[PDF] [PDF] Hiding in the Familiar: Steganography and Vulnerabilities - HubSpot

WinRAR– www rarlab com ▫ 7ZIP- RAR format ships with a free decompressor library (SDK) The 7Zip format is now supported by many software utilities :



Previous PDF Next PDF





[PDF] Winrar Crack Free Download 32 Bitl - WordPresscom

Download winrar, Winrar 64 bit, Download winrar 5 90 free, Download winrar 5 71 Winrar is free software, it is not as free as some other 7zip compression



[PDF] winrar GmbH

Of course, as always, the upgrade to 3 40 is absolutely free for all registered users Upgrading Users only need to download and install the newest version of WinRAR to WinRAR is able to decompress archives created by 7-Zip ( 7z files)



[PDF] Winrar extractor free - Mozello User Files

People can use WinRAR on Windows 10, XP, Vista 7, 8 and 9 Is there is a free version You can download 7-zip sources and dia files from the Download page



[PDF] WinRAR archiver, a powerful tool to process RAR and ZIP files

13 jui 2006 · Font Tools Password Manager Password Recovery Printers Tools Website Tools Software Directories DVD Video MP3 Audio Graphics



[PDF] 155-31: Reading Compressed Text Files Using SAS - SAS Support

All the SAS code used here has been tested with Windows XP SP2 and SAS 8 2 Winrar etc , and others, free to use like 7Zip distributed under the GNU Library



[PDF] Installation - Kirk Hunter Studios

and NOT the free player version Therefore, there By defaualt, you will need to download the rar files manually IMPORTANT: For Windows OS (Using WinRar) If you have Once you've installed 7-Zip, right-click the first rar file Choose



[PDF] Diamond Installation - Mac (Using UnRarX) - Kirk Hunter Studios

"Free Download Manager" as long as you are running OS 10 9 WinRar will then prompt you: Once you've installed 7-Zip, right-click the first rar file Choose 



[PDF] Winrar Password Breaker Free Download - Heroku

Free Rar Password Unlocker - Free software designed to recover forgotten passwords for WinRar, WinZip, or 7Zip archives Download Appnimi RAR Password 



[PDF] Hiding in the Familiar: Steganography and Vulnerabilities - HubSpot

WinRAR– www rarlab com ▫ 7ZIP- RAR format ships with a free decompressor library (SDK) The 7Zip format is now supported by many software utilities :

[PDF] 7zip vs winrar speed

[PDF] 7zip vs winrar vs winzip

[PDF] 8 000 btu air conditioner

[PDF] 8 1 multiplying and dividing rational expressions

[PDF] 8 1 practice geometry

[PDF] 8 1 skills practice geometric mean

[PDF] 8 1 skills practice multiplying and dividing rational expressions

[PDF] 8 1 skills practice multiplying and dividing rational expressions answer key

[PDF] 8 1 skills practice multiplying and dividing rational expressions answers

[PDF] 8 1 skills practice multiplying and dividing rational expressions answers with work

[PDF] 8 1 skills practice multiplying and dividing rational expressions page 7

[PDF] 8 1 skills practice multiplying and dividing rational expressions with work

[PDF] 8 1 study guide and intervention angles of polygons

[PDF] 8 1 study guide and intervention answer key

[PDF] 8 1 study guide and intervention functions

HIDING IN THE FAMILIAR:

STEGANOGRAPHYAND VULNERABILITIES IN POPULAR

ARCHIVES FORMATS

Mario Vuksan, TomislavPericin& Brian Karney

BlackHatEurope 2010, Barcelona

Agenda

ƒIntroduction to steganographyin archives

àSteganographyimplications

àVulnerability implications

ƒDemonstrations

àQuick and dirty hex editing

ŻHide text and file data

ŻInvent our own file format

ƒIntroduction to NyxEngine

concealedwriting.dz

Steganography

Steganography

SteganographyHistory

ƒAncient Fascination

ƒRumours& Conspiracies

àFrom Pearl Harbor to Al-Qaida & eBay

ƒ2008 arrest

àBritish Muslim, RangziebAhmed used invisible ink to write down Al-Qaida telephone directory

