SlideShare a Scribd company logo
2
Most read
3
Most read
18
Most read
ADDRESSING DATA-HIDING TECHNIQUES
PRESENTED BY:- Muzamil amin
M.TECH CSE
SUBJECT:- Cyber Forensics
Data Hiding
 Data hiding involves changing or manipulating a file to
conceal information. Data-hiding techniques include hiding
entire partitions, changing file extensions, setting file
attributes to hidden, bit-shifting, using encryption, and setting
up password protection. Some of these techniques are
discussed in the following sections.
Data-hiding Techniques
 File manipulation
 Filenames and extensions
 Hidden property
 Disk manipulation
 Hidden partitions
 Bad clusters
 Encryption
 Bit shifting
 Steganography
Filenames and extensions
Example:
we will use a file with an extension of .jpg. The objective is to open this file in its native
application.
 As we can be seen above, we encountered an error. Now, a typical user
may say this file is corrupt and thus probably delete the file and move on.
While that may be acceptable for the regular user, a forensics analyst
would need to dig a little deeper.
 To dig a little deeper, our shovel will be HxD Hexeditor. A point to note is
that every file type has a header which can be used as a signature to
identify the type of file. Similarly some file types have known trailers,
which marks as the ending of the file. Considering this information, we can
use the Internet to our advantage to learn about file extensions. To
determine our actual file type we will rely on the work already done by
https://www.garykessler.net/library/file_sigs.html.
 Let’s open our file in Hx.
Filenames and extensions (continued)
Filenames and extensions (continued)
 If we compare the first 6 bytes “7B 5C 72 74 66 31” to one of the known
entries on garykessler.net, we can see that this file should have an
extension of .rtf. In addition, if we look at the trailer we see that within the
last 10 bytes, we have a 4 byte sequence “5C 70 61 72” that matches part
of the .rtf extension. Let’s focus on the header and change the file to .rtf
instead of .jpg.
 The file extension can be changed by either renaming the file in “Windows
Explorer” or by “ren securitynik.jpg securitynik.rtf” in the command
prompt.
Filenames and extensions (continued)
Hiding Partitions
 Delete references to a partition using a disk editor such as Norton
DiskEdit, this editor will delete any reference to it manually.
 Re-create links for accessing it.
 Use disk-partitioning utilities
 GDisk
 Partition Magic
 System Commander
 or Linux Grand Unified Bootloader (GRUB), which provides a startup
menu where you can select an OS. The system then ignores other
bootable partitions.
 Account for all disk space when analyzing a disk
 For example, in the following code, Disk Manager recognizes the extended
partition (labeled EXT DOS) as being 5381.1 MB (listed as Mbytes). The
LOG DOS labels for partitions E through F indicate that they’re logical
partitions that make up the extended partition. However, if you add the
sizes of drives E and F, the result is only 5271.3 MB, which is your first
clue to examine the disk more closely. The remaining 109.8 MB could be a
previously deleted partition or a hidden partition. For this example, the
following code shows the letter “H” to indicate a hidden partition.
Hiding Partitions (continued)
Hiding Partitions (continued)
In fig 1.1 you can see a hidden partition in Disk Manager, which
shows it as an unknown partition. In addition, the drive letters in the
visible partitions are nonconsecutive (drive I is skipped), which can be
another clue that a hidden partition exists. Most skilled users would
make sure this anomaly doesn’t occur, however.
Figure 1.1 Viewing a hidden partition in Disk Manager
Hiding Partitions (continued)
In ProDiscover, a hidden partition appears as the highest available drive letter set in the
BIOS. Figure 1.2 shows four partitions, similar to Figure 1,1, except the hidden
partition shows as the drive letter Z. To carve (or salvage) data from the recovered
