SlideShare a Scribd company logo
1 of 48
Download to read offline
Using Tools Build Right Into Windows




                         Prashant Mahajan
07/08/1989 – 05/02/2008




02/12/08   Pune Cyber Lab               2
What is Data Hiding ?
  Data Hiding is a very ancient art.
    Caesar cipher.
    Egyptians used symbolic language in their pyramids.
    Coded Language.
    Writing with invisible ink.


  With the dawn of the Digital World, now just the
     methods have changed, but the aim is still the same.


02/12/08         Pune Cyber Lab                             3
What is Data Hiding ? Cont.
  In Modern Times, Data Hiding is associated with
     digital forms such as cryptography, steganography,
     and watermarking.
       Cryptography is obscuring the content of the message,
        but not the communication of the message.
       Steganography, which is greek for “covered writing”, is
        hiding the very communication of the message.
       Watermarking attempts to add sufficient metadata to a
        message to establish ownership, provenance, source,
        etc.

  But, it is much more than that.
02/12/08          Pune Cyber Lab                                  4
Reasons Behind Hiding Data
  Personal, Private Data.
  Sensitive Data.
  Confidential Data, Trade Secrets.
  To avoid Misuse of Data.
  Unintentional damage to data, human error,
   accidental deletion.
  Monetary, Blackmail Purposes.
  Hide Traces of a crime.
  For Fun. 

02/12/08        Pune Cyber Lab                  5
Overview
  Basic Logical Techniques used to Hide Data in
   Microsoft Windows XP.
  Thinking out of the box, using applications for things
   other than their intended use.
  Data Hiding using internal concept of Microsoft
   Windows XP.
  A dive into the File System of Microsoft Windows XP,
   i.e. NTFS.



02/12/08       Pune Cyber Lab                               6
02/12/08   Pune Cyber Lab   7
Logical Techniques
  The Usual right click and hide; the hidden attribute.
  Assign the file a system attribute.
  Rename it as a system file and paste it in the windows
     directory.
       Most often used by Malware
              Svchost.exe
  Change of extension.
  Change of Icon.
  Rename as “null”.

02/12/08                Pune Cyber Lab                      8
Assigning the Hidden and System Attribute




02/12/08    Pune Cyber Lab                    9
 Svchost.exe is a generic host process name for services
     that run from dynamic-link libraries (DLLs)




02/12/08         Pune Cyber Lab                          10
02/12/08   Pune Cyber Lab   11
02/12/08   Pune Cyber Lab   12
02/12/08   Pune Cyber Lab   13
It is often said, if you want to catch a criminal, first learn to
    think like one. Therefore, to catch a Hacker, learn to
                      Think Out of the Box.




   02/12/08               Pune Cyber Lab                            14
The Copy Command
  What’s the use of the “copy” command, from DOS
     (Disk Operating System).
       To make a copy of a file.
       To copy one file from one location to another.
       To copy multiple files to a specified folder.
       And ?




02/12/08           Pune Cyber Lab                        15
Well, Guess what, Hide Your Data !




02/12/08   Pune Cyber Lab            16
02/12/08   Pune Cyber Lab   17
02/12/08   Pune Cyber Lab   18
Voila !!




02/12/08   Pune Cyber Lab          19
Access Denied
  To hide means to prevent from being seen or
   discovered.
  So, in the language of the computer;
       Access Denied.


  You control the access to the file.

  And how do you control access in Microsoft Windows
     XP ?

02/12/08          Pune Cyber Lab                    20
Access Control Lists (ACLs)
               The Cacls Command




02/12/08        Pune Cyber Lab           21
02/12/08   Pune Cyber Lab   22
02/12/08   Pune Cyber Lab   23
02/12/08   Pune Cyber Lab   24
02/12/08   Pune Cyber Lab   25
Crooks and Hooks of
                       CLSID




02/12/08   Pune Cyber Lab              26
CLSID
  CLSID
     A Class ID(CLSID) is a 128 bit (large) number that represents a
       unique id for a software application or application component.
  Its Use
     They are used by Windows to identify software components
       without having to know their “name”. They can also be used by
       software applications to identify a computer, file or other item.
  Where do they come from
     Microsoft provides a utility called GUIDGEN.exe that generates
       these numbers. They are generated by using the current time,
       network adapter address (if present) and other items in your
       computer so that no two numbers will ever be the same.



