Skip to main navigation menu Skip to main content Skip to site footer

Electrotechnical and Computer Engineering

Vol. 35 No. 01 (2020): Proceedings of the Faculty of Technical Sciences

STEGOSPLOIT IN SYSTEMS FOR TRANSFERING AND DISPLAYING IMAGES

  • Aleksandra Mišić
DOI:
https://doi.org/10.24867/06BE47Misic
Submitted
December 30, 2019
Published
2019-12-30

Abstract

This paper presents the class of attacks called stegosploit. We describe how the malicious files are created and delivered, as well as possible security controls for mitigating this class of cyber threats.

References

[1] Stegosploit, https://www.youtube.com/watch?v=np0mPy-EHII (datum poslednjeg pristupa 14.09. 2019)
[2] Dr. M. Umamaheswari, Prof. S. Sivasubramanian , S. Pandiarajan “Applied Optimal Control”, 2010.
[3] https://stegosploit.info/ (datum poslednjeg pristupa 14.09. 2019)
[4] Data compression, https://en.wikipedia.org/wiki/Data_compression (datum poslednjeg pristupa 14.09. 2019)
[5] JPEG format podataka, https://en.wikipedia.org/wiki/JPEG_File_Interchange_Format (datum poslednjeg pristupa 14.09. 2019)
[6] PNG format podataka, https://www.w3.org/TR/2003/REC-PNG-20031110/ (datum poslednjeg pristupa 14.09. 2019)