 Data Storage  Steganography  Phishing.  How are files stored?  Each file is assigned one or more sectors in the disk.  If the file is small enough,

Slides:



Advertisements
Similar presentations
The Internet.
Advertisements

Introduction to Web Design Lecture number:. Todays Aim: Introduction to Web-designing and how its done. Modelling websites in HTML.
1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Web Programming 1 Darby Chang Web Programming. Cookie 2 Web Programming.
WEBNP Telecom Invoice Retrieval TEX-AN Customer User Guide.
Grade 6 Hopewell Elementary You will read each slide, then try to think of the answer. When you think you know the answer, click ONCE on the mouse.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Services Course Windows Live SkyDrive Participant Guide.
Sterling Heights Public Library Agenda n We’ll learn how to “clean up” the computers n We’ll review how SLC’s mail system works n We’ll review SpamLion.
 2008 Pearson Education, Inc. All rights reserved Web Browser Basics: Internet Explorer and Firefox.
Chapter 16 The World Wide Web.
Lecture 6/2/12. Forms and PHP The PHP $_GET and $_POST variables are used to retrieve information from forms, like user input When dealing with HTML forms.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
CPSC 203 Introduction to Computers Tutorial 59 & 64 By Jie (Jeff) Gao.
6/10/2015Cookies1 What are Cookies? 6/10/2015Cookies2 How did they do that?
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Steganography Rayan Ghamri.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
1 The World Wide Web. 2  Web Fundamentals  Pages are defined by the Hypertext Markup Language (HTML) and contain text, graphics, audio, video and software.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
CMP 101 INTRODUCTION TO THE INTERNET L02. Internet Unit A.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Christopher M. Pascucci Basic Structural Concepts of.NET Browser – Server Interaction.
PowerPoint Presentation to Accompany GO! with Internet Explorer 9 Getting Started Chapter 3 Exploring the World Wide Web with Internet Explorer 9.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Computer Concepts 2014 Chapter 7 The Web and .
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
Chapter 16 The World Wide Web. 2 Chapter Goals Compare and contrast the Internet and the World Wide Web Describe general Web processing Write basic HTML.
Chapter 16 The World Wide Web. 2 The Web An infrastructure of information combined and the network software used to access it Web page A document that.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
TERMS TO KNOW. Desktop This does not mean a computer desktop vs. a laptop. You probably keep a number of commonly used items on your desk at home such.
1 Chapter 2 & Chapter 4 §Browsers. 2 Terms §Software §Program §Application.
Internet Vocabulary 1-21 State Test Vocabulary. Address address, Internet address, and web address. A code or series of letters numbers and/or.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
CSE 154 LECTURE 12: COOKIES. Including files: include include("filename"); PHP include("header.html"); include("shared-code.php"); PHP inserts the entire.
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
Internet Browsing the world. Browse Internet Course contents Overview: Browsing the world Lesson 1: Internet Explorer Lesson 2: Save a link for future.
Chapter 3 (HW02) Exploring the World Wide Web with Internet Explorer 9.
Introduction to HTML. What is a HTML File?  HTML stands for Hyper Text Markup Language  An HTML file is a text file containing small markup tags  The.
Follow the Data Data (and information) move from place to place in computer systems and networks. As it moves it changes form frequently. This story describes.
CPSC 203 Introduction to Computers Lab 23 By Jie Gao.
Chapter 8 Cookies And Security JavaScript, Third Edition.
Courtesy of Professors Chris Clifton & Matt Bishop INFSCI 2935: Introduction of Computer Security1 Nov 1, 2005 Computer Forensics (Lab 2 Related)
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Web Database Programming Week 7 Session Management & Authentication.
Cookies and Sessions IDIA 618 Fall 2014 Bridget M. Blodgett.
© 2010 Computer Science Faculty, Kabul University HTTP CONTINUED… 4 TH LECTURE 2, May, 2010 Baseer Ahmad Baheer.
ASP.Net, Web Forms and Web Controls 1 Outline Session Tracking Cookies Session Tracking with HttpSessionState.
ASP. What is ASP? ASP stands for Active Server Pages ASP is a Microsoft Technology ASP is a program that runs inside IIS IIS stands for Internet Information.
XP Browser and Basics COM111 Introduction to Computer Applications.
1 State and Session Management HTTP is a stateless protocol – it has no memory of prior connections and cannot distinguish one request from another. The.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
The Internet What is the Internet? The Internet is a lot of computers over the whole world connected together so that they can share information. It.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Computer Basics Introduction CIS 109 Columbia College.
Web Programming Language
Tonga Institute of Higher Education IT 141: Information Systems
CSE 154 Lecture 20: Cookies.
Chapter 8 Browsing and Searching the Web
Evolution of Internet.
INTERNET.
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Tonga Institute of Higher Education IT 141: Information Systems
Tonga Institute of Higher Education IT 141: Information Systems
CSc 337 Lecture 27: Cookies.
Cross Site Request Forgery (CSRF)
CSc 337 Lecture 25: Cookies.
Presentation transcript:

 Data Storage  Steganography  Phishing

 How are files stored?  Each file is assigned one or more sectors in the disk.  If the file is small enough, not all the sector will be used.  The unused space is called a Slack space  We can save information there using a special editor.

 How do you know that the data you stored hasn’t been modified?  Hash functions  What is a hash function?  Is a function with an special algorithm that finds a value given a file.  Each file has a unique hash value.  Even small changes in a file can generate totally different hash values.

 First get the hash values: Hash value original file Hash value modified file

 Now let’s open the modified file:

Entire phrase:

 Try to make other changes (possibly random) to the file and save the file with another name, but retaining the extension.  Can you execute the new file? Explain why or why not?  Close all windows. 

 Each byte represents a shade red, blue or green.  Random changes to the least priority bit generally produce only slight changes of shade Resulting Shade

 Go to desktop/Exercises/3.0 Steganography/  Double-click on the “Jphswin.exe”  Hide data into “jpeg” file.  Click on Open Jpeg on the menu bar and open the file “KaalBhairava.jpg” in “data” sub-folder.  Create a text file “input.txt” with some text in the “data” folder.  Click on Hide on the menu bar and give a password of your choice as prompted. Then, as prompted, point to the file “input.txt” that you intend to hide.  Lastly, use save jpge as to save the image as “hidden.jpg” in the “data” sub-folder. The message text in “input.txt” has been hidden in the jpeg image file “hidden.jpg”.

 Close all open files and the JPHS application.  Retrieve the hidden message from the “jpeg” file.  Open the file “hidden.jpg” using the Steganography tool “Jphswin.exe”.  Click on Seek on the menu bar. Then, as prompted, save the file as hidden “output.txt” into the “data” folder.

 Hide messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of  Security through obscurity  What other types of files can be used?  Documents, images, audio files… Hide relatively small amount of data in other data files that are significantly larger  What is it useful for?  Send secret messages  Watermarking products for proprietary issues

 PRESIDENT'S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT IMMENSELY.  Can you find the hidden message?  PERSHING SAILS FROM NY JUNE I.

INFSCI 2935: Introduction to Computer Security16 Example of Steganography (Text – page 48) Dear George, Greetings to all at Oxford. Many thanks for your letter and for the summer examination package. All entry forms and fees forms should be ready for final dispatch to the syndicate by Friday 20 th or at the latest I am told by the 21 st. Admin has improved here though there is room for improvement still; just give us all two or three more years and we will really show you! Please don’t let these wretched 16+ proposals destroy your basic O and A pattern. Certainly this sort of change, if implemented immediately, would bring chaos. Sincerely yours, your your package package ready ready Friday Friday 21 st. 21 st. room room three three Please Please destroy destroy this thisimmediately

 Please go to: 

 “Phishing messages are designed to steal your identity. They ask for personal data, or direct you to Web sites or phone numbers to call where they ask you to provide personal data” [1].  Steps:  Gain your trust  Ask for personal information

 Logos that look real  They may use information learnt in social networks  They may seem to come from someone you trust

In Firefox if you step over the address, you’ll see the real URL. Like here:

 If the web page is trusted by your browser, you’ll see something like this:  Firefox:  In Internet Explorer:  Are these two fine? ▪ ▪

 What are browsing cookies?  HTTP is stateless ▪ Each HTTP request and response are treated in isolation ▪ Hard for web servers to determine their state with the client they are serving  Cookies are used to maintain state information ▪ Authentication ▪ Session tracking ▪ Storing site preferences ▪ Shopping cart contents ▪ Identifier for a server-based session

Now you can see what the owner was looking at: TYPEURLMODIFIED TIMEACCESS TIMEFILENAMEDIRECTORYHTTP HEADERS

 Cookies can be used as spyware  Track internet users' web browsing habits  Web pages visited  Order Time

 A small graphic on a web page that allows sites to track user activities  How they work?  Typically 1 pixel X 1 Pixel images that cannot be seen  The image is loaded by a page from Site X  The image itself comes from Site Y  Site X and Site Y now have exchanged information about the user’s web activities  E.g. : “Alice has visited msnbc.com and has gone to the sports page” ---> SupplyAds.com ----> Ad for NBA gear  Use tools like Bugnosis for IE to detect web bugs

ERASING COOKIES PRIVATE BROWSING

Thank you

1. shing/symptoms.aspx shing/symptoms.aspx Some of the examples were taken from: 1. s/phishing.htm s/phishing.htm 2. ng_example3.gif ng_example3.gif

 age.htm age.htm