Electrotechnical and Computer Engineering
Vol. 35 No. 01 (2020): Proceedings of the Faculty of Technical Sciences
STEGOSPLOIT IN SYSTEMS FOR TRANSFERING AND DISPLAYING IMAGES
Abstract
This paper presents the class of attacks called stegosploit. We describe how the malicious files are created and delivered, as well as possible security controls for mitigating this class of cyber threats.
References
[1] Stegosploit, https://www.youtube.com/watch?v=np0mPy-EHII (datum poslednjeg pristupa 14.09. 2019)
[2] Dr. M. Umamaheswari, Prof. S. Sivasubramanian , S. Pandiarajan “Applied Optimal Control”, 2010.
[3] https://stegosploit.info/ (datum poslednjeg pristupa 14.09. 2019)
[4] Data compression, https://en.wikipedia.org/wiki/Data_compression (datum poslednjeg pristupa 14.09. 2019)
[5] JPEG format podataka, https://en.wikipedia.org/wiki/JPEG_File_Interchange_Format (datum poslednjeg pristupa 14.09. 2019)
[6] PNG format podataka, https://www.w3.org/TR/2003/REC-PNG-20031110/ (datum poslednjeg pristupa 14.09. 2019)