Data hiding techniques in Windows OS : a practical approach to investigation and defense /
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Cambridge, MA :
Syngress,
[2017]
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Machine generated contents note: 1. Introduction and Historical Background
- Introduction
- Classical Cipher Types
- Substitution Cipher
- Transposition Cipher
- Other Ciphers and Codes
- Difference Between Substitution and Transposition Cipher
- Practicing Old Ciphers Using Modem Computing
- Modern Cryptography Systems
- Secret Key Cryptography
- Public Key Cryptography
- Digital Signature
- Cryptographic Hash Function
- Steganography
- What Is Steganography?
- Comparing Steganography and Cryptography
- Steganography Types
- Watermarking
- Watermarking Types
- Compare Steganography and Watermarking
- Anonymity
- Summary
- References
- Bibliography
- 2. Data Hiding Using Simple Methods
- Introduction
- Bit-Shifting Data Hiding
- Hiding Data Inside Rich Text Format Documents
- Renaming Files
- Matching File Signatures and File Extensions
- Hiding Data in Compressed Files
- Hiding Data Through File Splitting
- Hiding Data in Microsoft® Office Documents
- Hidden Text
- Hidden Data Within Document Attributes (Metadata)
- White Font
- Hiding Data by Exploiting OLE Structured Storage
- Self-Encrypt MS Office® Document
- Hiding Inside MS Excel® Spreadsheet
- Data Hiding Inside Image Attributes (Image Metadata)
- Summary
- References
- Bibliography
- 3. Data Hiding Using Steganographic Techniques
- Introduction
- Text Steganography
- Format-Based Steganography
- Random and Statistical Generation
- Linguistic-Based Methods
- Hiding Inside MS Office® Documents Based on OOXML File Format
- Webpage Text Steganography
- Hiding Secret Messages Inside Twitter Updates
- Image Steganography
- Digital Image Basic Concepts
- Image Steganographic Techniques
- Digital Media Steganography Tools
- Data Hiding Inside Audio Files
- Audio Files Basic Concepts
- Audio Steganography Types
- Data Hiding Using Other Digital Media Types
- Data Hiding Inside PDF Documents
- Data Hiding Inside Program Binaries
- Summary
- References
- Bibliography
- 4. Data Hiding Under Windows® OS File Structure
- Introduction
- Data Hiding Using Alternate Data Stream
- What Is the New Technology File System?
- What Is an Alternate Data Stream?
- How Can We Use Alternate Data Streams to Hide Files?
- Hiding Executable Code in Alternate Data Stream Files
- Important Notes About Using Alternate Data Stream in Hiding Files
- How to Delete Alternate Data Stream Files
- Detecting Alternate Data Stream Files
- Data Hiding Using Stealth Alternate Data Stream
- Hiding Data Inside Windows® Restoration Points
- Hiding Data Inside Windows® Registry
- Hiding in a File's Slack Space
- Understanding Hard Disk Drives
- File Allocation Table
- Hidden Partitions
- Hidden Partitions Under Windows® OS
- Creating a Hidden Partition Within a USB Zip Drive
- Data Hiding Within Master File Table
- Data Hiding in Disk Bad Blocks
- Data Hiding Under Computer Hardware Level
- Data Hiding Inside Host Protected Area
- Hiding Data in Device Configuration Overlay
- Summary
- References
- Bibliography
- 5. Data Hiding Using Encryption Techniques
- Introduction
- Security Awareness Corners
- Human Security
- Device Security
- Message Security
- Network Security
- Anonymous Operating System
- Tails
- Ubuntu Privacy Remix
- Other Security Distributions
- Advice When Using Security Operating Systems
- Portable Stick Computer
- Disk Encryption
- Encrypting Partitions Using BitLocker
- Creating Encrypted Vaults
- Single File Encryption
- Cloud Storage Encryption
- Discussion of Security Level in Disk Encryption
- Anonymize Your Location Online
- Using the TOR Browser
- Virtual Private Networks
- SSH Tunneling
- Using Proxy Server
- Anonymous Search Engine
- Web Browser Privacy Add-Ons
- Secure Anonymous File Sharing
- Encrypting Email Communications
- Email Encryption Using Gpg4Win
- Open PGP Encryption for Webmail Using the Mailvelope Browser Extension
- Secure Web Mail Providers
- Encrypt Instant Messaging, Video Calls, and VOIP Sessions
- What Are the Risks?
- Off-the-Record-Messaging and Pidgin
- Secure Video Calling Service Using Gruveo
- Secure Anonymous Calling Service Using GHOST CALL
- Retroshare Secure Social Platform
- TOR Messenger
- Complete Anonymous IM Using Ricochet
- Create and Maintain Secure Passwords
- Password Best Practice
- Password Generation Tools
- Password-Saving Techniques
- Password Manager Tools
- Miscellaneous Security Hints and Best Practices
- Summary
- References
- Bibliography
- 6. Data Hiding Forensics
- Introduction
- Understanding Computer Forensics
- Computer Forensic Process
- Differences Between Computer Forensics and Other Computing Domains
- Need for Digital Evidence
- Steganalysis
- Steganalysis Methods
- Destroying Hidden Data
- Steganalysis of Digital Media Files
- Text Document Steganalysis
- Image Forensics
- Audio Forensics
- Video Forensics
- Digital Files Metadata Forensic
- Windows Forensics
- Capture Volatile Memory
- Capture Disk Drive
- Deleted Files Recovery
- Windows Registry Analysis
- Forensic Analysis of Windows Prefetch Files
- Windows Minidump Files Forensics
- Windows Thumbnail Forensics
- File Signature Analysis
- File Attributes Analysis
- Discover Hidden Partitions
- Detect Alternative Data Streams
- Investigating Windows Volume Shadow Copy
- Virtual Memory Analysis
- Windows Password Cracking
- Host Protected Area and Device Configuration Relay Forensic
- Examining Encrypted Files
- Summary
- References
- Bibliography
- 7. Antiforensic Techniques
- Introduction
- Antiforensics Goals
- Data Hiding General Advice
- Data Destruction
- Hard Disk Wiping
- Manipulating Digital File Metadata
- Windows Antiforensics Techniques
- Configure Windows for Better Privacy
- Disable Recycle Bin
- Registry Antiforensics
- Disable Windows Hibernation
- Disable Windows Virtual Memory (Paging File)
- Disable System Restore Points and File History
- Disable Windows Thumbnail Cache
- Disable Windows Prefetch Feature
- Disable Windows Logging
- Disable Windows® Password Hash Extraction
- Clearing Digital Footprints
- Live CDs and Bootable USB Tokens
- Virtual Machines
- Using Portable Applications
- Direct Attack Against Forensic Software
- Summary
- References
- Bibliography
- 8. Future Trends
- Introduction
- Future of Encryption
- Data Stored in Cloud Computing
- Visualization Technology
- Data Hiding in Enterprise Networks
- Data Concealment
- Data Leakage Prevention
- Streaming Protocols
- Wireless Networks and Future Networking Protocols
- Data Hiding in Mobile Devices
- Anonymous Networks
- Summary
- References
- Bibliography.