0% found this document useful (0 votes)
123 views3 pages

4.3.2.3 Lab - Using Steganography

This lab uses steganography to hide a document within a JPEG image file. The steganography program Steghide is used to embed the secret.odt file into the keyboard.jpg image. Steghide commands are then used to verify and extract the hidden file. The extracted secret.odt file is found to have the same secret message as the original file.

Uploaded by

karenozelleb88
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
123 views3 pages

4.3.2.3 Lab - Using Steganography

This lab uses steganography to hide a document within a JPEG image file. The steganography program Steghide is used to embed the secret.odt file into the keyboard.jpg image. Steghide commands are then used to verify and extract the hidden file. The extracted secret.odt file is found to have the same secret message as the original file.

Uploaded by

karenozelleb88
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Lab–Using Steganography

Objectives
Use steganography to hide a document within a JPEG file.

Background / Scenario
Steghide is an open source steganography program that hides data in various types of files such as audio
and image files. You are going to hide a data file within an image file.

Required Resources
 PC with Existing Virtual Machine

Step 1:
a. Start your existing virtual machine.
b. Click on the terminal icon to open a terminal.

Step 2: Run Steghide.


a. At the command prompt, enter the following command to change to the Downloads directory:
cisco@ubuntu:~$ cd Downloads/
b. Enter libreoffice secret.odt& at the prompt.
cisco@ubuntu:~/Downloads$ libreoffice secret.odt&
What is the message in the secret.odt?
____________________________________________________________________________________
c. Close the secret.odt file when done.
d. Enter gimp keyboard.jpg & at the prompt to view the image file
cisco@ubuntu:~/Downloads$ gimp keyboard.jpg &
e. Close the keyboard.jpg file when done.
f. At the command prompt, enter the following command :

© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 3
Lab–Using Steganography

cisco@ubuntu:~/Downloads$ steghide embed -cf keyboard.jpg -ef secret.odt


This command takes the jpeg file called “keyboard.jpg” and uses it as a carrier to embed the document,
secret.odt, into it.
g. When prompted for a passphrase, use Cisco. Re-enter the passphrase when prompted.

h. You have embedded the document, secret.odt, into the image file, keyboard.jpg.
i. Open the files, secret.odt and keyboard.jpg. Did these files change? _____________________________

Step 3: Verify the hidden file.


a. Type the following command in terminal.
cisco@ubuntu:~/Downloads$ steghide info keyboard.jpg

b. Type y at the prompt. (Do not press Enter).


c. Enter the passphrase Cisco and press Enter.
d. The results below shows that the file, secret.odt, is encrypted and compressed.

Step 4: Extract the hidden file.


a. Type the following command in terminal.
cisco@ubuntu:~/Downloads$ steghide extract -sf keyboard.jpg

b. Enter the passphrase, Cisco, and press Enter.


c. Enter y when prompted to overwrite the existing secret.odt file with the new extracted secret.odt file.

d. You have extracted the file. Open the extracted secret.odt file with LibreOffice.

© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 3
Lab–Using Steganography

Could you open the file? Is the secret message the same as before?
____________________________________________________________________________________

References
Steghide: http://steghide.sourceforge.net/

© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 3

You might also like