02/12/08            Pune Cyber Lab                                         27
Certain special folders within the operating
  system are identified by unique strings.
                CLSID                       Meaning / Location
  {48e7caab-b918-4e58-a94d-                 Start Menu Folder
   505519c795dc}
  {20d04fe0-3aea-1069-a2d8-                 My Computer
   08002b30309d}
  {645ff040-5081-101b-9f08-
                                             Recycle Bin
   00aa002f954e}



    Source: http://www.autohotkey.com/docs/misc/CLSID-List.htm


02/12/08               Pune Cyber Lab                             28
Okay, So Why is CLSID included in
          this presentation ?
  The CLSID’s can be assigned to any folder.
  If CLSID of any special folder is also assigned to any
   folder, the folder starts to act like the special folder.
  Therefore, the data inside the folder can be
   camouflaged.




02/12/08         Pune Cyber Lab                                29
02/12/08   Pune Cyber Lab   30
02/12/08   Pune Cyber Lab   31
02/12/08   Pune Cyber Lab   32
02/12/08   Pune Cyber Lab   33
The File System of Microsoft XP




02/12/08    Pune Cyber Lab                   34
What is a File System ?
  A file system is a part of the operating system that
     determines how files are named, stored organized on
     a volume.
    A file system manages files and folders, and the
     information needed to locate and access these items
     by local and remote users.
    Microsoft Windows supports both the FAT and NTFS
     file systems.
    Linux supports ext2, ext3, Reiser FS, etc.
    Macintosh supports HFS.
02/12/08         Pune Cyber Lab                            35
What is NTFS ?
  It is the abbreviation of New Technology File System.
  It is the most secure and robust file system for
   Windows NT, 2000, and XP.
  What are the features of NTFS :
       Supports compression,
       Recoverable file system,
       Supports Macintosh files,
       Disk quotas,
       Sparse files.


02/12/08            Pune Cyber Lab                         36
Alternate Data Stream (ADS)
  ADS was implemented in order to allow compatibility
   with the Hierarchical File System (HFS).
  HFS stores its data in two parts;
       Resource fork.
       Data fork.
  The Data fork is where the data is actually contained
   and the resource fork is used to tell the operating
   system how to use the data portion.
  Windows does the same thing through the use of
   extensions such as .bat, .exe, .txt, etc.
02/12/08             Pune Cyber Lab                        37
So what is wrong with ADS ?
  The First thing is they are totally hidden.
  A user can hide quite a lot of data in ADS and nobody
   will ever know it.
  Oh yes, and even a guest can create such streams in
   every file where he has write access for, how clever ?




02/12/08        Pune Cyber Lab                              38
02/12/08   Pune Cyber Lab   39
02/12/08   Pune Cyber Lab   40
02/12/08   Pune Cyber Lab   41
Another Big Problem …
  Its not limited to text filers either ….
  Executables can also be hidden by the same manner,
   and on top of that, they can be executed even without
   extracting them back. Now I can Wow !
  I wonder why this is not being used by malware to
   hide themselves.
       Download.fugif




02/12/08          Pune Cyber Lab                           42
Programs to find ADS
  ADS Spy -
     http://www.bleepingcomputer.com/files/adsspy.php

  LADS (List ADS) –
     http://www.heysoft.de/Frames/f_sw_la_en.htm

  Streams v1.56-
     http://www.microsoft.com/technet/sysinternals/FileAndD


02/12/08        Pune Cyber Lab                          43
02/12/08   Pune Cyber Lab   44
02/12/08   Pune Cyber Lab   45
02/12/08   Pune Cyber Lab   46
Prashant Mahajan
                            prashant3535@gmail.com
                            +91-9822426910

