David Morgan. Covered writing



Similar documents
CHAPTER 1 INTRODUCTION

Safer data transmission using Steganography

Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access

Network Security - ISA 656 Security

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Chapter 6 CDMA/802.11i

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

Secure Data Transmission by using Steganography

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

Solution of Exercise Sheet 5

Voice over IP: RTP/RTCP The transport layer

Practical Internet Steganography: Data Hiding in IP

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

A Concept of Digital Picture Envelope for Internet Communication

Chapter 11 Phase 5: Covering Tracks and Hiding

Advanced Networking Voice over IP: RTP/RTCP The transport layer

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

IPsec Details 1 / 43. IPsec Details

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

A Model-based Methodology for Developing Secure VoIP Systems

An Introduction to VoIP Protocols

Chapter 10. Network Security

, SNMP, Securing the Web: SSL

New security and control protocol for VoIP based on steganography and digital watermarking

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Network Security. Chapter 12. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

Project 2: Firewall Design (Phase I)

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

NAT & IP Masquerade. Internet NETWORK ADDRESS TRANSLATION INTRODUCTION. NAT & IP Masquerade Page 1 of 5. Internal PC

Release Notes for NeoGate TE X

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

ACHILLES CERTIFICATION. SIS Module SLS 1508

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Protocols. Packets. What's in an IP packet

TECHNICAL CHALLENGES OF VoIP BYPASS

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012

Internet Technology 2/13/2013

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

TCP Packet Tracing Part 1

Introduction to Wireshark Network Analysis

CIT 380: Securing Computer Systems

21.4 Network Address Translation (NAT) NAT concept

Computer Networks - CS132/EECS148 - Spring

Life of a Packet CS 640,

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Cyber Security Workshop Encryption Reference Manual

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Communication Systems SSL

Bit Chat: A Peer-to-Peer Instant Messenger

Measure wireless network performance using testing tool iperf

Three attacks in SSL protocol and their solutions

Moven Studio realtime. streaming

How To Understand The Differences Between A Fax And A Fax On A G3 Network

Computer System Management: Hosting Servers, Miscellaneous

Intrusion Detections Systems

Username: Lab date and time: CSC 101: Lab #11 Manual and Report: Cryptography Due date: 5:00pm, day after lab session

Network Address Translation (NAT)

Encryption and Decryption for Secure Communication

Compter Networks Chapter 9: Network Security

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Kiwi SyslogGen. A Freeware Syslog message generator for Windows. by SolarWinds, Inc.

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Network Security Technology Network Management

TLS and SRTP for Skype Connect. Technical Datasheet

Software License Management using the Polymorphic Encryption Algorithm White Paper

Lecture 23: Firewalls

SSL Handshake Analysis

Networking Attacks: Link-, IP-, and TCP-layer attacks. CS 161: Computer Security Prof. David Wagner

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

Network Security TCP/IP Refresher

As enterprises conduct more and more

Information Leakage in Encrypted Network Traffic

Firewalls and Intrusion Detection

NAT TCP SIP ALG Support

Ethernet. Ethernet. Network Devices

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

How To. Instreamer to Exstreamer connection. Project Name: Document Type: Document Revision: Instreamer to Exstreamer connection. How To 1.

Protocol Rollback and Network Security

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Client Server Registration Protocol

technology standards and protocol for ip telephony solutions

Dušan Bernát

Computer Networks. Chapter 5 Transport Protocols

Proxy Server, Network Address Translator, Firewall. Proxy Server

VLAN und MPLS, Firewall und NAT,

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 13

Transcription:

Steganography -- hiding in plain sight David Morgan What s steganography? Covered writing steganos = covered* graphy = writing *Antonis Christodoulou, an excellent Spring 2008 CS530 student from Greece, challenged this translation. He said there is more to the meaning of the word in Greek than this. But covered is how all the English language technical literature presents it. 1

What s steganography? steganography embedding information (plaintext) within other seemingly harmless information (covertext) in such a way that no one but the intended recipient would try to retrieve it versus cryptography transforming information (plaintext) into other unintelligible information (ciphertext) such that no one but the intended recipient would be able to retrieve it Further differences Steganography hide, without altering obfuscates the fact of communication, not the data preventative - deters attacks Cryptography alter, without hiding obfuscates the data, not the fact of communication curative - defends attacks 2

