Hiding Data in “Plain Sight” Computer Forensics BACS 371.

Slides:



Advertisements
Similar presentations
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Advertisements

Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
This presentation will take a look at to prevent your information from being discovered by and investigator.
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
95752:3-1 Access Control :3-2 Access Control Two methods of information control: –control access –control use or comprehension Access Control Methods.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Guide to Computer Forensics and Investigations Third Edition
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
Chapter 7: Configuring Disks. 2/24 Objectives Learn about disk and file system configuration in Vista Learn how to manage storage Learn about the additional.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
How to Install Windows 7.
Operating System & Application Files BACS 371 Computer Forensics.
OS and Application Files BACS 371 Computer Forensics.
Prepared by: Ms. Catherine M. Catamora IAS - IT
Hands-on: Capturing an Image with AccessData FTK Imager
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
Lesson 9 Windows Management
CIT In this chapter, you will learn how to  Adjust basic Windows settings  Explain user accounts in detail  Describe how to store, retrieve,
Installing and Troubleshooting Hardware Device and Drivers Chapter 6 powered by dj.
Passwords, Encryption Forensic Tools
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
TRUECRYPT.
Chapter 7 Working with Files.
Objectives Learn what a file system does
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
What Password Cracking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
CIS 450 – Network Security Chapter 8 – Password Security.
Digital Steganography
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 4 Microsoft Windows XP.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Computing Fundamentals Module Lesson 3 — Changing Settings and Customizing the Desktop Computer Literacy BASICS.
 Access Control 1 Access Control  Access Control 2 Access Control Two parts to access control Authentication: Are you who you say you are? – Determine.
Security CS Introduction to Operating Systems.
Lesson 9: Windows Management Ms. Tracy Digital Literacy.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Understanding Backup and Recovery Methods Lesson 8.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Password. On a Unix system without Shadow Suite, user information including passwords is stored in the /etc/passwd file. Each line in /etc/passwd is a.
Understand Encryption LESSON 2.5_A Security Fundamentals.
SCSC 455 Computer Security Chapter 3 User Security.
Windows and Mac OSX.  Formatting a disk prepares it to accept data  NTFS on Windows  HFS+ on the Mac  There are lots of different formatting options.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
ProjectWise 101 Chapter 3 – Users Gary Cochrane – Technical Director Geospatial Sales – North America.
HOW TO INSTALL WINDOWS 7? This step-by-step guide demonstrates how to install Windows 7 Ultimate. The guide is similar for other versions of Windows 7.
1 Lesson 9 Windows Management Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Text2PTO: Modernizing Patent Application Filing A Proposal for Submitting Text Applications to the USPTO.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the importance of security and encryption. Objective Course Weight 2%
Unit 2 Personal Cyber Security and Social Engineering Part 2.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Password Cracking COEN 252 Computer Forensics. Social Engineering Perps trick Law enforcement, private investigators can ask. Look for clues: Passwords.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Hiding Evidence in “Plain Sight” Computer Forensics BACS 371.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Working with Windows 7 at CERN
COEN 252 Computer Forensics
Computer Literacy BASICS
Digital Forensics 2 (DFC721S)
Lesson 9 Windows Management
Hiding Information, Encryption, and Bypasses
File System Management
Presentation transcript:

Hiding Data in “Plain Sight” Computer Forensics BACS 371

Ways of Hiding Information  Rename the File  Make the Information Invisible  Use Windows to Hide Files  Protect the File with a Password  Encrypt the File  Use Steganography  Compress the File  Hide the Hardware  Use Application programs

Rename the File  If you change the file suffix to a different one, then the standard Windows applications will not “see” it.  This is not a particularly effective way to hide data since the file will still run the application if you double-click on it.  This happens because there is an internal file signature that tells Windows which application to run.  Changing the external name does not affect this.

Use Windows to hide files  You can set a property on a file to make it “hidden”.  If you set a folder view options to not show hidden files, they become invisible.  Windows also automatically hides files with particular suffixes from being seen in the directory window.  The most common hidden type is.sys  If you name a file with a.sys suffix and then change the folder view options to not show hidden system files, they will also disappear.  Both of these methods are easy to overcome.

Use a Password  You can hide the contents of a file with a password.  On older versions of Windows this was not particularly effective.  More recent versions are significantly more robust.  While the passwords can be broken, it is not a trival task.

Basic Approaches to Password Cracking  Illegal Methods  Social Engineering  Pretexting  Phishing  Login spoofing  Keystroke logging  Shoulder surfing  Dumpster diving  Security System Attacks

Basic Approaches to Password Cracking  Ask!  Interview/Interrogation  Social Engineering  Plain sight  Post-It Notes  Documents  Guess  Social Engineering  Weak Encryption  Dictionary Attack  Brute Force Attack

Guessing 1  Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:  blank (none)  the word "password", "passcode", "admin" and their derivates  the user's name or login namelogin  the name of their significant other or another relativesignificant other  their birthplace or date of birth  a pet's name  automobile licence plate numberlicence plate  a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.  a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)qwerty keyboardasdfqwertyuiop  and so on.  Some users even neglect to change the default password that came with their account on the computer system. And some administrators neglect to change default account passwords provided by the operating system vendor or hardware supplier. A famous example is the use of FieldService as a user name with Guest as the password. If not changed at system configuration time, anyone familiar with such systems will have 'cracked' an important password; such service accounts often have higher access privileges than a normal user account.  The determined cracker can easily develop a computer program that accepts personal information about the user being attacked and generates common variations for passwords suggested by that information. 1

Encrypt the File  This is the next level up from using a password.  It basically scrambles the bits of the file in a systematic way so that, with the proper key, it can be unscrambled.  Typically, any file with a password is also encrypted.  High level encryption can be extremely difficult to “crack” even with vast computer resources.

Use Steganography  This is a method where one file is embedded into the bits that make up another file.  Like encryption, it depends upon a password and a decoding algorithm to recover the original hidden data.  This can be particularly hard to uncover because text messages can be hidden in seemingly innocuous images or sound files.

Compress the file  This method is not particularly effective.  Most modern operating systems have built-in programs to compress and decompress files and folders.  Previously, this was not true, so a compressed file was as unreadable as an encrypted one.

Hide the Hardware  The computer settings can be manipulated so that specific hardware devices are invisible.  A close examination of the actual machine can quickly find this situation and the hardware can be made visible again.  Less obvious forms of this are to hide segments of a disk drive so that portions of the physical drive are not “counted” even by low-level disk partition tools.

Use Application Programs  You can hide data in application programs in various ways.  Word, for example, has several hiding places that can be used.  Likewise, webpages can hide a good deal of information in the code or in invisible text.

Methods for Hiding Data in Word Docs  Font Size  Font Color  Hidden Text  Comments  Track Changes  Meta Data (File Properties)  Author  Organization  …  Versions  Fast Saves

Methods for Uncovering Data in Word Docs  Select All -> Font  Black on white  Font Size  Font Type  Read as Text  Forensic tools (Hex Editor)