uyr
play

UYR Second level Third level Under Your Radar Fourth level Fifth - PowerPoint PPT Presentation

Click to edit Master title style Click to edit Master text styles UYR Second level Third level Under Your Radar Fourth level Fifth level Covert Channel & Exfiltration Ali Hadi / Mariam Khader Princess Sumaya


  1. Click to edit Master title style • Click to edit Master text styles “UYR” — Second level • Third level Under Your Radar — Fourth level » Fifth level Covert Channel & Exfiltration Ali Hadi / Mariam Khader Princess Sumaya University for Technology (PSUT) Amman/Jordan

  2. Click to edit Master title style Outline • Click to edit Master text styles • Intro — Second level • What • Third level • Usage — Fourth level • Idea » Fifth level • How it Works • Why Under Radar • Action 

  3. Click to edit Master title style Quick Intro. • Steganography • Click to edit Master text styles – Hiding the existence of the data — Second level • Third level • Covert Channel — Fourth level – Unseen “secret” communication » Fifth level • Exfiltration (aka Exfil ) – Illegal retrieval of data from a compromised computer

  4. Click to edit Master title style • Click to edit Master text styles — Second level Why Social Networks • Third level — Fourth level & Multimedia? » Fifth level

  5. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  6. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  7. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  8. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  9. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  10. Hackers Exfiltrating Data with Video Click to edit Master title style Steganography via Cloud Video Services [1] • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level KEN WESTIN @TripeWire

  11. Click to edit Master title style What: UYR? • Click to edit Master text styles • New application layer covert channel and exfil system — Second level • Applies multimedia stego techniques • Third level — Fourth level • Hard for Radars to detect what’s being sent » Fifth level

  12. Click to edit Master title style Usages? • Click to edit Master text styles • Covert Communications — Second level • Exfiltrating Data • Third level — Fourth level » Fifth level

  13. Click to edit Master title style Idea? • Click to edit Master text styles • No real data is transmitted! — Second level • Only data transmitted is a bunch of • Third level numbers (key)! — Fourth level » Fifth level

  14. Click to edit Master title style • Click to edit Master text styles — Second level • Third level How it works? — Fourth level » Fifth level

  15. Click to edit Master title style Protocol Agreements • Click to edit Master text styles • Social Media Used — Second level • Video Used • Third level — Fourth level » Fifth level

  16. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  17. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  18. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  19. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  20. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  21. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level Extract Hidden Message/Data

  22. Why Hard to Detect? Click to edit Master title style Evade current detection techniques • Click to edit Master text styles • UYR has no signature — Second level • No pattern or anomaly • Third level • No proof to correlate between the — Fourth level » Fifth level video + image used

  23. Click to edit Master title style • Click to edit Master text styles — Second level • Third level — Fourth level » Fifth level

  24. Click to edit Master title style References [1] http://tripwire.com/state-of-security/incident-detection/hackers- • Click to edit Master text styles exfiltrating-data-with-video-steganography-via-cloud-video- services/ — Second level [2] Youtube, Cisco, and Google Stats, http://jlbmedia.com/online- • Third level video-impact-2014 — Fourth level [3] https://www.youtube.com/watch?v=QfVVfB_UHeA » Fifth level [4] Twitter Stats, http://www.statisticbrain.com/twitter-statistics/ [5] UYR, https://github.com/Mariam118/UYR Ali Hadi @binaryz0ne Mariam Khader @MariamKhader118

  25. Click to edit Master title style Special Thanks Princess Sumaya University for Technology • Click to edit Master text styles (PSUT), our families, friends, — Second level security4arabs, and all those who • Third level supported us! — Fourth level » Fifth level

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend