Hiding From Big Brother Using Distributed Steganography
Offered By: LASCON via YouTube
Course Description
Overview
Explore techniques for hiding data from surveillance in this 42-minute LASCON conference talk. Delve into the world of distributed steganography as Josh Sokol and Orlando Barrera II present various methods to conceal information. Learn about hidden files and directories, file renaming strategies, and burying data deep within directory structures. Discover advanced techniques like alternate data streams, spam mimic, hidden partitions, and utilizing slack space. Examine the combination of encryption with steganography and explore data exfiltration protection methods. Gain insights into chunking, checking, and different steganography approaches, including Steggo. Understand which file types work best for hiding data, the use of AES-256 encryption, and considerations for file upload sizes and caching. By the end of this talk, acquire a comprehensive understanding of distributed steganography techniques to protect sensitive information from prying eyes.
Syllabus
Intro
Josh Sokol
Project Beginnings
What is Pron?
Hidden Files and Directories
Rename File or Extension
Put with Other Similar Files
Burying Several Directories Down
Place with Other Files in Compressed Format
Alternate Data Streams
Spam Mimic
Hidden Partitions
Invisible Partitions
Slack Space (slacker)
Hide Data in Bad Blocks
What's Hiding in this Picture?
Encryption + Steganography
Data Exfiltration & Protection
Chunking and Checking
Checking Chunking
Different Steganography
Steggo Steganography
File Types Tested to Work
AES-256 Encryption
Images
Unencrypted Data
SSL
CAPTCHA
File Upload Size
Cache Kills
Steggo Mirroring
Bigger Files
In Closing...
Taught by
LASCON
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network