Главная
Study mode:
on
1
Intro
2
Josh Sokol
3
Project Beginnings
4
What is Pron?
5
Hidden Files and Directories
6
Rename File or Extension
7
Put with Other Similar Files
8
Burying Several Directories Down
9
Place with Other Files in Compressed Format
10
Alternate Data Streams
11
Spam Mimic
12
Hidden Partitions
13
Invisible Partitions
14
Slack Space (slacker)
15
Hide Data in Bad Blocks
16
What's Hiding in this Picture?
17
Encryption + Steganography
18
Data Exfiltration & Protection
19
Chunking and Checking
20
Checking Chunking
21
Different Steganography
22
Steggo Steganography
23
File Types Tested to Work
24
AES-256 Encryption
25
Images
26
Unencrypted Data
27
SSL
28
CAPTCHA
29
File Upload Size
30
Cache Kills
31
Steggo Mirroring
32
Bigger Files
33
In Closing...
Description:
Explore techniques for hiding data from surveillance in this 42-minute LASCON conference talk. Delve into the world of distributed steganography as Josh Sokol and Orlando Barrera II present various methods to conceal information. Learn about hidden files and directories, file renaming strategies, and burying data deep within directory structures. Discover advanced techniques like alternate data streams, spam mimic, hidden partitions, and utilizing slack space. Examine the combination of encryption with steganography and explore data exfiltration protection methods. Gain insights into chunking, checking, and different steganography approaches, including Steggo. Understand which file types work best for hiding data, the use of AES-256 encryption, and considerations for file upload sizes and caching. By the end of this talk, acquire a comprehensive understanding of distributed steganography techniques to protect sensitive information from prying eyes.

Hiding From Big Brother Using Distributed Steganography

LASCON
Add to list
0:00 / 0:00