partition gap, you can use other computer forensics tools, such as FTK or WinHex.
Figure 1.2 Viewing a hidden partition in ProDiscover
Marking Bad Clusters
 Common with FAT systems.
 Place sensitive information on free space.
 Use a disk editor to mark space as a bad cluster
 To mark a good cluster as bad using Norton Disk
Edit
 Type B in the FAT entry corresponding to that
cluster
Bit-shifting
 Old technique
 Shift bit patterns to alter byte values of data
 Make files look like binary executable code
 Tool
 Hex Workshop
Bit-shifting changes data from readable code to data that looks like binary
executable code. Hex Workshop includes a feature for shifting bits and altering
byte patterns of entire files or specified data. To shift bits in a text file, follow
these steps
Bit-shifting (continued)
1. Start Notepad, and in a text document, type TEST FILE. Test file is to see how
shifting bits will alter the data in a file.
2. Save the file as test file.txt in your work folder, and exit Notepad.
3. Start Hex Workshop. Click File, Open from the menu. Navigate to your work
folder, and then double-click test file.txt. Figure 3 shows the file open in Hex
Workshop
figure 3 test file.txt open in Hex Workshop
4. To set up Hex Workshop for the bit-shifting exercise, click Tools >> operations
from the menu.
5. In the Customize dialog box, click the Data Operations check box, and then click
OK.
6. Click the Shift Left button (<< icon) on the Data Operations toolbar. The Shift
Left Operation dialog box opens (see Figure 4), where you specify how you want to
treat the data, the ordering scheme to use for bytes, and whether you shift bits for
selected text or the entire file.
Figure 4 The Shift Left Operation dialog box
Bit-shifting (continued)
7. Click OK to accept the default settings and shift the bits in test file.txt to the left.
8. Save the file as Bit_shift_left.txt in your work folder. Figure 5 shows the file in
Hex Workshop, with the @ symbols indicating shifted bits.
Figure 5 Viewing the shifted bits
Bit-shifting (continued)
 9. To return the file to its original configuration, shift the bits back to the
right by clicking the Shift Right button (>> icon) on the Data Operations
toolbar. Click OK to accept the default settings in the Shift Right
Operation dialog box. The file is displayed in its original format.
 10. Save the file as Bit_shift_right.txt in your work folder, and leave Hex
Workshop open for the next activity
Bit-shifting (continued)
Using Steganography to Hide Data
 Greek for “hidden writing”
 Steganography tools were created to protect copy righted material
 By inserting digital watermarks into a file.
 EXAMPLE: to notify users that an image is copyrighted. The digital
watermarks used for steganography aren’t usually visible, however,
when you view the file in its usual application and might even be
difficult to find with a disk editor. A non steganographic graphics file is
the same size as an identical steganographic graphics file, and they
look the same when you examine them in a graphics viewing utility,
such as IrfanView. However, if you run an MD5 or SHA-1 hash
comparison on both files, you’ll find that the hash values aren’t equal.
EXAMPLE:
 To hide data, people can use steganography tools, many of which are
freeware or shareware, to insert information into a variety of files. If you
encrypt a plaintext file with PGP and insert the encrypted text into a
steganography file, for example, cracking the encrypted message is
extremely difficult. However, most steganography tools can insert only
small amounts of data into a file and usually require a password to restrict
access to the inserted data.
 Suspect can hide information on image or text document files.
 Very hard to spot without prior knowledge.
 Tools: S-Tools, DPEnvelope, jpgx, and tte
REFRENCES
 Text book: Guide to computer forensics and investigation by
BILL NELSON,AMELIA PHILLIPS,AND CHRISTOPHER STEUART.
Tools used
Hex Editor https://www.hhdsoftware.com/free-hex-editor
Hex Workshop Hex Editor (64 bit) http://www.hexworkshop.com/
data hiding techniques.ppt

