As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention. * Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7* Dives deep into the less known approaches to data hiding, covert communications, and advanced malware* Includes never before published information about next generation methods of data hiding* Outlines a well-defined methodology for countering threats* Looks ahead at future predictions for data hiding
Dedication v
Raggo Acknowledgments vii
Hosmer Acknowledgments ix
About The Authors xv
About The Techical Editor xvii
Preface xix
Chapter 1 History of Secret Writing 1 (18)
Introduction 1 (1)
Cryptology 2 (8)
Substitution Cipher 3 (5)
Transposition Cipher 8 (2)
The Difference Between Substitution 10 (1)
Ciphers and Transposition Ciphers
Steganography 10 (7)
Cardano's Grille 11 (6)
Summary 17 (1)
References 17 (2)
Chapter 2 Four Easy Data Hiding Exercises 19 (22)
Hiding Data in Microsoft Word 20 (6)
Image Metadata 26 (3)
Mobile Device Data Hiding 29 (4)
File Compression Tool Data Hiding 33 (5)
Summary 38 (1)
References 39 (2)
Chapter 3 Steganography 41 (28)
Introduction 41 (1)
Steganographic Techniques 42 (13)
Insertion Methods 43 (3)
Modification 46 (3)
Hiding in PDFs (Insertion Meets LSB) 49 (3)
Hiding in Executables (Hydan) 52 (2)
Hiding in HTML 54 (1)
Steganalysis 55 (11)
Anomalous Analysis 58 (1)
Steganalysis Tools 59 (1)
Freeware Tools 59 (7)
Summary 66 (1)
References 67 (2)
Chapter 4 Multimedia Data Hiding 69 (22)
Multimedia Overview 69 (1)
Data Hiding in Digital Audio 70 (10)
Simple Audio File 70 (3)
Embedding(Imperceptible Approach)
Data hiding in a wav file 73 (5)
StegAnalysis of LSB Wave Data Hiding 78 (1)
Advanced Audio File Embedding 79 (1)
Audio Summary 79 (1)
Data Hiding in Digital Video 80 (9)
MSU Stego 80 (3)
TCStego 83 (6)
Summary 89 (1)
References 90 (1)
Chapter 5 Data Hiding Among Android Mobile 91 (16)
Devices
Android Overview 91 (1)
Android ImgHid and Reveal App 91 (7)
Analysis of the Resulting ImgHid Data 95 (3)
Hiding Operation
Android My Secret App 98 (3)
Stego Analysis of the Resulting My 100 (1)
Secret Images
Summary 101 (1)
StegDroid 102 (4)
Using the Android Application 103 (3)
Summary 106 (1)
References 106 (1)
Chapter 6 Apple iOS Data Hiding 107 (26)
Introduction 107 (1)
Mobile Device Data Hiding Applications 107 (23)
Spy Pix Analysis 110 (6)
Stego Sec Analysis 116 (9)
InvisiLetter Analysis 125 (5)
Summary 130 (1)
References 131 (2)
Chapter 7 Operating System Data Hiding 133 (34)
Windows Data Hiding 135 (15)
Alternate Data Streams Reviewed 135 (3)
Stealth Alternate Data Streams 138 (2)
Volume Shadowing 140 (10)
Linux Data Hiding 150 (16)
Linux Filename Trickery 150 (1)
Extended Filesystem Data Hiding 151 (6)
True Crypt 157 (9)
References 166 (1)
Chapter 8 Virtual Data Hiding 167 (14)
Introduction 167 (1)
Hiding a Virtual Environment 168 (3)
Getting Started 168 (3)
A Review of Virtual Environments 171 (8)
VMware Files 172 (1)
Hiding Data in a VMware Image 172 (7)
Summary 179 (1)
References 179 (2)
Chapter 9 Data Hiding in Network Protocols 181 (12)
Introduction 181 (3)
VoIP Data Hiding 184 (3)
Delayed Packet Modification Method 187 (1)
IP Layer Data Hiding, The TTL Field 188 (2)
Investigating Protocol Data Hiding 190 (1)
Summary 191 (1)
References 191 (2)
Chapter 10 Forensics and Anti-Forensics 193 (20)
Introduction 193 (1)
Anti-Forensics---Hiding your tracks 194 (3)
Data Hiding Passwords 194 (1)
Hiding Your Tracks 195 (2)
Forensics 197 (14)
Looking for Data Hiding Software 198 (1)
Finding Remaining Artifacts 199 (4)
Identifying and View Cached Images 203 (1)
(Cache Auditing Tools)
Evidence in Thumbnails 204 (4)
Searching for Hidden Directories and 208 (1)
Files
Network IDS 209 (2)
Summary 211 (1)
References 211 (2)
Chapter 11 Mitigation Strategies 213 (16)
Forensic Investigation 213 (3)
Step 1 Steganography Use Discovery 213 (2)
Step 2 Steganography Carrier Discovery 215 (1)
Step 3 Hidden Content Extraction 215 (1)
Mitigation 216 (9)
Network Technologies for detecting Data 219 (4)
Hiding
Endpoint Technologies for detecting 223 (2)
Data Hiding
Summary 225 (2)
References 227 (2)
Chapter 12 Futures 229 (8)
The Future, and the Past 229 (7)
Future Threats 230 (3)
Steganography as a Countermeasure 233 (2)
Current and Futuristic Combined Threats 235 (1)
Summary 236 (1)
Index 237