Skip to:Content
|
Bottom
Cover image for Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols
Title:
Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols
Personal Author:
Edition:
1st ed.
Publication Information:
Waltham, MA : Syngress, c2013
Physical Description:
xx, 245 p. : ill. ; 24 cm.
ISBN:
9781597497435

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010321872 QA76.9.A25 R346 2013 Open Access Book Book
Searching...

On Order

Summary

Summary

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention.


Author Notes

Michael Raggo (CISSP, NSA-IAM, CCSI, SCSA, ACE, CSI) has over 20 years of information security and forensic experiences as a consultant and trainer.
Chet Hosmer is the Chief Scientist Sr. Vice President at Allen Corporation.


Table of Contents

Dedicationp. V
Raggo Acknowledgmentsp. VII
Hosmer Acknowledgmentsp. IX
About the Authorsp. XV
About the Techical Editorp. XVII
Prefacep. XIX
Chapter 1 History of Secret Writingp. 1
Introductionp. 1
Cryptologyp. 2
Substitution Cipherp. 3
Transposition Cipherp. 8
The Difference Between Substitution Ciphers and Transposition Ciphersp. 10
Steganographyp. 10
Cardano's Grillep. 11
Summaryp. 17
Referencesp. 17
Chapter 2 Four Easy Data Hiding Exercisesp. 19
Hiding Data in Microsoft Wordp. 20
Image Metadatap. 26
Mobile Device Data Hidingp. 29
File Compression Tool Data Hidingp. 33
Summaryp. 38
Referencesp. 39
Chapter 3 Steganographyp. 41
Introductionp. 41
Steganographic Techniquesp. 42
Insertion Methodsp. 43
Modificationp. 46
Hiding in PDFs (Insertion Meets LSB)p. 49
Hiding in Executables (Hydan)p. 52
Hiding in HTMLp. 54
Steganalysisp. 55
Anomalous Analysisp. 58
Steganalysis Toolsp. 59
Freeware Toolsp. 59
Summaryp. 66
Referencesp. 67
Chapter 4 Multimedia Data Hidingp. 69
Multimedia Overviewp. 69
Data Hiding in Digital Audiop. 70
Simple Audio File Embedding (Imperceptible Approach)p. 70
Data hiding in a .wav filep. 73
StegAnalysis of LSB Wave Data Hidingp. 78
Advanced Audio File Embeddingp. 79
Audio Summaryp. 79
Data Hiding in Digital Videop. 80
MSU Stegop. 80
TCStegop. 83
Summaryp. 89
Referencesp. 90
Chapter 5 Data Hiding Among Android Mobile Devicesp. 91
Android Overviewp. 91
Android ImgHid and Reveal Appp. 91
Analysis of the Resulting ImgHid Data Hiding Operationp. 95
Android My Secret Appp. 98
Stego Analysis of the Resulting My Secret Imagesp. 100
Summaryp. 101
StegDroidp. 102
Using the Android Applicationp. 103
Summaryp. 106
Referencesp. 106
Chapter 6 Apple iOS Data Hidingp. 107
Introductionp. 107
Mobile Device Data Hiding Applicationsp. 107
Spy Pix Analysisp. 110
Stego Sec Analysisp. 116
InvisiLetter Analysisp. 125
Summaryp. 130
Referencesp. 131
Chapter 7 Operating System Data Hidingp. 133
Windows Data Hidingp. 135
Alternate Data Streams Reviewedp. 135
Stealth Alternate Data Streamsp. 138
Volume Shadowingp. 140
Linux Data Hidingp. 150
Linux Filename Trickeryp. 150
Extended Filesystem Data Hidingp. 151
TrueCryptp. 157
Referencesp. 166
Chapter 8 Virtual Data Hidingp. 167
Introductionp. 167
Hiding a Virtual Environmentp. 168
Getting Startedp. 168
A Review of Virtual Environmentsp. 171
VMware Filesp. 172
Hiding Data in a VMware Imagep. 172
Summaryp. 179
Referencesp. 179
Chapter 9 Data Hiding in Network Protocolsp. 181
Introductionp. 181
VoIP Data Hidingp. 184
Delayed Packet Modification Methodp. 187
IP Layer Data Hiding, The TTL Fieldp. 188
Investigating Protocol Data Hidingp. 190
Summaryp. 191
Referencesp. 191
Chapter 10 Forensics and Anti-Forensicsp. 193
Introductionp. 193
Anti-Forensics-Hiding your tracksp. 194
Data Hiding Passwordsp. 194
Hiding Your Tracksp. 195
Forensicsp. 197
Looking for Data Hiding Softwarep. 198
Finding Remaining Artifactsp. 199
Identifying and View Cached Images (Cache Auditing Tools)p. 203
Evidence in Thumbnailsp. 204
Searching for Hidden Directories and Filesp. 208
Network IDSp. 209
Summaryp. 211
Referencesp. 211
Chapter 11 Mitigation Strategiesp. 213
Forensic Investigationp. 213
Step 1 Steganography Use Discoveryp. 213
Step 2 Steganography Carrier Discoveryp. 215
Step 3 Hidden Content Extractionp. 215
Mitigationp. 216
Network Technologies for detecting Data Hidingp. 219
Endpoint Technologies for detecting Data Hidingp. 223
Summaryp. 225
Referencesp. 227
Chapter 12 Futuresp. 229
The Future, and the Pastp. 229
Future Threatsp. 230
Steganography as a Countermeasurep. 233
Current and Futuristic Combined Threatsp. 235
Summaryp. 236
Indexp. 237
Go to:Top of Page