ƒDifference is in the purpose

àMalicious Uses

ŻPrivate communication for illicit purposes, so-called Stego

àLegitimate Uses

ŻWatermarking, DRM, Movies (CAP ȂCoded Anti-Piracy),

Medical Images Tracking

Malicious Angle on Stego

ƒTypes

àMessages

àImages

àMedia Files

ƒOpen source projects

ƒ600+ different tools

ƒPrivate/commissioned tools

ƒObscurity is power

ƒDetection

àStegoTool discovery

àBrute Force

Reality

ƒ7Š› ...ƒǯ- ™‡ ˆ‹† ƒ› ‰‘‘† •-‘"‹‡• ƒ"‘—-

stegoin the wild? àIt could be due to the fact it really is not that prevalent in the wild àIt could be that analysts are not really looking so they never find it

àThat most media based approaches have many

weakness and make it hard to hide large amounts of data. àThat the best method to identify stegois to find the tools based off of Hashes

New Paradigms for Forensics

ƒTraditional Steganography

àTypical stegois thought of embedding data into media files (audio files, JPG, BMP, GIF, PNG )

ƒNew paradigm for Stego: Shift away from

media

àto archive files (zip,cab..)

àother approaches such as SFS (StegoFile System)

àOther novel approaches

Investigating Stegoin Archives

ƒWhy it is relevant from an investigative

perspective? àEasier way to hide larger payloads in plain sight

àNot easy to identify using existing methods

Żblind anomaly-based approach

Żimage analysis using image filters

Żaudio analyzer

ŻSignature analysis (substitution)

àUsing hashes to identify tools is pointless

àMakes you always question what is inside the archive

UnixWindows

Archive formats

ƒMost common file formats found in every Microsoft

Windows, Unix and Mac OS system

File formats are not bindedto operating system

ZIP file format

ƒMost common archive file format in use today

ƒThe format was originally created in 1986by Phil Katz for PKZIP ƒFormat is fully documented by PKWARE (32k line text file) ƒThe PKZIP format is now supported by many software utilities : àMicrosoft Windows has included built-in ZIP support àWinZIP(most popular ZIP archiverprogram) Ȃwww.winzip.com

àPowerArchiver-www.powerarchiver.com

àWinRARȂwww.rarlab.com

à7ZIP-www.7-zip.org

ƒFormat supports:

àError recovery, multi-disk spanning, encryption and SFX àMultiple compression algorithms in use (DEFLATE)

RAR file format

ƒVery popular archive file format

ƒThe format was as developed by Eugene Roshal

ƒFormat is partially documented by developer (TechNote) ƒThe RAR format is now supported by many software utilities : àRAR format ships with a free decompressorlibrary (SDK)

àWinRARȂwww.rarlab.com

àWinZIPȂwww.winzip.com

àPowerArchiver-www.powerarchiver.com

à7ZIP-www.7-zip.org

ƒFormat supports:

àError recovery, multi-disk spanning, encryption and SFX

àCompression algorithms basedon LZand PPMd

CAB file format

ƒCommon installer file format (rarely used by users) ƒCAB is the Microsoft Windows native compressed archive format ƒFormat is fully documented by Microsoft (20 page PDF) ƒThe cabinet format is now supported by many software utilities : àMicrosoft Windows has included built-in CAB support àPowerArchiver(can compress) -www.powerarchiver.com

àWinZIPȂwww.winzip.com

àWinRARȂwww.rarlab.com

à7ZIP-www.7-zip.org

ƒFormat supports:

àMulti-disk spanning, digital signing and SFX

àUses LZX, DEFLATE, Quantum and MsZIPcompression

7Zip file format

ƒVery common archive file format used today

ƒThe format was created in 2000 and is developed by Igor Pavlov ƒFormat processor is free and open source (LGPL license) ƒFormat is fully documented by developer (series of text files) ƒThe 7Zip format is now supported by many software utilities :

à7ZIP-www.7-zip.org

àWinZIPȂwww.winzip.com

àPowerArchiver-www.powerarchiver.com

àWinRARȂwww.rarlab.com

ƒFormat supports:

