Personally Discovered through my experiments.
Camouflage is what is known as a steganography program. A steganography program that works to hide data from people where they wouldn't be likely to look for it. Camouflage (which can be downloaded from their website here) is a program that will let you take a data file and hide it behind another file. Sounds pretty cool right? But how secure is it? That's What we are here to find out.
|

{Please Note: I didn't make this image and wish to give credit to it's creator. however I don't remember who that is or were i got this image {probably Deviant Art} from or even how long ago it was. If you are the artist who made this image PLEASE LET ME KNOW SO I CAN GIVE YOU THE CREDIT YOU SO RIGHTFULLY DESERVE}.
Now after installing camouflage, hide the hidden.txt file behind our image. To do this, Right click on hidden.txt and go to "Camouflage". The Program window will appear, click on "next". On the next screen browse to the image file and click "next". On this screen give it at new name(for study purposes I called mine thcry-test.jpg). On the next part it ask for a password. I used "test". This is my new image.



Now it is time. Lets use the 42 byte text file again and lets create 5 new files using the passwords "A", "AA","AAA", "AAAA", "AAAAA". Here they are.




After this, The string listed above remains static. But more interesting is there are other parts in the Hex 0x20 that stay static as well. However most note able was at offset 0x00001309-0x00001313. This was static with data after it that changed... BUT WAS ALWAYS THE SAME LENGTH AS THE PASSWORD! Furthermore the password was a repeating character "A". Which this data is the same length but as it grows the data *wasn't* changing! If you are familar with XOR logic encryption, then you should already see this is what it looks like we're dealing with. If your not familar with XOR please take a look at this or This link here berfore you continue!

So a Weakness Exist in XOR since it is a reversable encryption. There are three parts to it. The PlainText, The Key, and the Cipher text. As long as you have two of the 3, you can XOR them to get the missing part. So we Know the AAAA plaintext; which converted from ASCII to hex an "A" is 0x41, and we know it's Cipher text. So we are missing the key. We can for a quick example try to XOR 0x41414141 by 0x43D43B63 and should get a key, which should decrypt the "test" password as well. Microsoft actually provide Hex and XOR in the normal calculator that comes with windows under the Scientfic view.


|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|
| Taken from http://camouflage.unfiction.com/FAQ.html#Q10 |
| 10. I've forgotten my password and can't uncamouflage a file. What can I do? Camouflage always asks you for a password whether the file is camouflaged or not, or whether it is a camouflaged file with a password or not. This is because Camouflage doesn't give the game away that a file may be camouflaged. For security reasons we cannot release a program to reveal passwords in camouflaged files. If you forget your password we can't usually help you. Be careful when typing in passwords - check your CAPS LOCK because Camouflage passwords are case-sensitive. |
I have taken the time to code a program to recover these passwords and also test a file for signs of camouflage. I called this program "IfraReD" because IfraRed goggles can help you see someone wearing camouflage. This Program was coded in Visual Basic 6 and is open soruce (Nice and commented this time! ;-D ). As you can see it is very effective. After you have the password, Just use camouflage to decrypt it. Below is the program in action with the password on this picture.


HKEY_CURRENT_USER\Software\Camouflage\CamouflageFile has the name of files used for hiding (the original ones).
Also you should see:
HKEY_CURRENT_USER\Software\Camouflage\OutputFile Shows a list of the Output files with the hidden data! This can also be used against them as most people always use the same password everywhere, therefore, Crack this one and chances are it will work elsewhere. Enjoy!
Resources and Further Reading
InfraRed
w/ binary, source, and test files. 50.3 kB
Download
Camouflage
http://camouflage.unfiction.com/
XOR Encryption
http://en.wikipedia.org/wiki/XOR_cipher
http://www.tech-faq.com/xor-encryption.shtml
Further Reading
Hiding in Plain Sight: Steganography and the Art of Covert Communication
w/ binary, source, and test files. 50.3 kB
Download
Camouflage
http://camouflage.unfiction.com/
XOR Encryption
http://en.wikipedia.org/wiki/XOR_cipher
http://www.tech-faq.com/xor-encryption.shtml
Further Reading
Hiding in Plain Sight: Steganography and the Art of Covert Communication
0 comments:
Post a Comment