Home | Community | Message Board

Magic-Mushrooms-Shop.com
This site includes paid links. Please support our sponsors.


Welcome to the Shroomery Message Board! You are experiencing a small sample of what the site has to offer. Please login or register to post messages and view our exclusive members-only content. You'll gain access to additional forums, file attachments, board customizations, encrypted private messages, and much more!

Shop: Unfolding Nature Unfolding Nature: Being in the Implicate Order   North Spore North Spore Mushroom Grow Kits & Cultivation Supplies   Bridgetown Botanicals CBD Concentrates   Kraken Kratom Red Vein Kratom   Original Sensible Seeds Bulk Cannabis Seeds   PhytoExtractum Buy Bali Kratom Powder

Jump to first unread post Pages: 1
OfflineShroomslip
Architekt
I'm a teapot User Gallery


Registered: 11/25/12
Posts: 23,651
Last seen: 1 hour, 22 minutes
Hiding a files true size?
    #22430315 - 10/25/15 01:41 AM (8 years, 3 months ago)

I wish I could ask this anonymously, I have a feeling on the face of it it's probably going to look bad/shady :lol: I don't really wanna get into the whys, as it defeats the purpose of trying to figure out how to do this in the first place. It's mostly due to my own paranoia, nothing really shady.

Anyways, quite a while back I learned how to hide zipped files in an image file. Unless someone knows specifically how to access it, then it just appears to be a normal image (and opening it just through clicking, brings up the picture. You have to open the file manually with Winrar to see the hidden archive). Generally speaking, even the nosiest of people will never find those files. The problem is if all that data starts getting to be pretty large, and if someone is observant enough, the image file being like 100mb+ automatically raises suspicion.

Is there a way to make Windows say the file is of average size, even though it's not? I know that if someone managed to look for that exact file, they could probably find out the actual file size, but one less thing to stand out is all the better.

I tried Googling but not getting much luck.


--------------------
With my face against the floor I can’t see who knocked me out of the way.
I don’t want to get back up but I have to so it might as well be today.
Nothing appeals to me no one feels like me, I’m too busy being calm to disappear.
I’m in no shape to be alone contrary to the shit that you might hear.


You can't wake up, this is not a dream. You're part of a machine, you are not a human being
With your face all made up, living on a screen. Low on self esteem, so you run on gasoline


Extras: Filter Print Post Top
Invisiblekoraks
Registered: 06/02/03
Posts: 26,672
Re: Hiding a files true size? [Re: Shroomslip]
    #22430339 - 10/25/15 02:05 AM (8 years, 3 months ago)

Hmm, not that I'm aware of, but maybe there are programs that intervene in how windows displays file information. But I'm not aware of them.

An alternative would be something like truecrypt, which makes an encrypted folder and stores it into a file of a predetermined size. The size of course is bigger than the contents of the encrypted volume, but it will remain the same regardless of the contents. You can assign a file name to the file to make it look like e.g. a scratch drive for photoshop or some kind of system file. And even if the pathologically inquisitive succeed in locating the file and guessing that it's an encrypted volume, they won't be able to access its contents as they are encrypted.


Extras: Filter Print Post Top
InvisibleBacchus
Lurker
Male User Gallery

Folding@home Statistics
Registered: 10/10/06
Posts: 914
Loc: ::1
Re: Hiding a files true size? [Re: koraks]
    #22433618 - 10/25/15 08:22 PM (8 years, 3 months ago)

Can you split the data up into smaller files? Inconvenient, I know. How about hiding it in a larger file such as 1080p movie? A few hundred extra megabytes wouldn't stand out at all.


--------------------


Living on a no-Flash diet is way easier than you think. Give it a shot.


Extras: Filter Print Post Top
OfflineShroomslip
Architekt
I'm a teapot User Gallery


Registered: 11/25/12
Posts: 23,651
Last seen: 1 hour, 22 minutes
Re: Hiding a files true size? [Re: Bacchus]
    #22433715 - 10/25/15 08:52 PM (8 years, 3 months ago)

It's not really 100mb I was just using that as an example, it's a lot bigger than that actually. Splitting it up enough to not stand out would basically require me hiding it tons of different videos. I thought about doing that, but that's a lot of work.

Basically just looking to see if there's an easy way to do this before I turn to other methods. I have a tendency to over complicate things. If I could just manually put in a file size I want it to show it as being, it'd save a lot of work and time.


--------------------
With my face against the floor I can’t see who knocked me out of the way.
I don’t want to get back up but I have to so it might as well be today.
Nothing appeals to me no one feels like me, I’m too busy being calm to disappear.
I’m in no shape to be alone contrary to the shit that you might hear.


