Hide secret messages and files in music and photos using steganography like just in the Mr Robot TV Series. OTW and I continue our discussions about the Mr Robot hacks and tricks.
// MENU //
00:00 – Coming Up
00:27 – Introduction
00:52 – The Responsibility of a White Hat Hacker
02:48 – Steganography
04:37 – Deep Sound
06:32 – Least Significant Bit Steganography
07:35 – Deep Sound Continued
13:42 – Stegosuite
22:22 – What Happens when you Delete a File
23:45 – Shredding
26:54 – Bleachbit
30:37 – Final Thoughts
// Mr Robot Playlist //
https://www.youtube.com/playlist?list=PLhfrWIlLOoKNYR8uvEXSAzDfKGAPIDB8q
// David’s SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
// Occupy The Web social //
Twitter: https://twitter.com/three_cube
// OTW classes //
Hacker’s Arise Pro Subscription for $32.99 a month:
https://hackers-arise.com/online-store/Member-PRO-p444073646/?afmc=1d
Get 3 year’s access to all live courses for $750:
https://hackers-arise.com/online-store/Become-a-Hackers-Arise-Subscriber-3-years-of-training-p134507114/?afmc=1d
// Occupy The Web books //
Linux Basics for Hackers: https://amzn.to/3JlAQXe
Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh
Top Hacking Books you need to read: https://youtu.be/trPJaCGBbKU
// Other books //
The Linux Command Line: https://amzn.to/3ihGP3j
How Linux Works: https://amzn.to/3qeCHoY
The Car Hacker’s Handbook by Craig Smith: https://amzn.to/3pBESSM
Hacking Connected Cars by Alissa Knight: https://amzn.to/3dDUZN8
// Occupy The Web Website / Hackers Arise Website //
Website: https://www.hackers-arise.com/?afmc=1d
OTW Mr Robot series: https://www.hackers-arise.com/mr-robot
Want to learn more from Occupy the Web? You can join his classes using these links:
Hacker’s Arise Pro Subscription for $32.99 a month:
https://hackers-arise.com/online-store/Member-PRO-p444073646/?afmc=1d
Get 3 year’s access to all live courses for $750:
https://hackers-arise.com/online-store/Become-a-Hackers-Arise-Subscriber-3-years-of-training-p134507114/?afmc=1d
steganography
mr robot
steganography tutorial
music
steganography examples
steganography software
steganography techniques
encryption explained
encryption
hacking
ethical hacking
hacking tutorial
hacking tutorial for beginners
security
secrets
occupy the web
otw
facebook
instagram
photos
photographs
computers
rami malek
elliot alderson
mr robot tv show
mr robot clips
revolutionary hacks
mr. robot
mr robot hacking
hacker
hacker movie
kali linux tutorial
kali linux hacking tutorials
kali linux
hack
mr robot hack
mr robot hacks explained
hacks
hackers
how to hack
howto
how to
tutorial
guide
cyber
steghide
hide
secret
hidden
data
image
audio
files
conceal
encode
#steganography #hacking #mrrobot
source
Hide secret messages and files in music and photos using steganography like just in the Mr Robot TV Series. OTW and I continue our discussions about the Mr Robot hacks and tricks.
// MENU //
00:00 – Coming Up
00:27 – Introduction
00:52 – The Responsibility of a White Hat Hacker
02:48 – Steganography
04:37 – Deep Sound
06:32 – Least Significant Bit Steganography
07:35 – Deep Sound Continued
13:42 – Stegosuite
22:22 – What Happens when you Delete a File
23:45 – Shredding
26:54 – Bleachbit
30:37 – Final Thoughts
// Mr Robot Playlist //
https://www.youtube.com/playlist?list=PLhfrWIlLOoKNYR8uvEXSAzDfKGAPIDB8q
// David's SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal
// Occupy The Web social //
Twitter: https://twitter.com/three_cube
// OTW classes //
Hacker's Arise Pro Subscription for $32.99 a month:
https://hackers-arise.com/online-store/Member-PRO-p444073646/?afmc=1d
Get 3 year's access to all live courses for $750:
https://hackers-arise.com/online-store/Become-a-Hackers-Arise-Subscriber-3-years-of-training-p134507114/?afmc=1d
// Occupy The Web books //
Linux Basics for Hackers: https://amzn.to/3JlAQXe
Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh
Top Hacking Books you need to read: https://youtu.be/trPJaCGBbKU
// Other books //
The Linux Command Line: https://amzn.to/3ihGP3j
How Linux Works: https://amzn.to/3qeCHoY
The Car Hacker’s Handbook by Craig Smith: https://amzn.to/3pBESSM
Hacking Connected Cars by Alissa Knight: https://amzn.to/3dDUZN8
// Occupy The Web Website / Hackers Arise Website //
Website: https://www.hackers-arise.com/?afmc=1d
OTW Mr Robot series: https://www.hackers-arise.com/mr-robot
Want to learn more from Occupy the Web? You can join his classes using these links:
Hacker's Arise Pro Subscription for $32.99 a month:
https://hackers-arise.com/online-store/Member-PRO-p444073646/?afmc=1d
Get 3 year's access to all live courses for $750:
https://hackers-arise.com/online-store/Become-a-Hackers-Arise-Subscriber-3-years-of-training-p134507114/?afmc=1d
Sir , please clarify that why EH or H tends to choose kali over parrot ?
