[ale] encryption/obfuscation (Was: No, wait- Leonard ...)
Jeff Hubbs
hbbs at attbi.com
Wed Jul 10 01:17:00 EDT 2002
Brian -
In this case, you'd have a legal .JPG file that looked like a real image
of something but, if you executed it as though it were an executable
program :-/ bad stuff would happen. I'm not quite sure how you'd go
about doing that, but, since it's possible to stick executable code into
buffers so as to overflow them and get the code to execute, there may
well be a way. I haven't tried hex-editing a .JPG file or a Linux
executable before, so I'm kinda just handwaving if y'all'll excuse me.
On Wed, 2002-07-10 at 00:36, fgz wrote:
>
> From: "Brian" <brianb_ale at yahoo.com>
> To: <ale at ale.org>
> Sent: Tuesday, July 09, 2002 11:22 PM
> Subject: Re: [ale] encryption/obfuscation (Was: No, wait- Leonard ...)
>
>
> > It might also be worth noting that there was a proof
> > of concept virus (W32:Perrun virus) that was believed
> > to have originated from the Philippines that hides in
> > a jpeg file. Is this considered steganography?
> >
>
> Meaning, what? That displaying a jpg could trigger
> the virus/trojan? Or, that the jpg was simply the
> carrier of it, or, in the context of this discussion,
> the messenger?
>
>
>
> ---
> This message has been sent through the ALE general discussion list.
> See http://www.ale.org/mailing-lists.shtml for more info. Problems should be
> sent to listmaster at ale dot org.
>
---
This message has been sent through the ALE general discussion list.
See http://www.ale.org/mailing-lists.shtml for more info. Problems should be
sent to listmaster at ale dot org.
More information about the Ale
mailing list