You can't wake up, this is not a dream. You're part of a machine, you are not a human being
With your face all made up, living on a screen. Low on self esteem, so you run on gasoline


Extras: Filter Print Post Top
Invisiblemicro
bunbun has a gungun
Male User Gallery


Registered: 05/09/03
Posts: 7,532
Loc: Brick City Flag
Re: Hiding a files true size? [Re: Shroomslip]
    #22433849 - 10/25/15 09:32 PM (8 years, 3 months ago)

Quote:

Shroomslip said:
Anyways, quite a while back I learned how to hide zipped files in an image file. Unless someone knows specifically how to access it, then it just appears to be a normal image (and opening it just through clicking, brings up the picture. You have to open the file manually with Winrar to see the hidden archive).




Steganography! Nice ^^

I was into that way back in the day :lol:

Re: Changing the size --

Three things I can think of.

1.) There are programs out there that do this. Use them at your own risk as I assume they are changing the Master File Table (as in step 3).

2.) You could try to use symbolic links to make the size appear much smaller. This will not fool anyone who knows what they are doing, but your average PC user it should. As a caveat: in my time using Windows I have never to my recollection used a symbolic link. I have in Linux however >.>  You might have to play around with it a bit first. (edit: oh, unless those are the 'shortcuts' lol)

3.) Change the information in the MFT which will likely require special tools, or a Linux boot disk and a good knowledge of low-level utilities. I could think of a way to do it (well, I have forensics stuff on here but without all that) however I'll probably hesitate writing it down or someone will try it and 99% chance they will fsck their drive.


--------------------
Any research paper or book for free
(Avatar is Maxxy, a character by Mizzyam, RIP)


Edited by micro (10/25/15 09:33 PM)


Extras: Filter Print Post Top
OfflineShroomslip
Architekt
I'm a teapot User Gallery


Registered: 11/25/12
Posts: 23,651
Last seen: 1 hour, 22 minutes
Re: Hiding a files true size? [Re: micro]
    #22434320 - 10/26/15 12:06 AM (8 years, 3 months ago)

I'm not too well versed on coding and the like. Most of my knowledge on computers is fixing a problem, finding the impossible in Google (kinda ironic given the thread :lol:) or in the hardware itself.

I really couldn't find anything though, no matter what phrasing I used or what words I excluded, nothing I found was remotely close to what I'm asking to do here. Figured it was worth a shot to ask before I pursue other methods.

I'll look more into the MFT option.

What are the dangers in messing with it? I have a back up of all my personal shit, so having to start fresh is only a minor annoyance. Is it feasible for someone to do who has never done anything close to that, provided they're willing to read up on what it is they're doing and how to do it? Or do you basically need to have a deep understanding of coding and the like to do it?


--------------------
With my face against the floor I can’t see who knocked me out of the way.
I don’t want to get back up but I have to so it might as well be today.
Nothing appeals to me no one feels like me, I’m too busy being calm to disappear.
I’m in no shape to be alone contrary to the shit that you might hear.


You can't wake up, this is not a dream. You're part of a machine, you are not a human being
With your face all made up, living on a screen. Low on self esteem, so you run on gasoline


Extras: Filter Print Post Top
Invisiblemicro
bunbun has a gungun
Male User Gallery


Registered: 05/09/03
Posts: 7,532
Loc: Brick City Flag
Re: Hiding a files true size? [Re: Shroomslip]
    #22434484 - 10/26/15 01:12 AM (8 years, 3 months ago)

worst is the computer won't start, you should probably be able to recover with a boot disk *shrug*

if you're in linux on the same box you *could* use dd and a hex editor to just write the two copies to a file

you could modify this with a hex editor (you might need to get more specific info regarding the location of the metadata within the MFT, and the MFT within the boot sector) and then use dd again (while in *nix) to write it back to that same offset to the device

you want to make sure the bytes line up exactly, of course

i pulled up some more detailed information so i wouldn't have to figure it all out and type it myself (and then correct myself later on, haha)

only thing, a lot of what it says you need to get in bios i believe can be obtained through fdisk, as well

http://grayscale-research.org/new/pdfs/NTFS%20forensics.pdf

Quote:

Section 2.3: The NTFS Boot Sector
As soon as you've identified an NTFS partition you can follow the “relative sector” number offset to the NTFS boot sector itself. Multiply the sector number by the size of a sector, and you have the correct offset from which to set the read file pointer.

