uyr
play

UYR Second level Third level Under Your Radar Fourth level Fifth - PowerPoint PPT Presentation

Click to edit Master title style Click to edit Master text styles UYR Second level Third level Under Your Radar Fourth level Fifth level Covert Channel & Exfiltration Ali Hadi / Mariam Khader Princess Sumaya


  1. Click to edit Master title style • Click to edit Master text styles “UYR” — Second level • Third level Under Your Radar — Fourth level » Fifth level Covert Channel & Exfiltration Ali Hadi / Mariam Khader Princess Sumaya University for Technology (PSUT) Amman/Jordan

  2. Click to edit Master title style Outline • Click to edit Master text styles • Intro — Second level • What • Third level • Usage — Fourth level • Idea » Fifth level • How it Works • Why Under Radar • Action 

  3. Click to edit Master title style Quick Intro. • Steganography • Click to edit Master text styles – Hiding the existence of the data — Second level • Third level • Covert Channel — Fourth level – Unseen “secret” communication » Fifth level • Exfiltration (aka Exfil ) – Illegal retrieval of data from a compromised computer

  4. Click to edit Master title style • Click to edit Master text styles — Second level Why Social Networks • Third level — Fourth level & Multimedia? » Fifth level

  5. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  6. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  7. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  8. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  9. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  10. Hackers Exfiltrating Data with Video Click to edit Master title style Steganography via Cloud Video Services [1] • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level KEN WESTIN @TripeWire

  11. Click to edit Master title style What: UYR? • Click to edit Master text styles • New application layer covert channel and exfil system — Second level • Applies multimedia stego techniques • Third level — Fourth level • Hard for Radars to detect what’s being sent » Fifth level

  12. Click to edit Master title style Usages? • Click to edit Master text styles • Covert Communications — Second level • Exfiltrating Data • Third level — Fourth level » Fifth level

  13. Click to edit Master title style Idea? • Click to edit Master text styles • No real data is transmitted! — Second level • Only data transmitted is a bunch of • Third level numbers (key)! — Fourth level » Fifth level

  14. Click to edit Master title style • Click to edit Master text styles — Second level • Third level How it works? — Fourth level » Fifth level

  15. Click to edit Master title style Protocol Agreements • Click to edit Master text styles • Social Media Used — Second level • Video Used • Third level — Fourth level » Fifth level

  16. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  17. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  18. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  19. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  20. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  21. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level Extract Hidden Message/Data

  22. Why Hard to Detect? Click to edit Master title style Evade current detection techniques • Click to edit Master text styles • UYR has no signature — Second level • No pattern or anomaly • Third level • No proof to correlate between the — Fourth level » Fifth level video + image used

  23. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  24. Click to edit Master title style References [1] http://tripwire.com/state-of-security/incident-detection/hackers- • Click to edit Master text styles exfiltrating-data-with-video-steganography-via-cloud-video- services/ — Second level [2] Youtube, Cisco, and Google Stats, http://jlbmedia.com/online- • Third level video-impact-2014 — Fourth level [3] https://www.youtube.com/watch?v=QfVVfB_UHeA » Fifth level [4] Twitter Stats, http://www.statisticbrain.com/twitter-statistics/ [5] UYR, https://github.com/Mariam118/UYR Ali Hadi @binaryz0ne Mariam Khader @MariamKhader118

  25. Click to edit Master title style Special Thanks Princess Sumaya University for Technology • Click to edit Master text styles (PSUT), our families, friends, — Second level security4arabs, and all those who • Third level supported us! — Fourth level » Fifth level

Recommend


More recommend