More Related Content

PPTX
Data recovery tools
PDF
Computer Forensics Working with Windows and DOS Systems
PPTX
Computer forensics toolkit
PPTX
Forensic imaging
PDF
02 Types of Computer Forensics Technology - Notes
PPT
Data recovery
PPT
Windowsforensics
Data recovery tools
Computer Forensics Working with Windows and DOS Systems
Computer forensics toolkit
Forensic imaging
02 Types of Computer Forensics Technology - Notes
Data recovery
Windowsforensics

What's hot (20)

PPTX
Steganography
PDF
Data Hiding Techniques
PDF
CS6004 Cyber Forensics
PPTX
computer forensic tools-Hardware & Software tools
PPTX
SHA- Secure hashing algorithm
PPT
Communication primitives
PPTX
PPT steganography
PDF
Classical encryption techniques
PPT
Digital Forensic
PDF
PPTX
Database security
PPTX
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
PPTX
Seven step model of migration into the cloud
PPTX
Dm from databases perspective u 1
DOCX
S/MIME
PPTX
Network forensic
PPTX
Register allocation and assignment
PPTX
Digital watermarking
PDF
Ddb 1.6-design issues
PDF
Presentation On Steganography
Steganography
Data Hiding Techniques
CS6004 Cyber Forensics
computer forensic tools-Hardware & Software tools
SHA- Secure hashing algorithm
Communication primitives
PPT steganography
Classical encryption techniques
Digital Forensic
Database security
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
Seven step model of migration into the cloud
Dm from databases perspective u 1
S/MIME
Network forensic
Register allocation and assignment
Digital watermarking
Ddb 1.6-design issues
Presentation On Steganography
Ad

Similar to data hiding techniques.ppt (20)

PPT
Windows Forensics- Introduction and Analysis
PPTX
3170725_Unit-4.pptx
PPT
Cos413day3
PPT
CF_Unit5_WorkingWithWindowsAndDOS23052021.ppt
PPT
Working with Windows and DOS Systems (1).ppt
PPTX
Window xp slides
DOC
Tricks N Tips By Ravish Roshan
DOCX
Data hiding and finding on Linux
PPTX
Managing Files
PDF
AntiForensics - Leveraging OS and File System Artifacts.pdf
PDF
CS6004 Cyber Forensics - UNIT V
PPT
Working with Windows and DOS Systems.ppt
PDF
How to erase private data permanently
PPTX
Dark Data Hiding in your Records: Opportunity or Danger?
PPTX
20220621235219D5782_2 Key Technical Concepts[DONE].pptx
PDF
Digital Forensics
PPTX
Dark Data and Missing Evidence
PDF
Effective Data Erasure and Anti Forensics Techniques
PDF
Week7 homework.pptx
PPT
Computer Forensics Analysis and Validation.ppt
Windows Forensics- Introduction and Analysis
3170725_Unit-4.pptx
Cos413day3
CF_Unit5_WorkingWithWindowsAndDOS23052021.ppt
Working with Windows and DOS Systems (1).ppt
Window xp slides
Tricks N Tips By Ravish Roshan
Data hiding and finding on Linux
Managing Files
AntiForensics - Leveraging OS and File System Artifacts.pdf
CS6004 Cyber Forensics - UNIT V
Working with Windows and DOS Systems.ppt
How to erase private data permanently
Dark Data Hiding in your Records: Opportunity or Danger?
20220621235219D5782_2 Key Technical Concepts[DONE].pptx
Digital Forensics
Dark Data and Missing Evidence
Effective Data Erasure and Anti Forensics Techniques
Week7 homework.pptx
Computer Forensics Analysis and Validation.ppt
Ad

Recently uploaded (20)

PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
web development for engineering and engineering
PPTX
ANIMAL INTERVENTION WARNING SYSTEM (4).pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
anatomy of limbus and anterior chamber .pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
436813905-LNG-Process-Overview-Short.pptx
PPT
Project quality management in manufacturing
PPTX
Fluid Mechanics, Module 3: Basics of Fluid Mechanics
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Queuing formulas to evaluate throughputs and servers
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
“Next-Gen AI: Trends Reshaping Our World”
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Geodesy 1.pptx...............................................
PDF
BRKDCN-2613.pdf Cisco AI DC NVIDIA presentation
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
573137875-Attendance-Management-System-original
web development for engineering and engineering
ANIMAL INTERVENTION WARNING SYSTEM (4).pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
anatomy of limbus and anterior chamber .pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
436813905-LNG-Process-Overview-Short.pptx
Project quality management in manufacturing
Fluid Mechanics, Module 3: Basics of Fluid Mechanics
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Queuing formulas to evaluate throughputs and servers
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
“Next-Gen AI: Trends Reshaping Our World”
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Geodesy 1.pptx...............................................
BRKDCN-2613.pdf Cisco AI DC NVIDIA presentation
Model Code of Practice - Construction Work - 21102022 .pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT

