YoVDO

Hiding From Big Brother Using Distributed Steganography

Offered By: LASCON via YouTube

Tags

LASCON Courses Cybersecurity Courses Encryption Courses Data Privacy Courses Steganography Courses Data Exfiltration Courses

Course Description

Overview

Explore techniques for hiding data from surveillance in this 42-minute LASCON conference talk. Delve into the world of distributed steganography as Josh Sokol and Orlando Barrera II present various methods to conceal information. Learn about hidden files and directories, file renaming strategies, and burying data deep within directory structures. Discover advanced techniques like alternate data streams, spam mimic, hidden partitions, and utilizing slack space. Examine the combination of encryption with steganography and explore data exfiltration protection methods. Gain insights into chunking, checking, and different steganography approaches, including Steggo. Understand which file types work best for hiding data, the use of AES-256 encryption, and considerations for file upload sizes and caching. By the end of this talk, acquire a comprehensive understanding of distributed steganography techniques to protect sensitive information from prying eyes.

Syllabus

Intro
Josh Sokol
Project Beginnings
What is Pron?
Hidden Files and Directories
Rename File or Extension
Put with Other Similar Files
Burying Several Directories Down
Place with Other Files in Compressed Format
Alternate Data Streams
Spam Mimic
Hidden Partitions
Invisible Partitions
Slack Space (slacker)
Hide Data in Bad Blocks
What's Hiding in this Picture?
Encryption + Steganography
Data Exfiltration & Protection
Chunking and Checking
Checking Chunking
Different Steganography
Steggo Steganography
File Types Tested to Work
AES-256 Encryption
Images
Unencrypted Data
SSL
CAPTCHA
File Upload Size
Cache Kills
Steggo Mirroring
Bigger Files
In Closing...


Taught by

LASCON

Related Courses

Introduction to Data Analytics for Business
University of Colorado Boulder via Coursera
Digital and the Everyday: from codes to cloud
NPTEL via Swayam
Systems and Application Security
(ISC)² via Coursera
Protecting Health Data in the Modern Age: Getting to Grips with the GDPR
University of Groningen via FutureLearn
Teaching Impacts of Technology: Data Collection, Use, and Privacy
University of California, San Diego via Coursera