This is the README documentation for the Steganography Lab, produced and maintained by CodePath.org.
Want to jump into the lab? Navigate to the Part 0 Instructions to get started!
The Steganography Lab is designed to teach you about files, metadata, and the techniques used to hide information within various file types. You'll gain hands-on experience with real-world scenarios and learn how steganography can be used for both legitimate and malicious purposes. This will help you secure your own data and understand the potential risks involved when working with different file types.
- Understand basics of file encoding, data, and metadata
- Manipulate file data and metadata using CyberChef
- Analyze metadata in the terminal using ExifTool
- Extract and embed hidden files inside JPG images with Steghide
- Set up the lab environment using Docker.
- Learn: Metadata, Files, and Images
- Apply: Data Manipulation in CyberChef
- Challenge: Exfiltrate Data with Steghide
In Parts 1-2, you will use the popular tool Cyberchef.
In Part 3, in the provided Docker container, you will find all the necessary tools and dependencies pre-installed. This includes:
bash- A Unix shell and command language (this is how you will interact with the container)exiftool- A tool for reading and writing metadata in image filessteghide- A tool for hiding and extracting data within image fileschafa- A tool for converting images to ASCII art (optional)
In addition, you may use built-in commands such as ls, cd, echo, and cat to navigate and manipulate files within the container.
