Watch the Hack in the Box video below on steganography.
Please watch this video and comment on this writing, please add reference or citation
This week’s video spoke on steganography, which can be informally defined as the practice of undetectably communicating a message in a cover object. This isn’t a recent discovery as we have been doing this culturally for centuries from the Romans, Indians, and even cavemen with hieroglyphics. This transitioned to the digital era in 1980 where they hide the fact that the communication is going on or try to hide the content of the conversation, or even hide the fact the conversation is going on at all. There are hundreds of different techniques one can use in order to search for these messages on different network covert channels but you would have to study a library of ideas dating back 100’s of years to scan through to search for possible anomalies. There or a few different methods that Wendzel mentioned used to hide data, a few of them would be:
- The overt channel uses the size of a header element or of a PDU* to encode the hidden message (The covert channel alters the sequence of header/PDU elements to encode hidden information.)
- Can use time gaps to hide information.
- Retransmission patterns that communicate through responses or the lack of.
The main similarities that I found between the two subjects are that these are all methods criminals would use to hide information from a digital forensics investigator. Hiding information within the computers system that may not be found with the various methods that we are taught to see things in plain sight. The knowledge that I learned from this subject, (if I were to go into this field) is just to be more observant of any possibility, especially knowing that the information could be right in front of you if you notice any slight irregularity. The slightest inconsistency could lead to a huge discovery.