Verified Document

Alternate Data Stream Ads And Steganography Hiding Essay

Alternate Data Stream (ADS) and Steganography Hiding Techniques This paper provides a review of the relevant literature concerning alternate data stream (ADS) and steganography data-hiding techniques, including how users can utilize ADS to hide data and use them for destructive purposes and a discussion concerning rootkits and their use as alternative data-hiding techniques. Finally, a description of the processes and tools that can be used to detect steganographic applications is followed by a description of two steganography tools that can be used to hide data.

Explain how a user could utilize ADS to hide data and explain other destructive uses which exist for ADS. According to Vacca and Rudolph (2011), alternative data streams (ADSs) can be used in a number of different ways to hide data. In this regard, Vacca and Rudolph report that, "For example, kernel space filters such as kdl use ADS by attaching their log files to system files or directories" (p. 152). In addition, other methods used to hide data utilizing...

Parts of this document are hidden

View Full Document
svg-one

Using stream names such as encrypted, archive, or other common Windows terms;
2. Creating streams that have no extension identifier;

3. Creating streams attached to obscure system files for data dumps, log files, etc.;

4. Storing encrypted data in single streams or across multiple streams;

5. Storing binary data across multiple streams to be reassembled and executed at the time of use to avoid detection; and,

6. Storing device drivers as streams (Vacca & Rudolph, 2011, p. 152).

Besides hiding data, some ADS techniques are also destructive, including the following:

1. Flooding a guaranteed available critical space file with useless stream data to use all available disk space;

2. Attaching Trojans, worms, viruses, spyware and other malware as streams;

3. Embedding trade secrets in streamed files (Vacca & Rudolph, 2011, p. 152).

Determine how rootkits can…

Sources used in this document:
References

Gale, D. (2006, August). Can this virus be 'rooted' out? THE Journal, 33(13), 18-24.

Kessler, G.C. (2004, July). An overview of steganography for the computer forensics examiner.

Forensic Science Communications, 6(3), 37-41.

Vacca, R., & Rudolph, K. (2011). System forensics investigation & response (1st ed.). Sudbury,
Cite this Document:
Copy Bibliography Citation

Related Documents

Forensic Science in the 21st
Words: 778 Length: 2 Document Type: Essay

Therefore, the ability to determine facts in a case from very small particles of matter has proven to be of invaluable assistance in criminal investigation and procedure; for example, forensic analysis has been used successfully in many paternity cases. 3. Myths and realities There many misconceptions surrounding forensic science and especially CSI or Crime Scene Investigation. This is mainly due to the way that CSI has been portrayed in film and

Forensic Science and Technology
Words: 2146 Length: 8 Document Type: Research Paper

Forensics in Criminal Investigations Exploring the Use of Forensics in Criminal Investigations Forensic Science and Technology This paper explores the role of forensic science and technology in modern criminal investigations. It first examines the nature and role of physical evidence in regards to how it is uncovered, preserved, and analyzed within forensics today. Physical evidence is described in the varying types and categories. Then, the paper moves to evaluating different types of forensic

Forensic Science
Words: 512 Length: 2 Document Type: Essay

free construct entry, answering questions entry. In page respond watching video answer questions . Keep page. The page journal questions related a pdf file attached. There is much controversy with regard to forensics in the contemporary society, especially considering that the media world bombards the masses with information that is often false or that influences people to develop unrealistic expectations concerning this domain. People would have to understand that forensic

Forensic Science
Words: 1913 Length: 7 Document Type: Essay

Essay Topic Examples 1. The Evolution and Impact of DNA Analysis in Forensic Science This essay will explore the revolutionary introduction of DNA analysis in forensic investigations. It will trace the origins of DNA fingerprinting, delve into the technical advancements that have made DNA evidence a linchpin in legal outcomes, and discuss the societal and ethical implications of such powerful technology. This topic will also highlight the role of DNA analysis in

Forensic Science
Words: 2405 Length: 8 Document Type: Term Paper

Fingerprints put forward a dependable way of individual identification. That is the vital method for the law enforcing agencies having displaced other means of determining the identities of criminals unwilling to confess preceding crime records. Additional individual distinctiveness modifies with the passage of time, however, fingerprints do not (James, 22). In prior nations and societies, trade marking, as well as even defacement were employed to spot the criminal for what he

Forensic Science and Government
Words: 1767 Length: 13 Document Type: Term Paper

Forensic Sciences in the USA and the United Kingdom Over the last two decades, the forensic science has assisted in producing valuable evidence that has contributed to a successful conviction and prosecution of criminals and exoneration of innocent citizens. Typically, an advanced in forensic science and DNA technology have been a great assistance for law enforcement agency for an identification and prosecution of criminals. In the United States and the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now