data hiding techniques.ppt

  • 1. ADDRESSING DATA-HIDING TECHNIQUES PRESENTED BY:- Muzamil amin M.TECH CSE SUBJECT:- Cyber Forensics
  • 2. Data Hiding  Data hiding involves changing or manipulating a file to conceal information. Data-hiding techniques include hiding entire partitions, changing file extensions, setting file attributes to hidden, bit-shifting, using encryption, and setting up password protection. Some of these techniques are discussed in the following sections.
  • 3. Data-hiding Techniques  File manipulation  Filenames and extensions  Hidden property  Disk manipulation  Hidden partitions  Bad clusters  Encryption  Bit shifting  Steganography
  • 4. Filenames and extensions Example: we will use a file with an extension of .jpg. The objective is to open this file in its native application.
  • 5.  As we can be seen above, we encountered an error. Now, a typical user may say this file is corrupt and thus probably delete the file and move on. While that may be acceptable for the regular user, a forensics analyst would need to dig a little deeper.  To dig a little deeper, our shovel will be HxD Hexeditor. A point to note is that every file type has a header which can be used as a signature to identify the type of file. Similarly some file types have known trailers, which marks as the ending of the file. Considering this information, we can use the Internet to our advantage to learn about file extensions. To determine our actual file type we will rely on the work already done by https://www.garykessler.net/library/file_sigs.html.  Let’s open our file in Hx. Filenames and extensions (continued)
  • 7.  If we compare the first 6 bytes “7B 5C 72 74 66 31” to one of the known entries on garykessler.net, we can see that this file should have an extension of .rtf. In addition, if we look at the trailer we see that within the last 10 bytes, we have a 4 byte sequence “5C 70 61 72” that matches part of the .rtf extension. Let’s focus on the header and change the file to .rtf instead of .jpg.  The file extension can be changed by either renaming the file in “Windows Explorer” or by “ren securitynik.jpg securitynik.rtf” in the command prompt. Filenames and extensions (continued)
  • 8. Hiding Partitions  Delete references to a partition using a disk editor such as Norton DiskEdit, this editor will delete any reference to it manually.  Re-create links for accessing it.  Use disk-partitioning utilities  GDisk  Partition Magic  System Commander  or Linux Grand Unified Bootloader (GRUB), which provides a startup menu where you can select an OS. The system then ignores other bootable partitions.  Account for all disk space when analyzing a disk
  • 9.  For example, in the following code, Disk Manager recognizes the extended partition (labeled EXT DOS) as being 5381.1 MB (listed as Mbytes). The LOG DOS labels for partitions E through F indicate that they’re logical partitions that make up the extended partition. However, if you add the sizes of drives E and F, the result is only 5271.3 MB, which is your first clue to examine the disk more closely. The remaining 109.8 MB could be a previously deleted partition or a hidden partition. For this example, the following code shows the letter “H” to indicate a hidden partition. Hiding Partitions (continued)
  • 10. Hiding Partitions (continued) In fig 1.1 you can see a hidden partition in Disk Manager, which shows it as an unknown partition. In addition, the drive letters in the visible partitions are nonconsecutive (drive I is skipped), which can be another clue that a hidden partition exists. Most skilled users would make sure this anomaly doesn’t occur, however. Figure 1.1 Viewing a hidden partition in Disk Manager
  • 11. Hiding Partitions (continued) In ProDiscover, a hidden partition appears as the highest available drive letter set in the BIOS. Figure 1.2 shows four partitions, similar to Figure 1,1, except the hidden partition shows as the drive letter Z. To carve (or salvage) data from the recovered partition gap, you can use other computer forensics tools, such as FTK or WinHex. Figure 1.2 Viewing a hidden partition in ProDiscover
