- Browse
- » Data hiding techniques in Windows OS: a practical approach to investigation and defense
Data hiding techniques in Windows OS: a practical approach to investigation and defense
Author
Publisher
Syngress
Publication Date
[2017]
Language
English
Description
Loading Description...
Table of Contents
From the eBook
Machine generated contents note: 1. Introduction and Historical Background --
Introduction --
Classical Cipher Types --
Substitution Cipher --
Transposition Cipher --
Other Ciphers and Codes --
Difference Between Substitution and Transposition Cipher --
Practicing Old Ciphers Using Modem Computing --
Modern Cryptography Systems --
Secret Key Cryptography --
Public Key Cryptography --
Digital Signature --
Cryptographic Hash Function --
Steganography --
What Is Steganography? --
Comparing Steganography and Cryptography --
Steganography Types --
Watermarking --
Watermarking Types --
Compare Steganography and Watermarking --
Anonymity --
Summary --
References --
Bibliography --
2. Data Hiding Using Simple Methods --
Introduction --
Bit-Shifting Data Hiding --
Hiding Data Inside Rich Text Format Documents --
Renaming Files --
Matching File Signatures and File Extensions --
Hiding Data in Compressed Files --
Hiding Data Through File Splitting --
Hiding Data in Microsoft® Office Documents --
Hidden Text --
Hidden Data Within Document Attributes (Metadata) --
White Font --
Hiding Data by Exploiting OLE Structured Storage --
Self-Encrypt MS Office® Document --
Hiding Inside MS Excel® Spreadsheet --
Data Hiding Inside Image Attributes (Image Metadata) --
Summary --
References --
Bibliography --
3. Data Hiding Using Steganographic Techniques --
Introduction --
Text Steganography --
Format-Based Steganography --
Random and Statistical Generation --
Linguistic-Based Methods --
Hiding Inside MS Office® Documents Based on OOXML File Format --
Webpage Text Steganography --
Hiding Secret Messages Inside Twitter Updates --
Image Steganography --
Digital Image Basic Concepts --
Image Steganographic Techniques --
Digital Media Steganography Tools --
Data Hiding Inside Audio Files --
Audio Files Basic Concepts --
Audio Steganography Types --
Data Hiding Using Other Digital Media Types --
Data Hiding Inside PDF Documents --
Data Hiding Inside Program Binaries --
Summary --
References --
Bibliography --
4. Data Hiding Under Windows® OS File Structure --
Introduction --
Data Hiding Using Alternate Data Stream --
What Is the New Technology File System? --
What Is an Alternate Data Stream? --
How Can We Use Alternate Data Streams to Hide Files? --
Hiding Executable Code in Alternate Data Stream Files --
Important Notes About Using Alternate Data Stream in Hiding Files --
How to Delete Alternate Data Stream Files --
Detecting Alternate Data Stream Files --
Data Hiding Using Stealth Alternate Data Stream --
Hiding Data Inside Windows® Restoration Points --
Hiding Data Inside Windows® Registry --
Hiding in a File's Slack Space --
Understanding Hard Disk Drives --
File Allocation Table --
Hidden Partitions --
Hidden Partitions Under Windows® OS --
Creating a Hidden Partition Within a USB Zip Drive --
Data Hiding Within Master File Table --
Data Hiding in Disk Bad Blocks --
Data Hiding Under Computer Hardware Level --
Data Hiding Inside Host Protected Area --
Hiding Data in Device Configuration Overlay --
Summary --
References --
Bibliography --
5. Data Hiding Using Encryption Techniques --
Introduction --
Security Awareness Corners --
Human Security --
Device Security --
Message Security --
Network Security --
Anonymous Operating System --
Tails --
Ubuntu Privacy Remix --
Other Security Distributions --
Advice When Using Security Operating Systems --
Portable Stick Computer --
Disk Encryption --
Encrypting Partitions Using BitLocker --
Creating Encrypted Vaults --
Single File Encryption --
Cloud Storage Encryption --
Discussion of Security Level in Disk Encryption --
Anonymize Your Location Online --
Using the TOR Browser --
Virtual Private Networks --
SSH Tunneling --
Using Proxy Server --
Anonymous Search Engine --
Web Browser Privacy Add-Ons --
Secure Anonymous File Sharing --
Encrypting Email Communications --
Email Encryption Using Gpg4Win --
Open PGP Encryption for Webmail Using the Mailvelope Browser Extension --
Secure Web Mail Providers --
Encrypt Instant Messaging, Video Calls, and VOIP Sessions --
What Are the Risks? --
Off-the-Record-Messaging and Pidgin --
Secure Video Calling Service Using Gruveo --
Secure Anonymous Calling Service Using GHOST CALL --
Retroshare Secure Social Platform --
TOR Messenger --
Complete Anonymous IM Using Ricochet --
Create and Maintain Secure Passwords --
Password Best Practice --
Password Generation Tools --
Password-Saving Techniques --
Password Manager Tools --
Miscellaneous Security Hints and Best Practices --
Summary --
References --
Bibliography --
6. Data Hiding Forensics --
Introduction --
Understanding Computer Forensics --
Computer Forensic Process --
Differences Between Computer Forensics and Other Computing Domains --
Need for Digital Evidence --
Steganalysis --
Steganalysis Methods --
Destroying Hidden Data --
Steganalysis of Digital Media Files --
Text Document Steganalysis --
Image Forensics --
Audio Forensics --
Video Forensics --
Digital Files Metadata Forensic --
Windows Forensics --
Capture Volatile Memory --
Capture Disk Drive --
Deleted Files Recovery --
Windows Registry Analysis --
Forensic Analysis of Windows Prefetch Files --
Windows Minidump Files Forensics --
Windows Thumbnail Forensics --
File Signature Analysis --
File Attributes Analysis --
Discover Hidden Partitions --
Detect Alternative Data Streams --
Investigating Windows Volume Shadow Copy --
Virtual Memory Analysis --
Windows Password Cracking --
Host Protected Area and Device Configuration Relay Forensic --
Examining Encrypted Files --
Summary --
References --
Bibliography --
7. Antiforensic Techniques --
Introduction --
Antiforensics Goals --
Data Hiding General Advice --
Data Destruction --
Hard Disk Wiping --
Manipulating Digital File Metadata --
Windows Antiforensics Techniques --
Configure Windows for Better Privacy --
Disable Recycle Bin --
Registry Antiforensics --
Disable Windows Hibernation --
Disable Windows Virtual Memory (Paging File) --
Disable System Restore Points and File History --
Disable Windows Thumbnail Cache --
Disable Windows Prefetch Feature --
Disable Windows Logging --
Disable Windows® Password Hash Extraction --
Clearing Digital Footprints --
Live CDs and Bootable USB Tokens --
Virtual Machines --
Using Portable Applications --
Direct Attack Against Forensic Software --
Summary --
References --
Bibliography --
8. Future Trends --
Introduction --
Future of Encryption --
Data Stored in Cloud Computing --
Visualization Technology --
Data Hiding in Enterprise Networks --
Data Concealment --
Data Leakage Prevention --
Streaming Protocols --
Wireless Networks and Future Networking Protocols --
Data Hiding in Mobile Devices --
Anonymous Networks --
Summary --
References --
Bibliography.
Excerpt
Loading Excerpt...
Author Notes
Loading Author Notes...
More Details
Contributors
ISBN
9780128044490
9780128044964
9780128044964
Reviews from GoodReads
Loading GoodReads Reviews.