02/12/08   Pune Cyber Lab                      47
02/12/08   Pune Cyber Lab   48

More Related Content

What's hot

Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingGovind Raj
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking pptHarsh Kevadia
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics OverviewYansi Keim
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISShivam Porwal
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 

What's hot (20)

Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Data recovery
Data recoveryData recovery
Data recovery
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
Steganography Steganography
Steganography
 
Information hiding
Information hidingInformation hiding
Information hiding
 
Steganography
SteganographySteganography
Steganography
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Steganography
SteganographySteganography
Steganography
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
 
Steganography
SteganographySteganography
Steganography
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Network forensic
Network forensicNetwork forensic
Network forensic
 

Viewers also liked

separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageZTech Proje
 
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodHimanshu Bal
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 

Viewers also liked (6)

separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted image
 
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting method
 
C++ oop
C++ oopC++ oop
C++ oop
 
Footprinting
FootprintingFootprinting
Footprinting
 
Oop
OopOop
Oop
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 

Similar to Data Hiding Techniques

Unix Security
Unix SecurityUnix Security
Unix Securityreplay21
 
STIX Patterning: Viva la revolución!
STIX Patterning: Viva la revolución!STIX Patterning: Viva la revolución!
STIX Patterning: Viva la revolución!treyka
 
PowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidPowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidMatthew Johnson
 
Data hiding and finding on Linux
Data hiding and finding on LinuxData hiding and finding on Linux
Data hiding and finding on LinuxAnton Chuvakin
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsMike Spaulding
 
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentationMacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentationOlehLevytskyi1
 
Joxean Koret - Database Security Paradise [Rooted CON 2011]
Joxean Koret - Database Security Paradise [Rooted CON 2011]Joxean Koret - Database Security Paradise [Rooted CON 2011]
Joxean Koret - Database Security Paradise [Rooted CON 2011]RootedCON
 
Machine learning in cybersecutiry
Machine learning in cybersecutiryMachine learning in cybersecutiry
Machine learning in cybersecutiryVishwas N
 
How to Avoid the Spying of EEUU & other Practical Solutions Computing: Protec...
How to Avoid the Spying of EEUU & other Practical Solutions Computing: Protec...How to Avoid the Spying of EEUU & other Practical Solutions Computing: Protec...
How to Avoid the Spying of EEUU & other Practical Solutions Computing: Protec...AbundioTeca
 
Building Reproducible Network Data Analysis / Visualization Workflows
Building Reproducible Network Data Analysis / Visualization WorkflowsBuilding Reproducible Network Data Analysis / Visualization Workflows
Building Reproducible Network Data Analysis / Visualization WorkflowsKeiichiro Ono
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfGnanavi2
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner David Sweigert
 
LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis
LO-PHI: Low-Observable Physical Host Instrumentation for Malware AnalysisLO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis
LO-PHI: Low-Observable Physical Host Instrumentation for Malware AnalysisPietro De Nicolao
 
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docxevonnehoggarth79783
 

Similar to Data Hiding Techniques (20)

Unix Security
Unix SecurityUnix Security
Unix Security
 
Linux Recovery
Linux RecoveryLinux Recovery
Linux Recovery
 
Mem forensic
Mem forensicMem forensic
Mem forensic
 
STIX Patterning: Viva la revolución!
STIX Patterning: Viva la revolución!STIX Patterning: Viva la revolución!
STIX Patterning: Viva la revolución!
 
PowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidPowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue Kid
 
Data hiding and finding on Linux
Data hiding and finding on LinuxData hiding and finding on Linux
Data hiding and finding on Linux
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti Forensics
 
Ch11
Ch11Ch11
Ch11
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
 
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentationMacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
 
Portable OS & Portable Application
Portable OS & Portable ApplicationPortable OS & Portable Application
Portable OS & Portable Application
 
Joxean Koret - Database Security Paradise [Rooted CON 2011]
Joxean Koret - Database Security Paradise [Rooted CON 2011]Joxean Koret - Database Security Paradise [Rooted CON 2011]
Joxean Koret - Database Security Paradise [Rooted CON 2011]
 
Machine learning in cybersecutiry
Machine learning in cybersecutiryMachine learning in cybersecutiry
Machine learning in cybersecutiry
 
How to Avoid the Spying of EEUU & other Practical Solutions Computing: Protec...
How to Avoid the Spying of EEUU & other Practical Solutions Computing: Protec...How to Avoid the Spying of EEUU & other Practical Solutions Computing: Protec...
How to Avoid the Spying of EEUU & other Practical Solutions Computing: Protec...
 