àMulti-disk spanning, encryption and SFX

GZipfile format

ƒMost common archive file format in use today (on Unix) ƒGzipwas created by Jean-Loup Gaillyand Mark Adler in 1992 ƒFormat is fully documented in RFC 1952 (few pages from 1996) ƒThe Gzipformat is now supported by many software utilities : àWinZIP(most popular ZIP archiverprogram) Ȃwww.winzip.com

àPowerArchiver-www.powerarchiver.com

àWinRARȂwww.rarlab.com

à7ZIP-www.7-zip.org

ƒFormat supports:

àSingle file compression (commonly used with TAR)

àUses DEFLATE compression algorithm

File format malformations

ƒAll files present on any system are binary files

ƒMalformation goals:

àSteganography

ŻHide file(s) or any other message from view

ŻSteganographyprocess must be reversible

àVulnerability exploiting

Hex Editor

File format malformations

ƒMalformation is achieved by:

àIn-depth knowledge of file format specification

àLoose use of file format specification

àUsage of rarely used file fields

àTry-and-error method

ƒSteganographyis achieved by:

àAll of the above

àInjecting data

0"‡˜‹‘—• ™‘"i

ƒArchive malformation tests

àLast set of tests performed in 2004 by iDefense

ŻImplications:

compression/decompression software (including WinZip) incorrectly handles compressed files with deliberately damaged header fields, thus, in-fact, allowing creation of the damaged archive files, that could be automatically -ESET

ReversingLabs|Testing

ƒReversingLabsarchive inspection tests:

1.File format identification

ŻOptimization: Fastest and most accurate methods

2.File format validation

ŻPackage validation: Archive data corruption

ŻVulnerabilities

3.Steganography

ŻInteresting data detection

ŻData self-destruction?

ReversingLabs|Results

ƒReversingLabsarchive inspection test results:

àSteganographystandpoint:

ŻMultiple ways to hide file(s) and data in all formats

àVulnerability standpoint:

ŻHigh probability of malware detection evasion

x15 reported vulnerabilities (more pending)

Low impact on

protected endpoints

Archive steganography|ZIP

ƒSteganographyis achieved by:

àCompressed file name modification (NULL byte)

àChanges to internal ZIP structures

ŻNumber of packed files decrementing

ŻData camouflage by extra fields utilization

ŻMoving the central directory

ŻInjecting data

Archive steganography|ZIP

ƒSteganographyimplications:

àData can be hidden in ZIP archives

àData can also be hidden in OOXML file format

àData self-destruction:

ŻSteganographydata can be removedby user actions

Archive steganography|ZIP

ƒSteganographyimplementations:

àZipped Steganographyby CorinnaJohn (CPOL)

ŻCan hide multiple files which are stored before central dir

ŻCan encrypt the hidden files with a password

àZJMaskby Vincent Chu (freeware)

ŻCan hide only one file and it is pre-pended to the archive

ŻCan encrypt the hidden file with a password

Archive vulnerabilities|ZIP

ƒDiscovered vulnerabilities:

àRLC_VSA_001 ȂExtensive header modification

ŻVulnerability:

ŻImplication:

Archive vulnerabilities|ZIP

ƒDiscovered vulnerabilities:

àRLC_VSA_002 ȂPassword only for the first file

ŻImplication:

assuming that the whole archive was password protected

Archive vulnerabilities|ZIP

ƒDiscovered vulnerabilities:

àRLC_VSA_006 ȂZIP appended to ZIP SFX

ŻVulnerability:

ŻImplication:

Archive vulnerabilities|ZIP

ƒDiscovered vulnerabilities:

àRLC_VSA_011 ȂUtilization of extra field

ŻVulnerability:

ŻImplication:

extra fields in the central ZIP directory

Archive vulnerabilities|ZIP

ƒDiscovered vulnerabilities:

àRLC_VSA_012 ȂFake ZIP64 archive

ŻVulnerability:

xZip64 End of central directory record structure xZip64 End of central directory locator structure

ŻImplications:

by the vendor

Archive vulnerabilities|ZIP

ƒDiscovered vulnerabilities:

ŻVulnerability:

via local ZIP directory data

ŻImplications:

generic scanners failed to detect local ZIP directory

Archive vulnerabilities|ZIP

ƒDiscovered vulnerabilities:

