4.9 • 696 Ratings
🗓️ 2 May 2025
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Friday, May 2, 2025 edition of the Sands and at Storm Center's Stormcast. |
0:08.1 | My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida. |
0:13.6 | And we have another steganography diary from DDIH, further figuring out, well, how to analyze some messages or in this case binaries that are embedded in |
0:25.5 | images. PNGdump.Py, DDA's tool that he used in last weekend's diary, is able to take a compressed |
0:37.2 | PNGG image and basically expand it and display the uncompressed |
0:43.2 | pixel values for the particular image. PNG is compressed. It's lossless compression and |
0:50.3 | actually lossy compression wouldn't work with steganography, because they exactly sort of do these one-bit changes that are often lost when it comes to compression that loses some of the detail of the image. |
1:05.8 | So once you have the actual byte values, the one thing that PNGD dump doesn't do, |
1:12.5 | it actually doesn't sort of help you extract individual bits. |
1:16.4 | But, well, of course, DDIH has a tool just for that. |
1:20.8 | It's called format bytes. |
1:23.6 | So what Didiya did in today's diary was look at two images. |
1:28.1 | One is with message, one without message. |
1:31.7 | It uses that least significant bit methodology, |
1:35.0 | which basically results in identical, at least visually, images. |
1:40.1 | And then using format bytes, |
1:43.6 | Didier extracted the executable from the bitstream that you get from PNG dump? |
1:52.8 | Format bytes is a string tool. If you look at the example, it sort of allows you very flexibly to define the actual format being used, |
2:01.5 | how many bits, little Indian, big engine, all of these details, |
2:05.6 | and then extract respective data, which is really useful here. |
2:09.4 | And Didy also promises, well, a little challenge for Saturday. |
2:15.5 | And Olivia Brown with Sock, the company that specializes in software security, |
... |
Transcript will be available on the free plan in 27 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.