Bit Maps & bitcoins puzzle

e
enricomaria.follega (710 points)
4 8 13
asked Oct 1, 2021 in Programming in Python by enricomaria.follega (710 points)
Couple of times i heard of people publishing images on the net, claiming that inside the picture there was the address to a bitcoin account.

During the lecture we talked about bitmaps that, if i didn’t get wrong, can generate also an image.

What is the technic used to find hided information inside an image?

Is it useful to look at the bitmap of the image?

Colours are hexa coded right?

So the account could be any pixel.
251 views

2 Answers

gianluca5539 (9820 points)
3 6 44
answered Oct 1, 2021 by gianluca5539 (9,820 points)
Information is hidden in images by editing their Hex. You can use an Hex editor to find Zero Bytes sectors that can be used to store any text you want.

If you want further information on this topic, have a look here:

https://www.google.it/amp/s/www.editprivacy.com/hide-text-inside-any-file-using-hex-editor/amp/?espv=1

Have a nice day!
Ganni02 (4920 points)
1 2 15
answered Oct 1, 2021 by Ganni02 (4,920 points)
Something which you might find interesting to read about is Steganography - the practice of hiding a secret message inside of (or on top of) something. There are multiple tools that can be used to do this and it is something also used in CTFs (Capture the Flags).

This is the CompTIA link for further information about Steganography, how it can be used and detected in special relation to cybersecurity (might be slightly different from your question but is also quite an interesting read): :))

https://www.comptia.org/blog/what-is-steganography#:~:text=Steganography%20is%20the%20practice%20of,do%20more%20than%20share%20messages.&text=This%20revealed%20the%20secret%20message%20I%20wanted%20to%20share.
Lorenzo_Pellegrino (770 points)
2 4 10
commented Oct 5, 2021 by Lorenzo_Pellegrino (770 points)
The fact that attackers can embed entire scripts in normal files such as excel or word is terrifying, I wonder if there's any method to prevent it.
d
daniel4x0 (4590 points)
0 0 2
commented Oct 5, 2021 by daniel4x0 (4,590 points)
You can use softwares like deep instinct's threat prevention.
Ganni02 (4920 points)
1 2 15
commented Oct 6, 2021 by Ganni02 (4,920 points)
The other more obvious way can br checking the size of the file as this is usually inflated if there is something hidden in it