Hiding From Big Brother Using Distributed Steganography
Offered By: LASCON via YouTube
Course Description
Overview
Explore techniques for hiding data from surveillance in this 42-minute LASCON conference talk. Delve into the world of distributed steganography as Josh Sokol and Orlando Barrera II present various methods to conceal information. Learn about hidden files and directories, file renaming strategies, and burying data deep within directory structures. Discover advanced techniques like alternate data streams, spam mimic, hidden partitions, and utilizing slack space. Examine the combination of encryption with steganography and explore data exfiltration protection methods. Gain insights into chunking, checking, and different steganography approaches, including Steggo. Understand which file types work best for hiding data, the use of AES-256 encryption, and considerations for file upload sizes and caching. By the end of this talk, acquire a comprehensive understanding of distributed steganography techniques to protect sensitive information from prying eyes.
Syllabus
Intro
Josh Sokol
Project Beginnings
What is Pron?
Hidden Files and Directories
Rename File or Extension
Put with Other Similar Files
Burying Several Directories Down
Place with Other Files in Compressed Format
Alternate Data Streams
Spam Mimic
Hidden Partitions
Invisible Partitions
Slack Space (slacker)
Hide Data in Bad Blocks
What's Hiding in this Picture?
Encryption + Steganography
Data Exfiltration & Protection
Chunking and Checking
Checking Chunking
Different Steganography
Steggo Steganography
File Types Tested to Work
AES-256 Encryption
Images
Unencrypted Data
SSL
CAPTCHA
File Upload Size
Cache Kills
Steggo Mirroring
Bigger Files
In Closing...
Taught by
LASCON
Related Courses
Python 3 For Offensive PenTest: A Complete Practical CourseUdemy Python for Command-and-control, Exfiltration and Impact
Infosec via Coursera Network Analysis with Arkime
Pluralsight Cisco Core Security: Secure Network Access, Visibility, and Enforcement
Pluralsight Post Exploitation with Meterpreter
Pluralsight