Top Banner
Covert Channels Covert Channels The Silence Must be Heard The Silence Must be Heard The Hidden Must be Seen The Hidden Must be Seen The Secrets Must be Revealed The Secrets Must be Revealed By: Randy Grubb By: Randy Grubb ong Atlantic State University – Cyber & Homeland Security Ins
30

Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Jan 01, 2016

Download

Documents

burke-ashley

Armstrong Atlantic State University – Cyber & Homeland Security Institute. Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed By: Randy Grubb. Cyber Capabilities. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Covert ChannelsCovert ChannelsThe Silence Must be HeardThe Silence Must be HeardThe Hidden Must be SeenThe Hidden Must be Seen

The Secrets Must be RevealedThe Secrets Must be Revealed

By: Randy GrubbBy: Randy Grubb

Armstrong Atlantic State University – Cyber & Homeland Security Institute

Page 2: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Cyber Capabilities

• By the turn of the century all known terrorist and criminal groups had a presence on the Internet.– Psychological Warfare– Propaganda– Data Mining– Fundraising/financing– Recruiting– Networking– Information sharing– Planning & coordination– Actual perpetration of their crimes

Page 3: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Why the Internet?

• Anonymous (real or perceived)– Encryption– Covert Channels/Steganography– Public libraries/Internet cafes/wireless access points– Anonymizers/Proxies (Tor)

• Geographically Unbounded– People can communicate with one another from

virtually anywhere in the world– More than 10,000 Internet Service Providers (ISP)

worldwide– Some are sympathetic to the radical cause

Page 4: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Why the Internet?

• Largely unregulated– Developed as an open interoperable network– No central government authority– Most ISPs do not have the resources or

desire to monitor web-site content

• Inexpensive– Free web hosting– Free e-mail accounts

Page 5: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Why the Internet?

• US and coalition military actions since 9/11 have deprived terrorist organizations their base of operations and training camps.

• These actions have dispersed terrorist organizations more widely.

• With the Internet, terrorist organizations can control a worldwide movement without ever meeting.

Source: Harvard Gazette: Terror Online and how to counteract it, Ruth Walker, 2004

Page 6: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Netwar

• Term given to an emerging mode of conflict dealing with the societal relationships between namely terrorists and criminal organizations.– Involves measures short of traditional warfare– Network forms of organization, doctrine,

strategy and communication

• Dispersed and decentralized manner

Page 7: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Netwar

• Small groups from points around the world utilizing network and Internet technology to:– Communicate– Coordinate– Act

Page 8: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Is This a Secure Site?

Page 9: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

What are Covert Channels?

• Covert Channels– Any communication channel that can be exploited by

a process to transfer information in a manner that violates the systems security policy.

– In short, covert channels transfer information using non-standard methods

– Against the system design– Communication is obscured; unnoticed– Easily bypass current security tools & products

Page 10: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

What are Covert Channels?

• Covert Channels allow multiple parties to communicate ‘unseen’– They hide the fact that a communication is even

occurring– Provides privacy and anonymity

• Unlike encryption, where communication is obvious but obscured– Encryption is easily identified– Clear and visible indications of encryption

Page 11: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Covert Channels

• Covert Channels work because of human deficiencies– Eye sight– Hearing– Analysis skills

• Lack of Interest– It’s not really a problem, doesn’t happen– Prove it to me

• System Design Discrepancies– Components utilized in unintended manner

Page 12: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Covert Channels

• Many covert channels will elude detection simply because most individuals have never considered the possibility

• Perception over rides reality

Page 13: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Covert Channels

• Covert Channels hide the fact that communication between two or more individuals is occurring.

Page 14: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Potential Damage

• Corporate Espionage– Loss of competitive advantage

• Government or Military Activities– Increased threat to National Security– Terrorist Organizations

• Criminal Activities– Transfer of pornography or commercial software

• Financial Impact– Transfer of confidential financial data

Page 15: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Known Covert Methods

• Steganography– Images– Audio

• Text Manipulation• TCP Covert Channels• Alternate Data Streams (ADS)• Deep or invisible web

Page 16: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Tool Summary

• Over 300 known tool variation and releases• Tools for every Operating System including

DOS, Windows, UNIX/Linux, OS2, Mac• Wide variety of methodologies and features• Most software is freeware or shareware

Page 17: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Origins of Steganography

• What does Steganography Mean?– Pronounced “STEHG-uh-NAH-gru-fee”– From the Greek Roots

• “Steganos” or Covered • “Graphie” or Writing• “Covered Writing”

– First Known Usage• The early Greeks and Persians used several forms of

covered writing to conceal the communication of secret or covert messages

• Origins date back as far 2500 years ago

Page 18: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Carrier + Payload = Covert Message

• Carrier – The file that provides cover for and conceals the payload. Payload – The secret message or information that you wish to conceal or communicate.

• Covert Message – The combination of the payload and the carrier. The covert message file should appear identical to the carrier.

• Most current stego tools also encrypt the payload to increase security.

Page 19: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Digital Images

• Digital Images are created by software– Digital camera– Scanner– Graphics program

• Digital Images are made up of pixels– Represented on a grid– The pixel is the smallest visual component– Resolution & representation

• 640 x 480 – rows x columns• 75 dpi – number of dots per inch

1

1 http://www.library.cornell.edu/preservation/tutorial/intro/intro-01.htmlSource: WetStone Technologies

Page 20: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Digital Images

• Color is represented in digital images by three different methods.– Paletted images– True color images– Compressed images

Page 21: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Palette Images• Map to a pre-defined color on a table

– Pixel represented by table lookup value

2http://www.webstyleguide.com/graphics/displays.html

2

Source: WetStone Technologies

Page 22: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

True Color Images

• True Color images– Typically 24 bits– Most common format is

RGB or Red – Green - Blue– 8 bits for each color byte

(red, green, blue)– 16.7M possible colors

4http://www.webstyleguide.com/graphics/displays.html

4

Source: WetStone Technologies

Page 23: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Least Significant Bit Steganography

“The hiding of data within a digital carrier by slightly altering an insignificant characteristic of the carrier that does not appear to alter the normal rendering of the data”

Hosmer, 1999

Source: WetStone Technologies

Page 24: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Altering a True Color Image

2http://www.webstyleguide.com/graphics/displays.html

2

Image source: www.wikipedia.com

Page 25: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

LSB Substitution – bit 0

11 0 1 1 0 1 0

1 1 0 0 0 1 1

1 1 1 0 0 0 0

RED

GREEN

BLUE

0

0

1

Before

Before After

Combined Color

Individual Colors

After

0

1

0

LSB Substitution

Source: WetStone Technologies

Page 26: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

LSB Substitution bit 0 and 1

11 0 1 1 0 1 0

1 1 0 0 0 1 0

1 1 1 0 0 0 1

RED

GREEN

BLUE

1

0

1

Before

Before After

Combined Color

Individual Colors

After

0

1

0

LSB Substitution

Source: WetStone Technologies

Page 27: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

LSB Substitution bits (0-3)

11 0 1 1 100

1 1 0 0 100

1 1 1 0 111

RED

GREEN

BLUE

1

0

1

Before

Before After

Combined Color

Individual Colors

After

0

1

0

LSB Substitution

Source: WetStone Technologies

Page 28: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Color Differences

Source: WetStone Technologies

Page 29: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Color Differences

Source: WetStone Technologies

Page 30: Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed

Color DifferencesCan you spot the modified pixel?

Source: WetStone Technologies