Non-cyber examples Targets are inherent, embedded, camouflaged, implicit in their environment. They blend in with the crowd. animal camouphlage Where s Waldo? Waldo Other non-cyber techniques subset null cipher Bacon cipher 3

Subset Imagine a package is being prepared for you. This tells you when and where you can get it: Dear George; Greetings to all at Oxford. Many thanks for your letter and for the summer examination package. All Entry Forms and Fees Forms should be ready for final despatch to the Syndicate by Friday 20th or at the very latest, I m told by the 21st. Admin has improved here, thought there s room for improvement still, just give us all two or three more years and we ll really show you! Please don t let these wretched 16+ proposals destroy your basic O and A pattern. Certainly this sort of change, if implemented immediately, would bring chaos. Sincerily yours; covertext Subset Dear George; Greetings to all at Oxford. Many thanks for your letter and for the summer examination package. All Entry Forms and Fees Forms should be ready for final despatch to the Syndicate by Friday 20th or at the very latest, I m told by the 21st. Admin has improved here, thought there s room for improvement still, just give us all two or three more years and we ll really show you! Please don t let these wretched 16+ proposals destroy your basic O and A pattern. Certainly this sort of change, if implemented immediately, would bring chaos. Sincerily yours; 11-word message in 93-word covertext (8.45 ratio haystack to needle) plaintext 4

Null cipher 1 st letter PRESIDENT'S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT IMMENSELY. PERSHING SAILS FROM NY JUNE I 24-character message in 204-character covertext (8.50 ratio) Different covertext,, same plaintext APPARENTLY NEUTRAL'S PROTEST IS THOROUGHLY DISCOUNTED AND IGNORED. ISMAN HARD HIT. BLOCKADE ISSUE AFFECTS PRETEXT FOR EMBARGO ON BYPRODUCTS, EJECTING SUETS AND VEGETABLE OILS. PERSHING SAILS FROM NY JUNE I 24-character message in 176-character covertext (7.33 ratio) 5

Bacon s s cipher H a v e f u n aabbb aaaaa baabb aabaa aabab baabb abbaa BUrgeR WITH fries TAsTY BUt Not FOr health uses a bilateral alphabet each letter has 2 possible fonts (or cases) 7-character message in 35-character covertext (5.00 ratio) What s s this one? USc athletics is SURpasSed BY ComPuTer ScIenCE Hint: starts with same letter as previous because BUrge == UScat 6

A less obvious bilateral alphabet from The Philosophical Research Society at http://www.prs.org/gallery-bacon.htm Doing it with computers Steganography hiding a file inside of another typically hiding text inside of a media file normally used for the transportation of secretive information Operating System unused memory slack space unallocated space hidden partition normally used to hide data from investigators Network unused bits in packet headers spread spectrum, frequency shifting 7

Photo as cover - any difference? Least Signifiacant Bit Manupalation Idea is that the least significant bit of a byte can change with little change to the overall file Consider a 8-bit grey scale image One pixel of information is stored using 8 bits. There are 256 different variations of grey. 1 0 0 1 0 1 1 0 MSB LSB 8

LSB continued Change in the LSB information of some area of the image will not be noticeable by naked eye. Utilizing this fact the message is embedded 10101101 00101010 10100010 10010001 10 10101100 00101011 10100011 10010000 10 LSB advantages and disadvantages Advantages Does not change the size of the file Is harder to detect than other steganography techniques Disadvantages Normally must use the original program to hide and reveal data If the picture with the hidden information is converted to another format, then the hidden data may be lost 9

Some network examples embedding data directly in header fields, and/or in payload expressing data by network event timing data is just patterns can be non-material e.g., morse code IP packet header 32 bits fields available for embedding steganographic data 10

TCP packet (segment) header 32 bits Put em where they don t t belong because you can * * *fields available for embedding steganographic passengers 11

The protocols don t t restrict IP identification field s value An internet header field carrying the identifying value assigned by the sender to aid in assembling the fragments of a datagram. RFC 791, Internet Protocol TCP sequence number field s value When new connections are created, an initial sequence number (ISN) generator is employed which selects a new 32 bit ISN. The generator is bound to a... clock... [but] not tied to a global clock in the network, and TCPs may have different mechanisms for picking the ISN's. RFC 793, Transmission Control Protocol Proof-of of-concept covert channel demo Named covert_tcp by Craig Rowland client/sender and server/receiver roles client places data in either IP header s identification field, or TCP header s sequence number field server knows, fetches the data out http://www.firstmonday.org/issues/issue2_5/rowland/ 12