  • 12. Marking Bad Clusters  Common with FAT systems.  Place sensitive information on free space.  Use a disk editor to mark space as a bad cluster  To mark a good cluster as bad using Norton Disk Edit  Type B in the FAT entry corresponding to that cluster
  • 13. Bit-shifting  Old technique  Shift bit patterns to alter byte values of data  Make files look like binary executable code  Tool  Hex Workshop Bit-shifting changes data from readable code to data that looks like binary executable code. Hex Workshop includes a feature for shifting bits and altering byte patterns of entire files or specified data. To shift bits in a text file, follow these steps
  • 14. Bit-shifting (continued) 1. Start Notepad, and in a text document, type TEST FILE. Test file is to see how shifting bits will alter the data in a file. 2. Save the file as test file.txt in your work folder, and exit Notepad. 3. Start Hex Workshop. Click File, Open from the menu. Navigate to your work folder, and then double-click test file.txt. Figure 3 shows the file open in Hex Workshop figure 3 test file.txt open in Hex Workshop
  • 15. 4. To set up Hex Workshop for the bit-shifting exercise, click Tools >> operations from the menu. 5. In the Customize dialog box, click the Data Operations check box, and then click OK. 6. Click the Shift Left button (<< icon) on the Data Operations toolbar. The Shift Left Operation dialog box opens (see Figure 4), where you specify how you want to treat the data, the ordering scheme to use for bytes, and whether you shift bits for selected text or the entire file. Figure 4 The Shift Left Operation dialog box Bit-shifting (continued)
  • 16. 7. Click OK to accept the default settings and shift the bits in test file.txt to the left. 8. Save the file as Bit_shift_left.txt in your work folder. Figure 5 shows the file in Hex Workshop, with the @ symbols indicating shifted bits. Figure 5 Viewing the shifted bits Bit-shifting (continued)
  • 17.  9. To return the file to its original configuration, shift the bits back to the right by clicking the Shift Right button (>> icon) on the Data Operations toolbar. Click OK to accept the default settings in the Shift Right Operation dialog box. The file is displayed in its original format.  10. Save the file as Bit_shift_right.txt in your work folder, and leave Hex Workshop open for the next activity Bit-shifting (continued)
  • 18. Using Steganography to Hide Data  Greek for “hidden writing”  Steganography tools were created to protect copy righted material  By inserting digital watermarks into a file.  EXAMPLE: to notify users that an image is copyrighted. The digital watermarks used for steganography aren’t usually visible, however, when you view the file in its usual application and might even be difficult to find with a disk editor. A non steganographic graphics file is the same size as an identical steganographic graphics file, and they look the same when you examine them in a graphics viewing utility, such as IrfanView. However, if you run an MD5 or SHA-1 hash comparison on both files, you’ll find that the hash values aren’t equal.
  • 19. EXAMPLE:  To hide data, people can use steganography tools, many of which are freeware or shareware, to insert information into a variety of files. If you encrypt a plaintext file with PGP and insert the encrypted text into a steganography file, for example, cracking the encrypted message is extremely difficult. However, most steganography tools can insert only small amounts of data into a file and usually require a password to restrict access to the inserted data.  Suspect can hide information on image or text document files.  Very hard to spot without prior knowledge.  Tools: S-Tools, DPEnvelope, jpgx, and tte
  • 20. REFRENCES  Text book: Guide to computer forensics and investigation by BILL NELSON,AMELIA PHILLIPS,AND CHRISTOPHER STEUART. Tools used Hex Editor https://www.hhdsoftware.com/free-hex-editor Hex Workshop Hex Editor (64 bit) http://www.hexworkshop.com/