àRLC_VSA_014 ȂUtilization of FileCommentfield

ŻVulnerability:

ŻImplication:

extra comment field in the central ZIP directory

Archive vulnerabilities|ZIP

ƒDiscovered vulnerabilities:

àRLC_VSA_015 ȂBad compression algorithm

ŻVulnerability:

added by any archiverprogram other than WinZIP

ŻImplications:

the unsupported compression algorithm was found

Archive vulnerabilities|RAR

ƒDiscovered vulnerabilities:

àRLC_VSA_003 ȂHEAD_FLAGS tampering

ŻVulnerability:

ŻImplications:

files whose first block was a temporary block write protected. Adding files to such archive corrupts it.

Archive vulnerabilities|RAR

ƒDiscovered vulnerabilities:

àRLC_VSA_005 ȂPassword only for the first file

ŻImplication:

assuming that the whole archive was password protected

Archive vulnerabilities|RAR

ƒDiscovered vulnerabilities:

àRLC_VSA_008 ȂBad extract version requirements

ŻVulnerability:

ŻImplications:

meet

Archive vulnerabilities|CAB

ƒDiscovered vulnerabilities:

àRLC_VSA_004 ȂIncorrect decompressed size

ŻVulnerability:

some scanners

ŻImplications:

as some scanners tried to allocate the whole 4GB file first. Some skipped over the file due to its size.

Archive vulnerabilities|GZIP

ƒDiscovered vulnerabilities:

àRLC_VSA_007 ȂAdding documented extra fields

ŻVulnerability:

ŻImplications:

data and skipped the file inspection

Archive vulnerabilities|7Zip

ƒDiscovered vulnerabilities:

àRLC_VSA_009 ȂIncorrect start header CRC

ŻVulnerability:

ŻImplications:

header checksum

Archive vulnerabilities|7Zip

ƒDiscovered vulnerabilities:

àRLC_VSA_010 ȂNull out first header block

ŻVulnerability:

xStartHeaderCRC, NextHeaderOffset, NextHeaderSizeand

NextHeaderCRCto NULL

ŻImplications:

format valid archive header

Test|Conclusions

ƒReversingLabsarchive inspection test conclusions:

1.Files could still be malformed to carry hidden payload

2.Malformed files can be automatically fixed which

making them valid on endpoint PCs

4.Content hidden by steganographyprinciples can have

a self-destruct button

DEMO|Steganography

ƒDemonstration #1:

àHex editing:

ŻHiding existing file(s) inside ZIP archive

ŻInserting hidden message into ZIP archive

ŻInventing file formats

àTool:

ŻZIPInsider

NyxEngine

NyxEngine|Introduction

ƒIntroduction to the NyxEngine

àWho is Nyx?

àWhat does it do?

ŻDoes archive pre-processing

ŻInspects archive for viable hidden data

ŻRecovers broken and/or hidden files

ŻActs like an exploit shield

àHow can I use it?

ŻNyxis a free library and it comes with its SDK

ŻNyxConsole, example of SDK implementation

ŻPluginfor TotalCommanderand PowerArchiver

NyxEngine|Functionality

ƒNyxEnginefunctional groups:

àArchive identification

ŻSupports: ZIP, RAR, CAB and GZIP

àPacked content browsing

ŻTransverse the packed content one file at the time

ŻRetrieve information about packed content

ŻExtract selected file slice

àArchive validation

ŻChecks if the archive is corrupted beyond recovering

àArchive inspection

ŻSearch for steganographycontent

àRecover salvageable corrupted content

NyxEngine|Exploitshield

ƒNyxEngineexploit shield

àArchive pre-processing protects from:

ŻStored file name length and content

ŻSuspicious compression ratio (archive bombs)

ŻExtract algorithm requirements

ŻChecksum tampering

ŻMulti-disk tampering

ŻFile entry duplication

àDescription & ReversingLabsVSA for every exploit

NyxEngine|DEMO

ƒNyxEnginedemo

àNyxConsoletested on ReversingLabsVSA

àNyxConsoletested on ZIP steganosolutions

àNyxEnginecorrupted file recovery

Questions?

(What Would You Like to Know)quotesdbs_dbs5.pdfusesText_10