Description: This this video professor Bill Buchanan Introduce Security And Network Forensics.
== Data Hiding And Obfuscation ==
* Outline Obfuscation methods.
* Define methods used to encode data in order to hide the original content
* Understand Encryption Methods used to hide data and possible methods to overcome this obfuscation.
* Define How file types can be discovered.
== Abstract/Description ==
4 DATA HIDING AND OBFUSCATION
4.1 Objectives
4.2 Introduction
4.3 Obfuscation using Encryption
Private-key data hiding
Public-key data hiding
Hashing
Encoding
Ex-OR encoding
Coding
4.4 Obfuscation through tunneling
4.5 Covert channels
IP and TCP data hiding
4.6 Watermarking and Stenography
4.7 Hiding File contents
File contents
4.7.1 GIF files
4.7.2 JPEG file format
4.7.3 ZIP file format
Slide :- http://researchrepository.napier.ac.uk/4149/3/unit04.pdf
Tags: security , talk , network , encryption ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Fantastic .. I love that Hashing, Hiding File, And Encoding part. Great !!!
great video. please continue.