Download presentation
Presentation is loading. Please wait.
Published byHilary Carson Modified over 9 years ago
1
Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed By: Randy Grubb Armstrong Atlantic State University – Cyber & Homeland Security Institute
2
Cyber Capabilities By the turn of the century all known terrorist and criminal groups had a presence on the Internet. –Psychological Warfare –Propaganda –Data Mining –Fundraising/financing –Recruiting –Networking –Information sharing –Planning & coordination –Actual perpetration of their crimes
3
Why the Internet? Anonymous (real or perceived) –Encryption –Covert Channels/Steganography –Public libraries/Internet cafes/wireless access points –Anonymizers/Proxies (Tor) Geographically Unbounded –People can communicate with one another from virtually anywhere in the world –More than 10,000 Internet Service Providers (ISP) worldwide –Some are sympathetic to the radical cause
4
Why the Internet? Largely unregulated –Developed as an open interoperable network –No central government authority –Most ISPs do not have the resources or desire to monitor web-site content Inexpensive –Free web hosting –Free e-mail accounts
5
Why the Internet? US and coalition military actions since 9/11 have deprived terrorist organizations their base of operations and training camps. These actions have dispersed terrorist organizations more widely. With the Internet, terrorist organizations can control a worldwide movement without ever meeting. Source: Harvard Gazette: Terror Online and how to counteract it, Ruth Walker, 2004
6
Netwar Term given to an emerging mode of conflict dealing with the societal relationships between namely terrorists and criminal organizations. –Involves measures short of traditional warfare –Network forms of organization, doctrine, strategy and communication Dispersed and decentralized manner
7
Netwar Small groups from points around the world utilizing network and Internet technology to: –Communicate –Coordinate –Act
8
Is This a Secure Site?
9
What are Covert Channels? Covert Channels –Any communication channel that can be exploited by a process to transfer information in a manner that violates the systems security policy. –In short, covert channels transfer information using non-standard methods –Against the system design –Communication is obscured; unnoticed –Easily bypass current security tools & products
10
What are Covert Channels? Covert Channels allow multiple parties to communicate ‘ unseen ’ –They hide the fact that a communication is even occurring –Provides privacy and anonymity Unlike encryption, where communication is obvious but obscured –Encryption is easily identified –Clear and visible indications of encryption
11
Covert Channels Covert Channels work because of human deficiencies –Eye sight –Hearing –Analysis skills Lack of Interest –It ’ s not really a problem, doesn ’ t happen –Prove it to me System Design Discrepancies –Components utilized in unintended manner
12
Covert Channels Many covert channels will elude detection simply because most individuals have never considered the possibility Perception over rides reality
13
Covert Channels Covert Channels hide the fact that communication between two or more individuals is occurring.
14
Potential Damage Corporate Espionage –Loss of competitive advantage Government or Military Activities –Increased threat to National Security –Terrorist Organizations Criminal Activities –Transfer of pornography or commercial software Financial Impact –Transfer of confidential financial data
15
Known Covert Methods Steganography –Images –Audio Text Manipulation TCP Covert Channels Alternate Data Streams (ADS) Deep or invisible web
16
Tool Summary Over 300 known tool variation and releases Tools for every Operating System including DOS, Windows, UNIX/Linux, OS2, Mac Wide variety of methodologies and features Most software is freeware or shareware
17
Origins of Steganography What does Steganography Mean? –Pronounced “STEHG-uh-NAH-gru-fee” –From the Greek Roots “Steganos” or Covered “Graphie” or Writing “Covered Writing” –First Known Usage The early Greeks and Persians used several forms of covered writing to conceal the communication of secret or covert messages Origins date back as far 2500 years ago
18
Carrier + Payload = Covert Message Carrier – The file that provides cover for and conceals the payload. Payload – The secret message or information that you wish to conceal or communicate. Covert Message – The combination of the payload and the carrier. The covert message file should appear identical to the carrier. Most current stego tools also encrypt the payload to increase security.
19
Digital Images Digital Images are created by software –Digital camera –Scanner –Graphics program Digital Images are made up of pixels –Represented on a grid –The pixel is the smallest visual component –Resolution & representation 640 x 480 – rows x columns 75 dpi – number of dots per inch 1 1 http://www.library.cornell.edu/preservation/tutorial/intro/intro-01.html Source: WetStone Technologies
20
Digital Images Color is represented in digital images by three different methods. –Paletted images –True color images –Compressed images
21
Palette Images Map to a pre-defined color on a table – Pixel represented by table lookup value 2 http://www.webstyleguide.com/graphics/displays.html 2 Source: WetStone Technologies
22
True Color Images True Color images –Typically 24 bits –Most common format is RGB or Red – Green - Blue –8 bits for each color byte (red, green, blue) –16.7M possible colors 4 http://www.webstyleguide.com/graphics/displays.html 4 Source: WetStone Technologies
23
Least Significant Bit Steganography “The hiding of data within a digital carrier by slightly altering an insignificant characteristic of the carrier that does not appear to alter the normal rendering of the data” Hosmer, 1999 Source: WetStone Technologies
24
Altering a True Color Image 2 http://www.webstyleguide.com/graphics/displays.html 2 Image source: www.wikipedia.com
25
LSB Substitution – bit 0 11011010 1100011 1110000 RED GREEN BLUE 0 0 1 Before After Combined Color Individual Colors After 0 1 0 LSB Substitution Source: WetStone Technologies
26
LSB Substitution bit 0 and 1 11011010 110001 0 111000 1 RED GREEN BLUE 1 0 1 Before After Combined Color Individual Colors After 0 1 0 LSB Substitution Source: WetStone Technologies
27
LSB Substitution bits (0-3) 1 1011 100 1100 100 1110 111 RED GREEN BLUE 1 0 1 Before After Combined Color Individual Colors After 0 1 0 LSB Substitution Source: WetStone Technologies
28
Color Differences Source: WetStone Technologies
29
Color Differences Source: WetStone Technologies
30
Color Differences Can you spot the modified pixel? Source: WetStone Technologies
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.