Articles Blog | G5 Cyber Security

Research – steg1.txt

Stenographied File Transfer Using Posix File Locks – How to transfer information to other users on secure systems by communicating with locked files. Includes some sample code that uses 32 locked files to transfer data on Posix systems.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/29720/steg1.txt

Source: https://packetstormsecurity.com/files/29720/steg1.txt.html

Exit mobile version