SlideShare a Scribd company logo
1 of 15
Covert
Channels:A Window of Data Exfiltration Opportunities
Joel Oseiga Aleburu
CONTENTS OF THIS TALK
Here’s how this talk would go:
1. About the speaker
2. Basic Preamble Information
3. What are covert channels
4. How Covert Channels work (With a Demo)
5. Known Implementations
6. How to Detect
7. Questions
What I do
IT Security Architect
Education
Msc. Cyber Security- University ofYork
Bsc. Computer Science- Bowen
Interests
Critical Systems, SCADA
NSA and Cyber Warfare
Other Stuff
Small Towns, Skydiving, Small
planes and Fast cars 
This is my first talk ever
02
01
04
03
About The Speaker
Covert Channels
• Clever misuse of legitimate, existing
channel
• Easy to design and nearly
undetectable
• Perfect for patient long term data
exfiltration
• Not a commonly used technique
• Bypass security or policy by
compromised/malicious computer
processes
• Evade Surveillance
• Bypass Communication
• Etc.
Prisoner’s Dilemma
How can Prisoner A and B plan their escape with the cop in the middle
without getting caught if they are always allowed to talk to each other?
Preamble Information
Cryptography MetaferographySteganography
Make message
unreadable
Hide the message in
the career
Hide the message in
another message
Key type of data hiding:
Definition: Communicate information
between two computer processes
that are not allowed to communicate
by hiding information into shared
resources
Find a good covert channel:
Find where random data is transmitted
naturally
- Ex. Initial sequence numbers, complex
timing of network transmissions
- `Replace random data with your own
‘random data’ which is an encrypted
message
An Example
Alice wants to send a
message to Bob
Alice FTPs Bob some old
vacation pictures,
meanwhile Bob records all
traffic
Alice encodes the secret
message byte by byte in the
padding of TCP segment
headers
Bob looks at padding of
recorded traffic
Classification
Data modulated into the timing or
occurrence of events, e.g., the times
between network packets
Data transmitted by writing or
abstaining from writing e.g to a ram
Timing ChannelStorage Channel
Other types in research:
• Temperature based Covert
Channels
• Hybrid Covert Channels
Classification: Shared Resouces
RAM, HardDisk, CPU, etcExisting, legitimate communication
channel designed for a purpose
Computer resourceNetwork resource:
Resource here:
Timing
- E. g., Packet Timing
Storage
- E.g., packet headers
Encryption vs Covert?
- Big Red flags for the cop with
encryption
“Are you okay? My stomach aches badly.
The food was not good”
*345!
Network Protocol
Network Protocol: Mutual understanding between sender and receiver. Sender sends structured info,
receiver interprets
Header
Data
Trailer (optional)
*Firewallls snd IDS focus mainly on data
Storage: encode in packet
Timing: Delay packet
DEMO
• Store information within TCP header
• Program: Covert_tcp
• Wireshark
• Local machine
Appearance in Pop Culture
Most popular- Exfiltrate
from protected network
Some Botnets use
protocol channels to
shealthily communicate
to C&C.
Eg. Turnelling tcp traffic
over ICMP using ptunnel
proxy
Enterprise Data
Exfiltration
Botnets, backdoors
and reverse shells
Firewall Bypass
Detection and Mitigation
To identify packet
signatures of common
types
Analyzing packet
variation size, header size
variation and bandwith
use vs time of day
Eg. Turnelling tcp traffic
over ICMP using ptunnel
proxy
IDS Packet Signatures
Traffic Anomaly
Detction
Firewall Bypass
Detection and Mitigation
Most popular- Exfiltrate
from protected network
Some Botnets use
protocol channels to
shealthily communicate
to C&C.
Eg. Turnelling tcp traffic
over ICMP using ptunnel
proxy
Enterprise Data
Exfiltration
Botnets, backdoors
and reverse shells
Firewall Bypass
CREDITS: This presentation template was created by Slidesgo,
including icons by Flaticon, and infographics & images by Freepik.
THANKS!
Do you have any questions?
joel@smarttech247.com
Please keep this slide for attribution.