Building Reproducible Network Data Analysis / Visualization Workflows
Building Reproducible Network Data Analysis / Visualization WorkflowsBuilding Reproducible Network Data Analysis / Visualization Workflows
Building Reproducible Network Data Analysis / Visualization Workflows
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis
LO-PHI: Low-Observable Physical Host Instrumentation for Malware AnalysisLO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis
LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis
 
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
 

More from prashant3535

ADRecon - Detection CHCON 2018
ADRecon - Detection CHCON 2018ADRecon - Detection CHCON 2018
ADRecon - Detection CHCON 2018prashant3535
 
Active Directory Recon 101
Active Directory Recon 101Active Directory Recon 101
Active Directory Recon 101prashant3535
 
ADRecon BH USA 2018 : Arsenal and DEF CON 26 Demo Labs Presentation
ADRecon BH USA 2018 : Arsenal and DEF CON 26 Demo Labs PresentationADRecon BH USA 2018 : Arsenal and DEF CON 26 Demo Labs Presentation
ADRecon BH USA 2018 : Arsenal and DEF CON 26 Demo Labs Presentationprashant3535
 
ADRecon BH ASIA 2018 : Arsenal Presentation
ADRecon BH ASIA 2018 : Arsenal PresentationADRecon BH ASIA 2018 : Arsenal Presentation
ADRecon BH ASIA 2018 : Arsenal Presentationprashant3535
 
Digital Crime & Forensics - Report
Digital Crime & Forensics - ReportDigital Crime & Forensics - Report
Digital Crime & Forensics - Reportprashant3535
 
What Firefox can tell about you? - Firefox Forensics
What Firefox can tell about you? - Firefox ForensicsWhat Firefox can tell about you? - Firefox Forensics
What Firefox can tell about you? - Firefox Forensicsprashant3535
 
One Laptop Per Child
One Laptop Per ChildOne Laptop Per Child
One Laptop Per Childprashant3535
 

More from prashant3535 (10)

BSides Pune 2024
BSides Pune 2024BSides Pune 2024
BSides Pune 2024
 
ADRecon - Detection CHCON 2018
ADRecon - Detection CHCON 2018ADRecon - Detection CHCON 2018
ADRecon - Detection CHCON 2018
 
Mimikatz
MimikatzMimikatz
Mimikatz
 
Active Directory Recon 101
Active Directory Recon 101Active Directory Recon 101
Active Directory Recon 101
 
ADRecon BH USA 2018 : Arsenal and DEF CON 26 Demo Labs Presentation
ADRecon BH USA 2018 : Arsenal and DEF CON 26 Demo Labs PresentationADRecon BH USA 2018 : Arsenal and DEF CON 26 Demo Labs Presentation
ADRecon BH USA 2018 : Arsenal and DEF CON 26 Demo Labs Presentation
 
ADRecon BH ASIA 2018 : Arsenal Presentation
ADRecon BH ASIA 2018 : Arsenal PresentationADRecon BH ASIA 2018 : Arsenal Presentation
ADRecon BH ASIA 2018 : Arsenal Presentation
 
Digital Crime & Forensics - Report
Digital Crime & Forensics - ReportDigital Crime & Forensics - Report
Digital Crime & Forensics - Report
 
What Firefox can tell about you? - Firefox Forensics
What Firefox can tell about you? - Firefox ForensicsWhat Firefox can tell about you? - Firefox Forensics
What Firefox can tell about you? - Firefox Forensics
 
Tracking Emails
Tracking EmailsTracking Emails
Tracking Emails
 
One Laptop Per Child
One Laptop Per ChildOne Laptop Per Child
One Laptop Per Child
 