The NTFS boot sector contains important internal pieces of information which can be used for the intent of disk forensics. For one it contains the bootstrap code which is used to start Windows as well as a jump instruction that is used to start the operating system. Within the NTFS boot sector you can find what is known as the BPB or bios parameter block. The bios parameter block serves as a description of the physical medium being used to store the NTFS file system itself. In Figure 2.4 above, the BPB is shown as a substructure inside the NTFS boot sector, as that is how it is placed in the boot sector during drive reading.

Perhaps the most important element found inside the BPB is the cluster number of the Master file table. NTFS uses this Master file table as a directory of sorts, with its internal binary tree referencing the MFT similar to looking up phone numbers in a phone book if you knew a correct page number in the phone book for the person you were attempting to find. In reality a Master file table is simply a series of clusters on the physical disk which holds file entries that can be looked up by a "phone number" of sorts. This theoretical phone number, in practice, is known as the MFT record number. Each record number corresponds to one file entry, and each of these entries represents one file in the file system. In the body of each MFT file entry, information about the file is stored in a series of file attributes, stored in variably sized and labeled attribute structures. To find the start of the MFT, first find the number of bytes per cluster by multiplying the number of sectors per cluster times the number of bytes per sector. Go ahead and put this number on the side we will be using it later. Next will be using large integer arithmetic in order to determine where our proper offset to the MFT is. Take the number of bytes per sector and multiply that first by the NT relative sector found inside the partition table, take that number and put it aside with the other result. The next part of the calculation requires us to multiply the NT relative sector, which can be found in the partition table, with the number of bytes per sector which we can find in the BIOS parameter block in the NTFS boot sector. This effectively grows our large integer to a number that borders the start of our NT relative data. The MFT offset is relative to this position. To complete the calculation take the number of bytes per cluster, which was calculated earlier, and multiply it by the logical cluster number of the MFT which can be found inside the BIOS parameter block. The result of this
calculation can be added to the start of the NT relative data offset which we have already calculated earlier in order to create an offset that we can use easily with the SetFilePointer() Microsoft API routine to advance the file pointer to the correct offset





Again though, you can ignore the SetFilePointer() and API nonsense if you are just specifying an offset in dd so you don't get a HUGE file and then figuring the rest out by hand. Nothing bad can happen by simply writing that part out from the device to a file and it could be a learning experience!

They *do* have a lot more info in that paper however.


--------------------
Any research paper or book for free
(Avatar is Maxxy, a character by Mizzyam, RIP)


Extras: Filter Print Post Top
OfflineShroomslip
Architekt
I'm a teapot User Gallery


Registered: 11/25/12
Posts: 23,651
Last seen: 1 hour, 22 minutes
Re: Hiding a files true size? [Re: Shroomslip]
    #22693594 - 12/24/15 03:17 AM (8 years, 1 month ago)

Okay, well after researching all the options, I ended up deciding on using encryption. I didn't know a lot about it until recently. One of the big reasons I'd never even considered it is the fact that every "hacker" on TV talks about encryption and then does some stupid shit that gets through it almost effortlessly. I never knew any better because I've never been concerned with trying to secure files before. It seems done right, no one could stand a chance at unlocking it short of someone with access to a super computer. I am using TrueCrypt now. Not posting to update, I now have a new question and figured I might as well just bump my thread to ask it.

Is there any way at all to hide a password in a text document that literally no one but me would be able to access, short of again, a super computer at their disposal. I ask because the right way to do it seems to be using a very long string of random numbers and letters. Problem is I will never remember anything random. All I can do is combine two passwords I regularly use in a specific way so that the password actually ends up seeming random. Without being able to hide a copy-able version of the password, it has to be something I can easily remember, I am a very forgetful person. (This is not the actual method I'm using) but right now I'm basically doing something along the lines of using my two common passwords (again not real but obviously pretty risky) like speaker103+harddrive1 to make 1sdpreiavkeehra1r0d3. If you look closely you can see there is a pattern to it, and I worry that brute force if they looked into my passwords for other things, could end up finding the right combo. I use keyfiles as well, but again, they have to be simple and readily available.

I cannot choose two new passwords to combine (I've put a lot of thought into it) because I will end up forgetting them. Until recently I haven't had much reason to pay strict attention to basic safety, like not using the same password(s) over and over. Nothing has been sensitive to worry about it, and this way I don't forget my passwords. I've combined the two because I know I will never forget them, even 10 years later. I've used them almost all my life (that I've had a computer). I may forget the order, but 10 minutes trying various combinations, I'd eventually figure it out. This is why I have so far chosen to do it this way. It does not matter in the end. I will never lose access to my encryption because I can't remember the password.

