steganography PT5: Estimating Size of Data Hidden by MP3Stego

Analyzing the size of the hidden information After confirming MP3Stego encoder, the size of the hidden information can be determined by calculating the changes of block length’ variance, because the variance changes obviously between the mp3 data with or without information-hiding. Let x denote the block length, and ∑x denote the summation of n blocks … Continue reading

Audio Steganography PT4: detecting MP3Stego

A new method to detect MP3Stego When encoding a MP3 file, the frame length is in byte according to the bit stream format, but at the time of quantization and encoding, the Main Data is a bit stream. So when data is packed to frames, it may produce 1 to 7 padding bits to satisfy … Continue reading

Audio Steganography PT3: Understanding MP3Stego’s Technique

MP3Stego’s Information-hiding method was the research result of the Fraunhofer-IIS Institute. The MP3 audio encoding process is shown in Figure 1. The important parts that carry out the MP3 encoding are the two loops. The inner loop is a quantization and encoding loop. If the bits produced by quantization and encoding exceed the available max_length … Continue reading

Audio Steganography PT2: Attacking MP3Stego

MP3Stego was developed by Cambridge University for the purpose of hiding information in MP3s. While being a purely academic exercise I am sure, its source code and binaries are available online, and have been used as the basis of a lot of steganographic programs. As MP3 is the most commonly distributed music format, using the … Continue reading