Hide secret files in music and photos (just like Mr Robot)



Hide secret messages and files in music and photos using steganography like just in the Mr Robot TV Series. OTW and I continue our discussions about the Mr Robot hacks and tricks.

// MENU //
00:00 – Coming Up
00:27 – Introduction
00:52 – The Responsibility of a White Hat Hacker
02:48 – Steganography
04:37 – Deep Sound
06:32 – Least Significant Bit Steganography
07:35 – Deep Sound Continued
13:42 – Stegosuite
22:22 – What Happens when you Delete a File
23:45 – Shredding
26:54 – Bleachbit
30:37 – Final Thoughts

// Mr Robot Playlist //
https://www.youtube.com/playlist?list=PLhfrWIlLOoKNYR8uvEXSAzDfKGAPIDB8q

// David’s SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal

// Occupy The Web social //
Twitter: https://twitter.com/three_cube

// OTW classes //
Hacker’s Arise Pro Subscription for $32.99 a month:
https://hackers-arise.com/online-store/Member-PRO-p444073646/?afmc=1d

Get 3 year’s access to all live courses for $750:
https://hackers-arise.com/online-store/Become-a-Hackers-Arise-Subscriber-3-years-of-training-p134507114/?afmc=1d

// Occupy The Web books //
Linux Basics for Hackers: https://amzn.to/3JlAQXe
Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh
Top Hacking Books you need to read: https://youtu.be/trPJaCGBbKU

// Other books //
The Linux Command Line: https://amzn.to/3ihGP3j
How Linux Works: https://amzn.to/3qeCHoY
The Car Hacker’s Handbook by Craig Smith: https://amzn.to/3pBESSM
Hacking Connected Cars by Alissa Knight: https://amzn.to/3dDUZN8

// Occupy The Web Website / Hackers Arise Website //
Website: https://www.hackers-arise.com/?afmc=1d
OTW Mr Robot series: https://www.hackers-arise.com/mr-robot

Want to learn more from Occupy the Web? You can join his classes using these links:
Hacker’s Arise Pro Subscription for $32.99 a month:
https://hackers-arise.com/online-store/Member-PRO-p444073646/?afmc=1d

Get 3 year’s access to all live courses for $750:
https://hackers-arise.com/online-store/Become-a-Hackers-Arise-Subscriber-3-years-of-training-p134507114/?afmc=1d

steganography
mr robot
steganography tutorial
music
steganography examples
steganography software
steganography techniques
encryption explained
encryption
hacking
ethical hacking
hacking tutorial
hacking tutorial for beginners
security
secrets
occupy the web
otw
facebook
instagram
photos
photographs
computers
rami malek
elliot alderson
mr robot tv show
mr robot clips
revolutionary hacks
mr. robot
mr robot hacking
hacker
hacker movie
kali linux tutorial
kali linux hacking tutorials
kali linux
hack
mr robot hack
mr robot hacks explained
hacks
hackers
how to hack
howto
how to
tutorial
guide
cyber
steghide
hide
secret
hidden
data
image
audio
files
conceal
encode

#steganography #hacking #mrrobot

source

This Post Has 38 Comments

  1. David Bombal

    Hide secret messages and files in music and photos using steganography like just in the Mr Robot TV Series. OTW and I continue our discussions about the Mr Robot hacks and tricks.

    // MENU //
    00:00 – Coming Up
    00:27 – Introduction
    00:52 – The Responsibility of a White Hat Hacker
    02:48 – Steganography
    04:37 – Deep Sound
    06:32 – Least Significant Bit Steganography
    07:35 – Deep Sound Continued
    13:42 – Stegosuite
    22:22 – What Happens when you Delete a File
    23:45 – Shredding
    26:54 – Bleachbit
    30:37 – Final Thoughts

    // Mr Robot Playlist //
    https://www.youtube.com/playlist?list=PLhfrWIlLOoKNYR8uvEXSAzDfKGAPIDB8q

    // David's SOCIAL //
    Discord: https://discord.com/invite/usKSyzb
    Twitter: https://www.twitter.com/davidbombal
    Instagram: https://www.instagram.com/davidbombal
    LinkedIn: https://www.linkedin.com/in/davidbombal
    Facebook: https://www.facebook.com/davidbombal.co
    TikTok: http://tiktok.com/@davidbombal
    YouTube: https://www.youtube.com/davidbombal

    // Occupy The Web social //
    Twitter: https://twitter.com/three_cube

    // OTW classes //
    Hacker's Arise Pro Subscription for $32.99 a month:
    https://hackers-arise.com/online-store/Member-PRO-p444073646/?afmc=1d

    Get 3 year's access to all live courses for $750:
    https://hackers-arise.com/online-store/Become-a-Hackers-Arise-Subscriber-3-years-of-training-p134507114/?afmc=1d

    // Occupy The Web books //
    Linux Basics for Hackers: https://amzn.to/3JlAQXe
    Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh
    Top Hacking Books you need to read: https://youtu.be/trPJaCGBbKU

    // Other books //
    The Linux Command Line: https://amzn.to/3ihGP3j
    How Linux Works: https://amzn.to/3qeCHoY
    The Car Hacker’s Handbook by Craig Smith: https://amzn.to/3pBESSM
    Hacking Connected Cars by Alissa Knight: https://amzn.to/3dDUZN8