More Related Content

What's hot

Application Security
Application SecurityApplication Security
Application Securityflorinc
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomwareJawhar Ali
 
Most Asked Java Interview Question and Answer
Most Asked Java Interview Question and AnswerMost Asked Java Interview Question and Answer
Most Asked Java Interview Question and AnswerTOPS Technologies
 
VTU Design and Analysis of Algorithms(DAA) Lab Manual by Nithin, VVCE, Mysuru...
VTU Design and Analysis of Algorithms(DAA) Lab Manual by Nithin, VVCE, Mysuru...VTU Design and Analysis of Algorithms(DAA) Lab Manual by Nithin, VVCE, Mysuru...
VTU Design and Analysis of Algorithms(DAA) Lab Manual by Nithin, VVCE, Mysuru...Nithin Kumar,VVCE, Mysuru
 
Java byte code presentation
Java byte code presentationJava byte code presentation
Java byte code presentationMahnoor Hashmi
 
CSE Final Year Project Presentation on Android Application
CSE Final Year Project Presentation on Android ApplicationCSE Final Year Project Presentation on Android Application
CSE Final Year Project Presentation on Android ApplicationAhammad Karim
 
Advanced Java Practical File
Advanced Java Practical FileAdvanced Java Practical File
Advanced Java Practical FileSoumya Behera
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAchovatiyabhautik
 
Architecture of .net framework
Architecture of .net frameworkArchitecture of .net framework
Architecture of .net frameworkThen Murugeshwari
 
Java Strings Tutorial | String Manipulation in Java | Java Tutorial For Begin...
Java Strings Tutorial | String Manipulation in Java | Java Tutorial For Begin...Java Strings Tutorial | String Manipulation in Java | Java Tutorial For Begin...
Java Strings Tutorial | String Manipulation in Java | Java Tutorial For Begin...Edureka!
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptxSharmilaMore5
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-MalwareArpit Mittal
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 

What's hot (20)

Application Security
Application SecurityApplication Security
Application Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
 
Most Asked Java Interview Question and Answer
Most Asked Java Interview Question and AnswerMost Asked Java Interview Question and Answer
Most Asked Java Interview Question and Answer
 
Java lab-manual
Java lab-manualJava lab-manual
Java lab-manual
 
VTU Design and Analysis of Algorithms(DAA) Lab Manual by Nithin, VVCE, Mysuru...
VTU Design and Analysis of Algorithms(DAA) Lab Manual by Nithin, VVCE, Mysuru...VTU Design and Analysis of Algorithms(DAA) Lab Manual by Nithin, VVCE, Mysuru...
VTU Design and Analysis of Algorithms(DAA) Lab Manual by Nithin, VVCE, Mysuru...
 
Java byte code presentation
Java byte code presentationJava byte code presentation
Java byte code presentation
 
Java I/o streams
Java I/o streamsJava I/o streams
Java I/o streams
 
CSE Final Year Project Presentation on Android Application
CSE Final Year Project Presentation on Android ApplicationCSE Final Year Project Presentation on Android Application
CSE Final Year Project Presentation on Android Application
 
Advanced Java Practical File
Advanced Java Practical FileAdvanced Java Practical File
Advanced Java Practical File
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
 
Architecture of .net framework
Architecture of .net frameworkArchitecture of .net framework
Architecture of .net framework
 
Java Strings Tutorial | String Manipulation in Java | Java Tutorial For Begin...
Java Strings Tutorial | String Manipulation in Java | Java Tutorial For Begin...Java Strings Tutorial | String Manipulation in Java | Java Tutorial For Begin...
Java Strings Tutorial | String Manipulation in Java | Java Tutorial For Begin...
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
Steganography
SteganographySteganography
Steganography
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Spr ch-02
Spr ch-02Spr ch-02
Spr ch-02
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 

Similar to Covert channels: A Window of Data Exfiltration Opportunities

Raphel 1 . A covert channel is a communication channel that vio.docx
Raphel 1 .  A covert channel is a communication channel that vio.docxRaphel 1 .  A covert channel is a communication channel that vio.docx
Raphel 1 . A covert channel is a communication channel that vio.docxcatheryncouper
 
Dist sniffing & scanning project
Dist sniffing & scanning projectDist sniffing & scanning project
Dist sniffing & scanning projectRishu Seth
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7FRSecure
 
Keyboard covert channels
Keyboard covert channelsKeyboard covert channels
Keyboard covert channelsFreeman Zhang
 
Network Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptxNetwork Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptxSazidHossain9
 
Data Communication & Networking Basics
Data Communication & Networking BasicsData Communication & Networking Basics
Data Communication & Networking BasicsMahbub Alam Masud
 
NPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfNPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfMr. Moms
 