Recently uploaded

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Data Hiding Techniques

  • 1. Using Tools Build Right Into Windows Prashant Mahajan
  • 3. What is Data Hiding ?  Data Hiding is a very ancient art.  Caesar cipher.  Egyptians used symbolic language in their pyramids.  Coded Language.  Writing with invisible ink.  With the dawn of the Digital World, now just the methods have changed, but the aim is still the same. 02/12/08 Pune Cyber Lab 3
  • 4. What is Data Hiding ? Cont.  In Modern Times, Data Hiding is associated with digital forms such as cryptography, steganography, and watermarking.  Cryptography is obscuring the content of the message, but not the communication of the message.  Steganography, which is greek for “covered writing”, is hiding the very communication of the message.  Watermarking attempts to add sufficient metadata to a message to establish ownership, provenance, source, etc.  But, it is much more than that. 02/12/08 Pune Cyber Lab 4
  • 5. Reasons Behind Hiding Data  Personal, Private Data.  Sensitive Data.  Confidential Data, Trade Secrets.  To avoid Misuse of Data.  Unintentional damage to data, human error, accidental deletion.  Monetary, Blackmail Purposes.  Hide Traces of a crime.  For Fun.  02/12/08 Pune Cyber Lab 5
  • 6. Overview  Basic Logical Techniques used to Hide Data in Microsoft Windows XP.  Thinking out of the box, using applications for things other than their intended use.  Data Hiding using internal concept of Microsoft Windows XP.  A dive into the File System of Microsoft Windows XP, i.e. NTFS. 02/12/08 Pune Cyber Lab 6
  • 7. 02/12/08 Pune Cyber Lab 7
  • 8. Logical Techniques  The Usual right click and hide; the hidden attribute.  Assign the file a system attribute.  Rename it as a system file and paste it in the windows directory.  Most often used by Malware  Svchost.exe  Change of extension.  Change of Icon.  Rename as “null”. 02/12/08 Pune Cyber Lab 8
  • 9. Assigning the Hidden and System Attribute 02/12/08 Pune Cyber Lab 9
  • 10.  Svchost.exe is a generic host process name for services that run from dynamic-link libraries (DLLs) 02/12/08 Pune Cyber Lab 10
  • 11. 02/12/08 Pune Cyber Lab 11
  • 12. 02/12/08 Pune Cyber Lab 12
  • 13. 02/12/08 Pune Cyber Lab 13
  • 14. It is often said, if you want to catch a criminal, first learn to think like one. Therefore, to catch a Hacker, learn to Think Out of the Box. 02/12/08 Pune Cyber Lab 14
  • 15. The Copy Command  What’s the use of the “copy” command, from DOS (Disk Operating System).  To make a copy of a file.  To copy one file from one location to another.  To copy multiple files to a specified folder.  And ? 02/12/08 Pune Cyber Lab 15
  • 16. Well, Guess what, Hide Your Data ! 02/12/08 Pune Cyber Lab 16
  • 17. 02/12/08 Pune Cyber Lab 17
  • 18. 02/12/08 Pune Cyber Lab 18
  • 19. Voila !! 02/12/08 Pune Cyber Lab 19
  • 20. Access Denied  To hide means to prevent from being seen or discovered.  So, in the language of the computer;  Access Denied.  You control the access to the file.  And how do you control access in Microsoft Windows XP ? 02/12/08 Pune Cyber Lab 20
  • 21. Access Control Lists (ACLs) The Cacls Command 02/12/08 Pune Cyber Lab 21
  • 22. 02/12/08 Pune Cyber Lab 22
  • 23. 02/12/08 Pune Cyber Lab 23
  • 24. 02/12/08 Pune Cyber Lab 24
  • 25. 02/12/08 Pune Cyber Lab 25
  • 26. Crooks and Hooks of CLSID 02/12/08 Pune Cyber Lab 26
