YoVDO

Hiding From Big Brother Using Distributed Steganography

Offered By: LASCON via YouTube

Tags

LASCON Courses Cybersecurity Courses Encryption Courses Data Privacy Courses Steganography Courses Data Exfiltration Courses

Course Description

Overview

Explore techniques for hiding data from surveillance in this 42-minute LASCON conference talk. Delve into the world of distributed steganography as Josh Sokol and Orlando Barrera II present various methods to conceal information. Learn about hidden files and directories, file renaming strategies, and burying data deep within directory structures. Discover advanced techniques like alternate data streams, spam mimic, hidden partitions, and utilizing slack space. Examine the combination of encryption with steganography and explore data exfiltration protection methods. Gain insights into chunking, checking, and different steganography approaches, including Steggo. Understand which file types work best for hiding data, the use of AES-256 encryption, and considerations for file upload sizes and caching. By the end of this talk, acquire a comprehensive understanding of distributed steganography techniques to protect sensitive information from prying eyes.

Syllabus

Intro
Josh Sokol
Project Beginnings
What is Pron?
Hidden Files and Directories
Rename File or Extension
Put with Other Similar Files
Burying Several Directories Down
Place with Other Files in Compressed Format
Alternate Data Streams
Spam Mimic
Hidden Partitions
Invisible Partitions
Slack Space (slacker)
Hide Data in Bad Blocks
What's Hiding in this Picture?
Encryption + Steganography
Data Exfiltration & Protection
Chunking and Checking
Checking Chunking
Different Steganography
Steggo Steganography
File Types Tested to Work
AES-256 Encryption
Images
Unencrypted Data
SSL
CAPTCHA
File Upload Size
Cache Kills
Steggo Mirroring
Bigger Files
In Closing...


Taught by

LASCON

Related Courses

Python 3 For Offensive PenTest: A Complete Practical Course
Udemy
Python for Command-and-control, Exfiltration and Impact
Infosec via Coursera
Network Analysis with Arkime
Pluralsight
Cisco Core Security: Secure Network Access, Visibility, and Enforcement
Pluralsight
Post Exploitation with Meterpreter
Pluralsight