Fields alternatively utilized OR Simultaneous screenshots client/sender (on 192.168.1.20) [root@v1 root]#./covert_tcp -dest 192.168.1.132 -source 192.168.1.20 -source_port 1234 -dest_port 80 -file covert_data_to_send Covert TCP 1.0 (c)1996 Craig H. Rowland (crowland@psionic.com) Not for commercial use without permission. file content: ABC Destination Host: 192.168.1.132 Source Host : 192.168.1.20 Originating Port: 1234 Destination Port: 80 Encoded Filename: covert_data_to_send Encoding Type : IP ID Client Mode: Sending data. Sending Data: A Sending Data: B Sending Data: C [root@v1 root] server/receiver (on 192.168.1.132) [root@clay ~]#./covert_tcp -server -dest 192.168.1.132 -source 192.168.1.20 -file captured_data.txt Covert TCP 1.0 (c)1996 Craig H. Rowland (crowland@psionic.com) Not for commercial use without permission. Listening for data from IP: 192.168.1.20 Listening for data bound for local port: Any Port Decoded Filename: captured_data.txt Decoding Type Is: IP packet ID Server Mode: Listening for data. Receiving Data: A Receiving Data: B Receiving Data: C 13

Packet dump seen at server -- using IP identification field Letter Ascii code A 65 B 66 C 67 D 68 etc etc 65 x 256 = 16640 66 x 256 = 16896 67 x 256 = 17152 Simultaneous screenshots client/sender (on 192.168.1.20) [root@v1 root]#./covert_tcp -seq -dest 192.168.1.132 -source 192.168.1.20 -source_port 1234 -dest_port 80 -file covert_data_to_send Covert TCP 1.0 (c)1996 Craig H. Rowland (crowland@psionic.com) Not for commercial use without permission. Destination Host: 192.168.1.132 Source Host : 192.168.1.20 Originating Port: 1234 Destination Port: 80 Encoded Filename: covert_data_to_send Encoding Type : IP Sequence Number Client Mode: Sending data. Sending Data: A Sending Data: B Sending Data: C [root@v1 root] server/receiver (on 192.168.1.132) [root@clay ~]#./covert_tcp -seq -server -dest 192.168.1.132 -source 192.168.1.20 -file captured_data.txt Covert TCP 1.0 (c)1996 Craig H. Rowland (crowland@psionic.com) Not for commercial use without permission. Listening for data from IP: 192.168.1.20 Listening for data bound for local port: Any Port Decoded Filename: captured_data.txt Decoding Type Is: IP Sequence Number Server Mode: Listening for data. Receiving Data: A Receiving Data: B Receiving Data: C 14

Packet dump seen at server -- using TCP sequence number field Voice stream as cover - invent your own protocol Covert channel for improving VoIP security http://www.ippt.gov.pl/~zkotulsk/covert%20channel%20for%20improving%20voip%20security.pdf 15

Voice stream as cover - embed your protocol in VoIP packets Covert channel for improving VoIP security http://www.ippt.gov.pl/~zkotulsk/covert%20channel%20for%20improving%20voip%20security.pdf Photo, voice work well because bad is good enough for human consumption our crude senses have high error tolerance right and wrong mom never taught me the difference (slightly) wrong colors look the same as right (slightly) wrong voice sounds the same as right 16

Even more covert signal timing port knocking Even more covert Embed nothing in the non-surreptitious channel Instead express covert info by timing channel s non-covert exchanges http://userpages.umbc.edu/~chauhan2/cmsc691i/embedding_covert_channels_into_tcp_ip.ppt 17

Port knocking encode information in sequence of open port requests the port sequence is the information e.g. port 72, port 69, port 76, port 76, port 79 requests, signify hello the port sequence is a password/combination to unlock a response e.g. port 10004, port 10030, port 10012, signify turn on httpd on port 80 receiver observes, optionally reacts daemon sniffs network process watches firewall log http://www.portknocking.org/ Products s-tools outguess various others http://www.jjtc.com/security/stegtools.htm http://caia.swin.edu.au/cv/szander/cc/cc-implementations-bib.html 18