  • 27. CLSID  CLSID  A Class ID(CLSID) is a 128 bit (large) number that represents a unique id for a software application or application component.  Its Use  They are used by Windows to identify software components without having to know their “name”. They can also be used by software applications to identify a computer, file or other item.  Where do they come from  Microsoft provides a utility called GUIDGEN.exe that generates these numbers. They are generated by using the current time, network adapter address (if present) and other items in your computer so that no two numbers will ever be the same. 02/12/08 Pune Cyber Lab 27
  • 28. Certain special folders within the operating system are identified by unique strings. CLSID Meaning / Location  {48e7caab-b918-4e58-a94d-  Start Menu Folder 505519c795dc}  {20d04fe0-3aea-1069-a2d8-  My Computer 08002b30309d}  {645ff040-5081-101b-9f08-  Recycle Bin 00aa002f954e} Source: http://www.autohotkey.com/docs/misc/CLSID-List.htm 02/12/08 Pune Cyber Lab 28
  • 29. Okay, So Why is CLSID included in this presentation ?  The CLSID’s can be assigned to any folder.  If CLSID of any special folder is also assigned to any folder, the folder starts to act like the special folder.  Therefore, the data inside the folder can be camouflaged. 02/12/08 Pune Cyber Lab 29
  • 30. 02/12/08 Pune Cyber Lab 30
  • 31. 02/12/08 Pune Cyber Lab 31
  • 32. 02/12/08 Pune Cyber Lab 32
  • 33. 02/12/08 Pune Cyber Lab 33
  • 34. The File System of Microsoft XP 02/12/08 Pune Cyber Lab 34
  • 35. What is a File System ?  A file system is a part of the operating system that determines how files are named, stored organized on a volume.  A file system manages files and folders, and the information needed to locate and access these items by local and remote users.  Microsoft Windows supports both the FAT and NTFS file systems.  Linux supports ext2, ext3, Reiser FS, etc.  Macintosh supports HFS. 02/12/08 Pune Cyber Lab 35
  • 36. What is NTFS ?  It is the abbreviation of New Technology File System.  It is the most secure and robust file system for Windows NT, 2000, and XP.  What are the features of NTFS :  Supports compression,  Recoverable file system,  Supports Macintosh files,  Disk quotas,  Sparse files. 02/12/08 Pune Cyber Lab 36
  • 37. Alternate Data Stream (ADS)  ADS was implemented in order to allow compatibility with the Hierarchical File System (HFS).  HFS stores its data in two parts;  Resource fork.  Data fork.  The Data fork is where the data is actually contained and the resource fork is used to tell the operating system how to use the data portion.  Windows does the same thing through the use of extensions such as .bat, .exe, .txt, etc. 02/12/08 Pune Cyber Lab 37
  • 38. So what is wrong with ADS ?  The First thing is they are totally hidden.  A user can hide quite a lot of data in ADS and nobody will ever know it.  Oh yes, and even a guest can create such streams in every file where he has write access for, how clever ? 02/12/08 Pune Cyber Lab 38
  • 39. 02/12/08 Pune Cyber Lab 39
  • 40. 02/12/08 Pune Cyber Lab 40
  • 41. 02/12/08 Pune Cyber Lab 41
  • 42. Another Big Problem …  Its not limited to text filers either ….  Executables can also be hidden by the same manner, and on top of that, they can be executed even without extracting them back. Now I can Wow !  I wonder why this is not being used by malware to hide themselves.  Download.fugif 02/12/08 Pune Cyber Lab 42
  • 43. Programs to find ADS  ADS Spy - http://www.bleepingcomputer.com/files/adsspy.php  LADS (List ADS) – http://www.heysoft.de/Frames/f_sw_la_en.htm  Streams v1.56- http://www.microsoft.com/technet/sysinternals/FileAndD 02/12/08 Pune Cyber Lab 43
  • 44. 02/12/08 Pune Cyber Lab 44
  • 45. 02/12/08 Pune Cyber Lab 45
  • 46. 02/12/08 Pune Cyber Lab 46
  • 47. Prashant Mahajan prashant3535@gmail.com +91-9822426910 02/12/08 Pune Cyber Lab 47
  • 48. 02/12/08 Pune Cyber Lab 48