Learn how to crack steganography passwords in four simple steps

For All Things IT Security Conference Related

Join Our Newsletter [Over 50K Subscribers]

Let us send you information on ticket discounts, speaking opportunities and a ton more!

Home / Blog / Learn how to crack steganography passwords in four simple steps

Learn how to crack steganography passwords in four simple steps

Tagged Under:

This coming Thursday, February 13th at 6pm EST, we are proud to announce our “Crack Stenography Passwords In Four Simple Steps: Develop The Mindset Of A Reverse Engineer” with APT Expert Jaron Bradley.

Clearly this is now over – but fear not, we have a ton of awesome Crypto books you might find useful.

In our 90-minute live online class, which is aimed at crackers, reverse-engineers, and forensic analysts the learning objectives are as follows:

1. Crack basic encrypted/ hashed passwords and methodologies
2. Develop the mindset of a reverse-engineer
3. Get acquainted with anti-forensics tools and learn when, why, and how they’re used
4. Learn how to detect what files these tools have been used on

The intention of the course is to install you with greater confidence, less stress and a simple proven plan to understand how attackers and scammers use steganography to hide their true intentions, and you will learn how to develop a solution to counter these tricky methods.

The Class Learning Objectives:

– Detailed explanation and examples of steganographic methods
– Explanation of a reverse-engineering approach to our problem
– Identifying digital signatures of stenography
– Creating stenographic files for comparison
– Locating significant bytes in a hex-editor
– Pinpointing and reversing basic encryption
– Overview of writing a password cracker for our target software
– Automating detection using Yara

About Jaron – the Instructor

Jaron Bradley is a Forensic Response Analyst with a focus on APT. Jaron has an Associates Degree in Computer Forensics and a Bachelors Degree in Applied Information Assurance. His certifications include: Linux/Unix Administration, Wireless Pentesting With Backtrack Certification and Pentesting With Backtrack Certification.

We are charging only $49.95 for this course which is limited to a maximum of 25 people. Follow this link for more information and to enroll.

OK! But what is steganography?

For those that don’t know, steganography is the art and computer science of being able to hide messages. Think of it as hidden ink. In much the same way that as kids, we used lemon juice to write a secret message which could only be revealed by placing the paper under moderate heat – this is the same deal. The point with steganography is that only the sender and intended recipient, suspects (that’s the keyword: suspects) that a secret message lies within an image or text.

The main advantage of steganography over cryptography is that messages do not attract attention, i.e. there is no visible locked door. Visible encrypted messages—no matter what security it has – will always arouse suspicion and be subject to hacking attempts.

If you are interested in digital forensics then you will certainly gain a lot from this course – but Jaron’s tuition will benefit everyone who works in information security. Last thing to say is that steganography will continue (and in our opinion increase) as a concept and the skills required to understand it will be valuable to your career. Why? Because criminals and terrorists are increasingly using this method of encryption. In 2010, the FBI revealed that the Russian foreign intelligence service uses customized steganography software for embedding encrypted text messages inside image files for certain communications with “illegal agents” (agents under non-diplomatic cover) stationed abroad.

A report by the National Science and Technology Council, April 2006 titled “Federal Plan for Cyber Security and Information Assurance Research and Development” states that al-Qaeda operatives had used steganography to encode messages into images, and then transported these via e-mail and possibly via USENET to prepare and execute the September 11, 2001 terrorist attack. Clearly, being able to understand at least the principles, along with all the learning objectives listed above, would be of immense value to your CV, and your career in information security. Here is the link for more information. If you have any questions please contact us.

  • Eiji Kawaguchi

    I’m a researcher of digital steganography, and co-invented a very large image-steganography method named “BPCS-Steganography.” We have been seeking “steganalysis professioals” who challege to crack our steganography. Some example stego images are posted on our Web site: (removed by concise)

  • Leave a comment or reply below...thanks!