    // Occupy The Web Website / Hackers Arise Website //
    Website: https://www.hackers-arise.com/?afmc=1d
    OTW Mr Robot series: https://www.hackers-arise.com/mr-robot

    Want to learn more from Occupy the Web? You can join his classes using these links:
    Hacker's Arise Pro Subscription for $32.99 a month:
    https://hackers-arise.com/online-store/Member-PRO-p444073646/?afmc=1d

    Get 3 year's access to all live courses for $750:
    https://hackers-arise.com/online-store/Become-a-Hackers-Arise-Subscriber-3-years-of-training-p134507114/?afmc=1d

  2. Anshu Mishra

    Sir , please clarify that why EH or H tends to choose kali over parrot ?

  3. J D

    Can you please do one similar on how to do this with your phone as well?

  4. Simon Phillips

    Excellent but how did that mp3 file size get multiplied by more than ten just by modulating the LSBs ? Additionally, such a huge file for an audio book would attract suspicion in my view.

  5. Xander

    Wasn't expecting him to talk about Iran and Mahsa Amini. Much appreciated. Such an educational video. Thanks David and OccupyTheWeb.

  6. Love

    Hlo David, over which platform we can send the encrypted message to someone, so he can decrypt it, and read the message. 😊

  7. Ducati Kozak

    5:50 'ended up being a good ruler '
    Good for who?
    Catherine the 'great' aggressively pushed russia's attack against Ukraine.

  8. MAX 502

    I was thinking yesterday of hidding some messages inside of an image and they just do so I'm so excited (;

    and have some puzzles to my friends XD

  9. Gordon Hughes

    Less than 10Kb secret but the final file is 10 times bigger then when it started. Bummer there is such a big difference.

  10. Thanks for the content David. Really appreciate your posting them on on YouTube 😊😀

  11. Enej Johhem

    Can Steganography be misused? like exchange of information to plan a criminal event.

  12. Doctor Spock

    Making money is an action.keeping money is a behaviour, but "Growing money is wisdom" I figured this out a week ago. ❤️💯✨

  13. Throw Away

    This guy is the Asian guy you had on the show before

  14. UXoverload

    Great segment, as usual! I've written some LSB steg programs with encryption and love it. This was an awesome video to get others into this super fun topic!

    It's been a hot minute since I've been able to watch and comment on your videos! I started a new IT support job where I work a lot and don't have a lot to time to peruse YouTube ha ha. I've got some catching up to do!

    Keep up this amazing segment!

  15. Kateb Yacine

    Couldn’t having the drive encrypted help prevent those files from being recovered after they were shredded?

  16. Logan T

    in the book, The Martian by Andy Weir, they used this method of cryptography to send a bunch of coordinates to the spaceship without NASA seeing. I loved how they embedded the information in a image file of one of the astronauts. I didn't know it was actually a real deal can't wait to see this in mr. robot been watching for a while and loving every minute of Elliot. keep up the good work David

  17. Cipher

    Why would only law enforcement and government agencies have the capabilities to recover overwritten files? Is it really unfeasible that an ordinary person could find a way?

  18. Sandamal Gamage

    This is the one of the fav vedio series in ur channel David. this is awesome. Thank u David share ur knowledge with us❤❤

  19. J C

    Excellent video as usual. One little thing, my class had some success "unshredding" some files with Autopsy. So the multi shred is important.

  20. Jessie

    David like always, bravo on the content!! Love it ❤️!!!. Any chance you may be able to get "Christopher Hadnagy" author of "Social Engineering: The Science of Human Hacking" to do a one on one with you?

  21. Utkarsh Mishra

    Absolutely brilliant David and OTW, totally loved it. You not only explained the concepts and showcased the demo, but also provided a historical context about the tools, which made this an amazing video!!!

  22. Mohamed Sherief

    What about detecting it? Is there a way to detect steganography ?

  23. John Whyte

    This video had the potential to be so much more interesting hindered by repetitive dialogue, mistakes in execution of the programs, irrelevant information relating to Catherine The Great! Also there was no examples demonstrated, eg comparative photos side by side, comparative portions of audio files played.

    Steganography was used by the Romans, yes; the Romans and has evolved since then obviously until where we are today using modern technology. Osama bin Laden was even using it?!?

    Using the LSB is the simplest method of Steganography as was stated in the video, however; other methods do exist which would have been better covered in the video rather than irrelevance of Catherine The Great (albeit the audio book was the carrier)!

    It would have been beneficial to have Stego detection methods covered, simple to advanced.

    I don’t know if this video or OTW was limited in time, however; if this is the case, the time should have been extended to permit OTW to cover the subject in more detail and with examples demonstrated.

    Constructive criticism for your consideration.

    Cheers.

  24. ndomele buhilya

    Would you be able to play the audio used to encrypt a secret file?

  25. Zaj lord

    can compression mess with this? (if you send photos online it often gets compressed)

  26. Misfit_Infantry

    Mannnnnn this content is sseriously sooooo gooood WE NEED MOREEEEE

  27. Shiv Stark

    Ain't these harmful for national security? I think it's a bonus for terrorist to share info without getting caught!

Leave a Reply