Top Banner
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier
27

Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

Dec 24, 2015

Download

Documents

Valerie Young
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

Steganography

Cyber Security Camp, July 22, 2015

Rodrigo SardiñasDr. David Umphress

William Frazier

Page 2: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

2

What is Steganography

Page 3: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

3

What is Steganography

• The art of covered or hidden writing. • Steganos – Greek word meaning “covered”• Graphy – Latin word meaning “writing” or

“drawing”• Thousands of years old

– Tattoos, symbols, contextual clues/jargon, bunnies

• Difficult to detect (if you don’t know its there)

Page 4: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

4

What Steganography is Not

• Cryptography – Kryptos = secret or hidden– Graphein/Logia = writing/study– The art of writing or solving codes.– Hide the meaning, not the message

• Steganography– Hide the message, not the meaning

• Can both be used to obscure data

Page 5: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

5

Example 1

• Covered or concealment ciphers– Use null cipher to hide message according

to some prearranged set of rules

Frank is not doing my editing.

Hidden message: “Find me”

Page 6: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

6

Activity 1

• At your table, devise your own concealment cipher strategy. (5 minutes)

• Use that strategy to hide a message. (3 min)• Class will have several minutes to try to

decipher each group’s message.– Prize for group with most correct guesses– Prize for group with most elaborate or creative

strategy

Page 7: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

7

Types of Steganography

InsertionSubstitutionGeneration

Page 8: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

8

Insertion (Injection)

• Hide data in sections of a file that are not processed– Comments section in HTML file– After EOF marker in regular file– Metadata section of file

• No modification of relevant data• Will add to original file size• No limit to how much can be hidden• Potential to detect if compared to original

Page 9: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

9

Example 2Steganography via injection

OriginalEdited in Notepad++

Page 10: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

10

Activity 2 (text only)• Open an image using notepad++• Write a message at the bottom of the file• Open the image normally to view it• Experiment with writing messages at various

locations in the image (in notepad++) to see what happens

• Discuss results of inserting messages in places other than at the end– What happens when you add text to beginning?– What about somewhere in the middle?

Page 11: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

11

Activity 3 (files)• Create file(s) (any files, text, word, etc…)• Zip files up using built-in windows zip command

(send to -> zip file)• Place zip and an image in same folder• Open command in current directory

– Shift + right click -> open command prompt here

• copy /b [name of picture].jpg + [name of zip file].zip [new name for picture].jpg

• View new image normally• Change file extension to .zip to view archive contents

Page 12: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

12

Substitution

• Make minor changes in data such that user doesn’t notice change

• No change in file size• Limited in how much can be hidden• Potential to detect if compared to

original

Page 13: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

13

Example 3Least Significant Bit

Substitution

Original Modified

Page 14: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

14

Activity 5• Open a web browser and go to the following URL:

– http://www.mobilefish.com/services/steganography/steganography.php

• Follow instructions to upload any image• Type hidden message• Do not enter a password (no encryption)• Download image with message inside• Open in notepad++ to see if you can find message• Go back to website and follow instructions to

show message

Page 15: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

15

End of Session 1

Lunch

Page 16: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

16

Generation

• Create new file from carrier (file hiding the data) and hidden data file using some algorithm

• No limit to how much can be hidden• Cannot be compared to original since a brand

new “original” file is created

Page 17: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

17

Example 5Use custom algorithm to hide data

Created image

Message hidden in audio generated from image

Page 18: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

18

Activity 4 Do Together (part 1)• Use Gimp to create

hidden message– Create new image– Change background

color to black

– Create text in image (use white text)

– Export image as JPEG

Page 19: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

19

Activity 4 Do Together (part 2)• Use coagula to convert JPEG to audio (.wav) file

– Open JPEG in coagula– Select “render without blue”

• This should create coagula.wav in current folder

Page 20: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

20

Activity 4 Do Together (part 3)• Use Audacity to view message

– Open coagula.wav in audacity– Select Spectrogram option to view hidden message

Page 21: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

21

Activity 5 (part 1)

• Use OpenPuff to Hide, encrypt, and distract• Hide data

– Choose 3 different passwords (write them down)• 2 for crypto, 1 for scrambling

– Select data to hide• From secret data folder

– Select multiple carriers (.mp3, .jpg, .pdf, ect…)• From carrier folder

– Sort carriers– Select noise level– Add Decoy– Enter 3 different passwords– Choose output folder(s)

Page 22: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

22

Activity 5 (part 2)

Page 23: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

23

Activity 5 (part 3)

• Use OpenPuff to Hide, encrypt, and distract• Unhide data

– Enter all passwords• If you want to unhide decoy, enter decoy passwords• If you want to unhide data, enter data passwords

– Browse to folder with previous carriers and choose correct ones

– Sort carriers in same order as before– Select same noise level as before– Verify data is correct

Page 24: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

24

Activity 5 (part 4)

Page 27: Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

27

A Keystone in Building a Better Future for All