Alternate Data Stream Ads And Steganography Hiding Essay

PAGES
2
WORDS
587
Cite

Alternate Data Stream (ADS) and Steganography Hiding Techniques This paper provides a review of the relevant literature concerning alternate data stream (ADS) and steganography data-hiding techniques, including how users can utilize ADS to hide data and use them for destructive purposes and a discussion concerning rootkits and their use as alternative data-hiding techniques. Finally, a description of the processes and tools that can be used to detect steganographic applications is followed by a description of two steganography tools that can be used to hide data.

Explain how a user could utilize ADS to hide data and explain other destructive uses which exist for ADS. According to Vacca and Rudolph (2011), alternative data streams (ADSs) can be used in a number of different ways to hide data. In this regard, Vacca and Rudolph report that, "For example, kernel space filters such as kdl use ADS by attaching their log files to system files or directories" (p. 152). In addition, other methods used to hide data utilizing...

...

Using stream names such as encrypted, archive, or other common Windows terms;
2. Creating streams that have no extension identifier;

3. Creating streams attached to obscure system files for data dumps, log files, etc.;

4. Storing encrypted data in single streams or across multiple streams;

5. Storing binary data across multiple streams to be reassembled and executed at the time of use to avoid detection; and,

6. Storing device drivers as streams (Vacca & Rudolph, 2011, p. 152).

Besides hiding data, some ADS techniques are also destructive, including the following:

1. Flooding a guaranteed available critical space file with useless stream data to use all available disk space;

2. Attaching Trojans, worms, viruses, spyware and other malware as streams;

3. Embedding trade secrets in streamed files (Vacca & Rudolph, 2011, p. 152).

Determine how rootkits can…

Sources Used in Documents:

References

Gale, D. (2006, August). Can this virus be 'rooted' out? THE Journal, 33(13), 18-24.

Kessler, G.C. (2004, July). An overview of steganography for the computer forensics examiner.

Forensic Science Communications, 6(3), 37-41.

Vacca, R., & Rudolph, K. (2011). System forensics investigation & response (1st ed.). Sudbury,


Cite this Document:

"Alternate Data Stream Ads And Steganography Hiding" (2013, August 24) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/alternate-data-stream-ads-and-steganography-95073

"Alternate Data Stream Ads And Steganography Hiding" 24 August 2013. Web.26 April. 2024. <
https://www.paperdue.com/essay/alternate-data-stream-ads-and-steganography-95073>

"Alternate Data Stream Ads And Steganography Hiding", 24 August 2013, Accessed.26 April. 2024,
https://www.paperdue.com/essay/alternate-data-stream-ads-and-steganography-95073

Related Documents

Therefore, the ability to determine facts in a case from very small particles of matter has proven to be of invaluable assistance in criminal investigation and procedure; for example, forensic analysis has been used successfully in many paternity cases. 3. Myths and realities There many misconceptions surrounding forensic science and especially CSI or Crime Scene Investigation. This is mainly due to the way that CSI has been portrayed in film and

Forensics in Criminal Investigations Exploring the Use of Forensics in Criminal Investigations Forensic Science and Technology This paper explores the role of forensic science and technology in modern criminal investigations. It first examines the nature and role of physical evidence in regards to how it is uncovered, preserved, and analyzed within forensics today. Physical evidence is described in the varying types and categories. Then, the paper moves to evaluating different types of forensic

Forensic Science
PAGES 2 WORDS 512

free construct entry, answering questions entry. In page respond watching video answer questions . Keep page. The page journal questions related a pdf file attached. There is much controversy with regard to forensics in the contemporary society, especially considering that the media world bombards the masses with information that is often false or that influences people to develop unrealistic expectations concerning this domain. People would have to understand that forensic

Forensic Science
PAGES 8 WORDS 2405

Fingerprints put forward a dependable way of individual identification. That is the vital method for the law enforcing agencies having displaced other means of determining the identities of criminals unwilling to confess preceding crime records. Additional individual distinctiveness modifies with the passage of time, however, fingerprints do not (James, 22). In prior nations and societies, trade marking, as well as even defacement were employed to spot the criminal for what he

Forensic Sciences in the USA and the United Kingdom Over the last two decades, the forensic science has assisted in producing valuable evidence that has contributed to a successful conviction and prosecution of criminals and exoneration of innocent citizens. Typically, an advanced in forensic science and DNA technology have been a great assistance for law enforcement agency for an identification and prosecution of criminals. In the United States and the

Forensic Science Since its introduction in the 8th century by Chinese authorities who used fingerprints to identify the authenticity of clay sculptures and documents (Forensic science history, 2016), modern forensic science has experienced a number of trends that have fundamentally changed the manner in which practitioners use technology to investigate crime scenes to provide courts of competent jurisdiction with the information they need to formulate decisions concerning guilt and innocence.