Thursday, April 29, 2021

Hiding Data

 Hide data in an audio file:beginner:


We looked at a method for hiding files in picture
this time we will show you a method for hiding data in audio files.

Let's get started:

Download and install DeepSound - http://fumacrom.com/bImz

Open DeepSound and click on "Open carrier files", then specify the path where the audio file is stored, where the information will be hidden.

Click on "Add secret files" and select the required data.

Next click on "Encode secret files".

The files were hidden in the "music". to get them out of there, on the main page of the program, add the audio file in which the data was encrypted and click on "Extract secret files".

Done!

Hiding Data

 Hide Data inside Images


:small_blue_diamond:Create a folder. Name it anything you wish, say hide.

put anything and everything you want to hide in this folder. Text files, other images, executables - anything. Also, put the image behind which you want to hide the files in the same directory, sayimage.jpg”.

:small_blue_diamond:we need to archive this folder. You can use your choice of compression tool for this (I recommend the free and open-source 7-zip). So now we have a zip file hide.zip containing all of the data we want to hide behind an image.

:small_blue_diamond:You should have your image, say image.jpg (inside of which we’ll hide our data) in the same directory as hide.zip (next to it).

:small_blue_diamond:open command prompt and move to the folder where image.jpg and hide.zip are located using the cd command:cd PATH For example: cd C:\Folder cd desktop

:small_blue_diamond:Now we type in the following command:copy /b image.jpg + hide.zip output.jpg

DONE

Wednesday, April 28, 2021

Data Research Engines

Best Search Engines Used By Security Researchers


Security professionals need to correlate data during OSINT, reconnaissance, vulnerability detection, network security breaches, and more. There are quite a few interesting and useful search engines in this blog

Shodan is a network security monitoring system and search engine that contains data from any type of electronic device that has ever been connected to Internet

Censys it tracks every online device on the Internet and provides data and reports in the form of a search engine on how devices, websites and certificates are set up

GreyNoise this system tracks those who scan the Internet using the aforementioned scanners

Hunter is a search engine that helps you get all email addresses belonging to a domain or organization

Pipl is a system designed to search for information about a specific person