So, is a password like that immune to brute force in the normal sense? I understand if I were trying to set off a dirty bomb, or assassinate the president that no expense would really be spared and they probably would crack it eventually, but short of that, is that method pretty much air tight? If not, how can I make a string of 40+ random numbers and letters and hide that "key" so that it's inaccessible to virtually everyone? Can that be done at all?

I've familiarized my self with most of the risks and have done what I can to negate them, but you can never be too careful.


--------------------
With my face against the floor I can’t see who knocked me out of the way.
I don’t want to get back up but I have to so it might as well be today.
Nothing appeals to me no one feels like me, I’m too busy being calm to disappear.
I’m in no shape to be alone contrary to the shit that you might hear.


You can't wake up, this is not a dream. You're part of a machine, you are not a human being
With your face all made up, living on a screen. Low on self esteem, so you run on gasoline


Extras: Filter Print Post Top
Offlineiateshaggy
i haxor 360s
Male User Gallery


Registered: 05/20/05
Posts: 4,707
Loc: 612 Warf Avenue, next to....
Last seen: 1 month, 10 days
Re: Hiding a files true size? [Re: Shroomslip]
    #22696397 - 12/24/15 09:14 PM (8 years, 1 month ago)

try googling torrent ratio hack, there might be something like what you are looking for.

edit: don't use this for torrent sites, you will get banned.


--------------------
You are a filipina sex goddess who wants to fuck me until I fall asleep, so then you can tickle my balls and see if the legend of my diamond filled nutsuck is true.  I am a white man from costa rica, who smells like lime jello.


I can flash/jtag/repair 360's, pm for details.


Edited by iateshaggy (12/24/15 09:15 PM)


Extras: Filter Print Post Top
InvisibleBacchus
Lurker
Male User Gallery


Folding@home Statistics
Registered: 10/10/06
Posts: 914
Loc: ::1
Re: Hiding a files true size? [Re: Shroomslip]
    #22697314 - 12/25/15 02:42 AM (8 years, 1 month ago)

Quote:

Shroomslip said:
Is there any way at all to hide a password in a text document that literally no one but me would be able to access, short of again, a super computer at their disposal. I ask because the right way to do it seems to be using a very long string of random numbers and letters. Problem is I will never remember anything random.




Not really. Encryption is the only way to lock up a file such that only you can access it. You could write your passphrase down on a scrap of paper and lock it in a safe, but I don't think that's what you're looking for. Encryption's entire pillar of strength stems from a good passphrase, and the only way to keep information secret is to encrypt it. Storing your key unecrypted (or encrypted with a weaker key) defeats your downstream defenses.

In other words: Even if you encrypt a file with a key of 4194304 truly random bits using some encryption method that makes the current state of the art look like child's play, but you attempt to store the key in plain sight using some clever scheme, you're only as secure as your scheme. Neither you nor any of us will come up with something that is at least as strong as standard encryption. If such a thing existed, then you should just store your data that way rather than to encrypt it.

The bottom line: If you want to encrypt your data, you have to manage the key. Your best options are to either write it down and physically protect the paper, store it in an encrypted database such as KeepassX, or to suck it up put in the effort to commit the key to memory.

For my data, I opt for the second option. It's actually not that hard to learn a good, 12 character pseudoranomly generated password if you use it often. I recommend that you choose a good password and use it somewhere that you use all of the time such as your screen saver password on your personal machine or maybe some account that you use at work. During the learning phase, you can have it written down and stored in your wallet. Once your fingers have learned the password, and they will learn it, you can learn a second password. Concatenate the two, and you have a bullet-proof password that's 24 characters long. That will stand up to even the strongest brute force attacks.

I use this 24 character password as my master password for an encrypted database of more passwords. In my opinion, the two best systems are Keepass(X) and Last Pass. They each have their advantages and disadvantages. Do your research. By using a system like those, you can use a 50 character passphrase for your truecrypt container, and you only have to remember something 20ish characters long. In absolute terms, this means your truecrypt file is only standing on your 20 character password, but now it's a two-step process to break in. First, someone needs to identify that you have both a truecrypt file and an encrypted password database. Then, they have to break into your database, which should be impossible given the strength of the password that you've committed to muscle memory, and finally, they would have to identify your encryption key inside the database and apply it to your truecrypt container. Such a scenario will only happen if you make Michael Rogers into a personal enemy.

As a side effect, you can now have a unique, extremely long password for every site that you visit and you only need to know the one master password. Your life has improved.

I apologize for not proof reading this novella before posting. I've been drinking, and I'm angry about something.


--------------------


Living on a no-Flash diet is way easier than you think. Give it a shot.


