Click to edit Master title style • Click to edit Master text styles “UYR” — Second level • Third level Under Your Radar — Fourth level » Fifth level Covert Channel & Exfiltration Ali Hadi / Mariam Khader Princess Sumaya University for Technology (PSUT) Amman/Jordan
Click to edit Master title style Outline • Click to edit Master text styles • Intro — Second level • What • Third level • Usage — Fourth level • Idea » Fifth level • How it Works • Why Under Radar • Action
Click to edit Master title style Quick Intro. • Steganography • Click to edit Master text styles – Hiding the existence of the data — Second level • Third level • Covert Channel — Fourth level – Unseen “secret” communication » Fifth level • Exfiltration (aka Exfil ) – Illegal retrieval of data from a compromised computer
Click to edit Master title style • Click to edit Master text styles — Second level Why Social Networks • Third level — Fourth level & Multimedia? » Fifth level
Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level
Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level
Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level
Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level
Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level
Hackers Exfiltrating Data with Video Click to edit Master title style Steganography via Cloud Video Services [1] • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level KEN WESTIN @TripeWire
Click to edit Master title style What: UYR? • Click to edit Master text styles • New application layer covert channel and exfil system — Second level • Applies multimedia stego techniques • Third level — Fourth level • Hard for Radars to detect what’s being sent » Fifth level
Click to edit Master title style Usages? • Click to edit Master text styles • Covert Communications — Second level • Exfiltrating Data • Third level — Fourth level » Fifth level
Click to edit Master title style Idea? • Click to edit Master text styles • No real data is transmitted! — Second level • Only data transmitted is a bunch of • Third level numbers (key)! — Fourth level » Fifth level
Click to edit Master title style • Click to edit Master text styles — Second level • Third level How it works? — Fourth level » Fifth level
Click to edit Master title style Protocol Agreements • Click to edit Master text styles • Social Media Used — Second level • Video Used • Third level — Fourth level » Fifth level
Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level
Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level
Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level
Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level
Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level
Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level Extract Hidden Message/Data
Why Hard to Detect? Click to edit Master title style Evade current detection techniques • Click to edit Master text styles • UYR has no signature — Second level • No pattern or anomaly • Third level • No proof to correlate between the — Fourth level » Fifth level video + image used
Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level
Click to edit Master title style References [1] http://tripwire.com/state-of-security/incident-detection/hackers- • Click to edit Master text styles exfiltrating-data-with-video-steganography-via-cloud-video- services/ — Second level [2] Youtube, Cisco, and Google Stats, http://jlbmedia.com/online- • Third level video-impact-2014 — Fourth level [3] https://www.youtube.com/watch?v=QfVVfB_UHeA » Fifth level [4] Twitter Stats, http://www.statisticbrain.com/twitter-statistics/ [5] UYR, https://github.com/Mariam118/UYR Ali Hadi @binaryz0ne Mariam Khader @MariamKhader118
Click to edit Master title style Special Thanks Princess Sumaya University for Technology • Click to edit Master text styles (PSUT), our families, friends, — Second level security4arabs, and all those who • Third level supported us! — Fourth level » Fifth level
Recommend
More recommend