jpinsoft unsafe website
Beautiful, excellent episode, thanks David
Can you please do one similar on how to do this with your phone as well?
Excellent but how did that mp3 file size get multiplied by more than ten just by modulating the LSBs ? Additionally, such a huge file for an audio book would attract suspicion in my view.
Wasn't expecting him to talk about Iran and Mahsa Amini. Much appreciated. Such an educational video. Thanks David and OccupyTheWeb.
Hlo David, over which platform we can send the encrypted message to someone, so he can decrypt it, and read the message. 😊
5:50 'ended up being a good ruler '
Good for who?
Catherine the 'great' aggressively pushed russia's attack against Ukraine.
I was thinking yesterday of hidding some messages inside of an image and they just do so I'm so excited (;
and have some puzzles to my friends XD
COOL!
Less than 10Kb secret but the final file is 10 times bigger then when it started. Bummer there is such a big difference.
Thanks for the content David. Really appreciate your posting them on on YouTube 😊😀
Can Steganography be misused? like exchange of information to plan a criminal event.
Making money is an action.keeping money is a behaviour, but "Growing money is wisdom" I figured this out a week ago. ❤️💯✨
This guy is the Asian guy you had on the show before
Great segment, as usual! I've written some LSB steg programs with encryption and love it. This was an awesome video to get others into this super fun topic!
It's been a hot minute since I've been able to watch and comment on your videos! I started a new IT support job where I work a lot and don't have a lot to time to peruse YouTube ha ha. I've got some catching up to do!
Keep up this amazing segment!
Couldn’t having the drive encrypted help prevent those files from being recovered after they were shredded?
in the book, The Martian by Andy Weir, they used this method of cryptography to send a bunch of coordinates to the spaceship without NASA seeing. I loved how they embedded the information in a image file of one of the astronauts. I didn't know it was actually a real deal can't wait to see this in mr. robot been watching for a while and loving every minute of Elliot. keep up the good work David
Why would only law enforcement and government agencies have the capabilities to recover overwritten files? Is it really unfeasible that an ordinary person could find a way?
White hats crack not hack and AI will find EVERYTHING
This is the one of the fav vedio series in ur channel David. this is awesome. Thank u David share ur knowledge with us❤❤
Excellent video as usual. One little thing, my class had some success "unshredding" some files with Autopsy. So the multi shred is important.
💜💜💜
David like always, bravo on the content!! Love it ❤️!!!. Any chance you may be able to get "Christopher Hadnagy" author of "Social Engineering: The Science of Human Hacking" to do a one on one with you?
One of the best best channal
Absolutely brilliant David and OTW, totally loved it. You not only explained the concepts and showcased the demo, but also provided a historical context about the tools, which made this an amazing video!!!
Great stuff, David. Thank you.
Thank you for your Awesome videos 🙏
What about detecting it? Is there a way to detect steganography ?
This video had the potential to be so much more interesting hindered by repetitive dialogue, mistakes in execution of the programs, irrelevant information relating to Catherine The Great! Also there was no examples demonstrated, eg comparative photos side by side, comparative portions of audio files played.
Steganography was used by the Romans, yes; the Romans and has evolved since then obviously until where we are today using modern technology. Osama bin Laden was even using it?!?
Using the LSB is the simplest method of Steganography as was stated in the video, however; other methods do exist which would have been better covered in the video rather than irrelevance of Catherine The Great (albeit the audio book was the carrier)!
It would have been beneficial to have Stego detection methods covered, simple to advanced.
I don’t know if this video or OTW was limited in time, however; if this is the case, the time should have been extended to permit OTW to cover the subject in more detail and with examples demonstrated.
Constructive criticism for your consideration.
Cheers.
occupy the web is amazing. I enjoy his talks a lot.
Would you be able to play the audio used to encrypt a secret file?
can compression mess with this? (if you send photos online it often gets compressed)
I know that voice 😉
So the big problem is the size increase. How can we deal with that?
Mannnnnn this content is sseriously sooooo gooood WE NEED MOREEEEE
Ain't these harmful for national security? I think it's a bonus for terrorist to share info without getting caught!