Extras: Filter Print Post Top
OfflineShroomslip
Architekt
I'm a teapot User Gallery


Registered: 11/25/12
Posts: 23,651
Last seen: 1 hour, 22 minutes
Re: Hiding a files true size? [Re: Bacchus]
    #22697340 - 12/25/15 03:10 AM (8 years, 1 month ago)

You pretty much covered it I think. Unless I'm misunderstanding, the safest of my two original ideas is actually the one I'm doing now. It's not a totally random password, but an amalgamation of other passwords I can remember, and scrambled in a way anyone else is unlikely to figure out. The thing I was unsure about is if doing that is really safe. I don't take any special precautions to hide my passwords for stuff like this site or email because I don't see much need in it. If someone for whatever reason, wanted to start digging, they could no doubt turn up a pretty small pool of possibilities I use the same 3-4 passwords for everything. I wasn't sure if this opened me up to a brute force attack or not though. My actual system is a bit more convoluted that what I mentioned above, there are specific patterns I use to combine them, I'm not just adding the second password onto the ending of the first. It produces a string of characters that to most people (or computers) would appear to just be entirely random characters. It's also well over 20 characters long.

Since you say this should be bullet proof, I guess I'm good. Just kinda new to this whole encryption thing. I actually did look around trying to find the answer on my own, but didn't find much. Actually what I found is mentioned above.. That the most secure way is to make a very long entirely random set of characters, but I would forget that no matter how many times I typed it. There's a reason I use the same few passwords for everything. They have meaning to me and would be practically impossible to forget. Nothing as simple as my son's name or my anniversary or something though. I got tired of finding myself permanently locked out of things, so I started using the same passwords for everything. But, If that's enough to prevent a brute force attack, then I don't really have reason to create a text file with a huge password of total randomness that is also encrypted and difficult to attack.

Thanks for taking the time to answer.


--------------------
With my face against the floor I can’t see who knocked me out of the way.
I don’t want to get back up but I have to so it might as well be today.
Nothing appeals to me no one feels like me, I’m too busy being calm to disappear.
I’m in no shape to be alone contrary to the shit that you might hear.


You can't wake up, this is not a dream. You're part of a machine, you are not a human being
With your face all made up, living on a screen. Low on self esteem, so you run on gasoline


Extras: Filter Print Post Top
InvisibleBacchus
Lurker
Male User Gallery


Folding@home Statistics
Registered: 10/10/06
Posts: 914
Loc: ::1
Re: Hiding a files true size? [Re: Shroomslip]
    #22697803 - 12/25/15 09:35 AM (8 years, 1 month ago)

Another thing to consider is varying your algorithm between sites. If any one of them loses data and didn't protect your password well enough (this happens every day) then your password will be incorporated to any number of password dictionaries. Password crackers don't always attack the bits with brute force, but are rather guided by human psychology and password trends.


--------------------


Living on a no-Flash diet is way easier than you think. Give it a shot.


Extras: Filter Print Post Top
Jump to top Pages: 1

Shop: Unfolding Nature Unfolding Nature: Being in the Implicate Order   North Spore North Spore Mushroom Grow Kits & Cultivation Supplies   Bridgetown Botanicals CBD Concentrates   Kraken Kratom Red Vein Kratom   Original Sensible Seeds Bulk Cannabis Seeds   PhytoExtractum Buy Bali Kratom Powder


Similar ThreadsPosterViewsRepliesLast post
* I need a way to hide folders Chemical_Smile 2,581 19 08/16/02 04:53 PM
by tps
* Microsoft's Really Hidden Files. Lana 7,924 18 07/11/02 02:14 PM
by Lana
* Is There A Free Server For Transfering/Uploading Files Over 3Megabytes? runnerup 740 4 01/21/05 02:41 PM
by John
* Here is another file/email encryption program... Lana 972 2 07/29/02 03:43 PM
by Lana
* keyed encryption? Raadt 1,702 12 03/15/03 09:48 AM
by socratesmind
* Encrypting your messages while using ICQ Lana 3,747 1 06/19/01 06:48 AM
by Anno
* Need FAST HD encryption advice earlyriser 2,667 8 06/06/01 07:07 AM
by Anno
* Post deleted by users_request Uv1 1,246 3 03/10/02 05:55 PM
by Ellis Dee

Extra information
You cannot start new topics / You cannot reply to topics
HTML is disabled / BBCode is enabled
Moderator: trendal, automan, Northerner
1,212 topic views. 0 members, 1 guests and 0 web crawlers are browsing this forum.
[ Show Images Only | Sort by Score | Print Topic ]
Search this thread:

Copyright 1997-2024 Mind Media. Some rights reserved.

Generated in 0.03 seconds spending 0.007 seconds on 14 queries.