Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Steganography and PNGs
Search
Sponsored
·
Your Podcast. Everywhere. Effortlessly.
Share. Educate. Inspire. Entertain. You do you. We'll handle the rest.
→
Brian de Heus
October 12, 2019
0
59
Steganography and PNGs
How to hide arbitrary data in PNGs and have image CDNs host it for you.
Brian de Heus
October 12, 2019
Tweet
Share
More Decks by Brian de Heus
See All by Brian de Heus
Kubernetes 101 - A practical introduction into Kubernetes
briandeheus
0
75
Service communication made easy
briandeheus
1
73
A Docker Swarm Love Story
briandeheus
0
92
Featured
See All Featured
<Decoding/> the Language of Devs - We Love SEO 2024
nikkihalliwell
1
130
Performance Is Good for Brains [We Love Speed 2024]
tammyeverts
12
1.4k
Leading Effective Engineering Teams in the AI Era
addyosmani
9
1.6k
Connecting the Dots Between Site Speed, User Experience & Your Business [WebExpo 2025]
tammyeverts
11
830
The Cult of Friendly URLs
andyhume
79
6.8k
brightonSEO & MeasureFest 2025 - Christian Goodrich - Winning strategies for Black Friday CRO & PPC
cargoodrich
3
100
YesSQL, Process and Tooling at Scale
rocio
174
15k
[RailsConf 2023 Opening Keynote] The Magic of Rails
eileencodes
31
9.9k
Digital Ethics as a Driver of Design Innovation
axbom
PRO
1
190
Mind Mapping
helmedeiros
PRO
0
90
Building an army of robots
kneath
306
46k
Why You Should Never Use an ORM
jnunemaker
PRO
61
9.7k
Transcript
Free Unlimited Storage With This One Weird Trick! System Administrators
Hate Him!
steganography /stɛɡəˈnɒɡrəfɪ/ noun 1. the practice of concealing messages or
information within other non-secret text or data.
Herodotus
Admiral Jeremiah Denton
Message Under The Stamp
Brian de Heus briandotjp
Append After End Byte +
Binary Storage
Least Significant Bit Source: https://www.peerlyst.com/posts/the-threat-of-digital-steganography-cloaked-malware-to-u-s-critical-infrastructure-systems-ian-barwise-m-s-cissp-ceh-cnda
None
PNG Portable Network Graphics
None
signature 8 bytes chunk size 4 bytes chunk type 4
bytes chunk data n bytes chunk crc 4 bytes chunk size 4 bytes chunk type 4 bytes chunk data n bytes chunk crc 4 bytes chunk size 4 bytes chunk type 4 bytes chunk data n bytes chunk crc 4 bytes
Critical Chunks IHDR PLTE* IDAT IEND
Ancillary Chunks bKGD cHRM dSIG eXIf gAMA hIST iCCP iTXt
pHYs sBIT sPLT sRGB sTER tEXt tIME tRNS zTXt
criticality scope reserved safety CRITICAL non-critical PUBLIC private ALWAYS UPPERCASE
DON’T COPY safe to copy
I H D R CRITICAL PUBLIC DON’T COPY
e X I f non-critical PUBLIC safe to copy
None
Make my own chunks!
p u N k non-critical private safe to copy
None
+
Chunk size: 13 Chunk type: IHDR CRC: 9a768270 Chunk size:
218087 Chunk type: IDAT CRC: e11d26bc Chunk size: 0 Chunk type: IEND CRC: ae426082 Hiding 27 kB ( 28208 bytes) Injecting punk chunk Punk chunk injected Reached EOF
Chunk size: 13 Chunk type: IHDR CRC: 9a768270 Chunk size:
218087 Chunk type: IDAT CRC: e11d26bc Chunk size: 28208 Chunk type: puNk CRC: 8cccb594 Chunk size: 0 Chunk type: IEND Reached EOF
http://i.imgur.com/Qk5BP19.png
Demo Time!
Lesson 1 Do not trust user input
Lesson 2 Do not trust anyone
Lesson 3 Doge meme isn’t dead wow much brave such
opinion
Thanks!!