Cyber Analytics Applications for Data-Intensive Computing
Cyber Analytics Applications for Data-Intensive ComputingCyber Analytics Applications for Data-Intensive Computing
Cyber Analytics Applications for Data-Intensive ComputingMike Fisk
 
COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3Soon Zoo Kwon
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systemsmitali.ray
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisGTKlondike
 

Similar to Covert channels: A Window of Data Exfiltration Opportunities (20)

WEEK-01.pdf
WEEK-01.pdfWEEK-01.pdf
WEEK-01.pdf
 
Raphel 1 . A covert channel is a communication channel that vio.docx
Raphel 1 .  A covert channel is a communication channel that vio.docxRaphel 1 .  A covert channel is a communication channel that vio.docx
Raphel 1 . A covert channel is a communication channel that vio.docx
 
Dist sniffing & scanning project
Dist sniffing & scanning projectDist sniffing & scanning project
Dist sniffing & scanning project
 
Quality of information
Quality of informationQuality of information
Quality of information
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
Keyboard covert channels
Keyboard covert channelsKeyboard covert channels
Keyboard covert channels
 
Modules1
Modules1Modules1
Modules1
 
Network Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptxNetwork Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptx
 
Firewall Defense against Covert Channels
Firewall Defense against Covert Channels Firewall Defense against Covert Channels
Firewall Defense against Covert Channels
 
Combuter term3 new
Combuter term3 newCombuter term3 new
Combuter term3 new
 
Data Communication & Networking Basics
Data Communication & Networking BasicsData Communication & Networking Basics
Data Communication & Networking Basics
 
NPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfNPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdf
 
Cyber Analytics Applications for Data-Intensive Computing
Cyber Analytics Applications for Data-Intensive ComputingCyber Analytics Applications for Data-Intensive Computing
Cyber Analytics Applications for Data-Intensive Computing
 
COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysis
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Covert channels: A Window of Data Exfiltration Opportunities

  • 1. Covert Channels:A Window of Data Exfiltration Opportunities Joel Oseiga Aleburu
  • 2. CONTENTS OF THIS TALK Here’s how this talk would go: 1. About the speaker 2. Basic Preamble Information 3. What are covert channels 4. How Covert Channels work (With a Demo) 5. Known Implementations 6. How to Detect 7. Questions
  • 3. What I do IT Security Architect Education Msc. Cyber Security- University ofYork Bsc. Computer Science- Bowen Interests Critical Systems, SCADA NSA and Cyber Warfare Other Stuff Small Towns, Skydiving, Small planes and Fast cars  This is my first talk ever 02 01 04 03 About The Speaker
  • 4. Covert Channels • Clever misuse of legitimate, existing channel • Easy to design and nearly undetectable • Perfect for patient long term data exfiltration • Not a commonly used technique • Bypass security or policy by compromised/malicious computer processes • Evade Surveillance • Bypass Communication • Etc.
  • 5. Prisoner’s Dilemma How can Prisoner A and B plan their escape with the cop in the middle without getting caught if they are always allowed to talk to each other?
  • 6. Preamble Information Cryptography MetaferographySteganography Make message unreadable Hide the message in the career Hide the message in another message Key type of data hiding: Definition: Communicate information between two computer processes that are not allowed to communicate by hiding information into shared resources Find a good covert channel: Find where random data is transmitted naturally - Ex. Initial sequence numbers, complex timing of network transmissions - `Replace random data with your own ‘random data’ which is an encrypted message
  • 7. An Example Alice wants to send a message to Bob Alice FTPs Bob some old vacation pictures, meanwhile Bob records all traffic Alice encodes the secret message byte by byte in the padding of TCP segment headers Bob looks at padding of recorded traffic
  • 8. Classification Data modulated into the timing or occurrence of events, e.g., the times between network packets Data transmitted by writing or abstaining from writing e.g to a ram Timing ChannelStorage Channel Other types in research: • Temperature based Covert Channels • Hybrid Covert Channels
  • 9. Classification: Shared Resouces RAM, HardDisk, CPU, etcExisting, legitimate communication channel designed for a purpose Computer resourceNetwork resource: Resource here: Timing - E. g., Packet Timing Storage - E.g., packet headers Encryption vs Covert? - Big Red flags for the cop with encryption “Are you okay? My stomach aches badly. The food was not good” *345!
  • 10. Network Protocol Network Protocol: Mutual understanding between sender and receiver. Sender sends structured info, receiver interprets Header Data Trailer (optional) *Firewallls snd IDS focus mainly on data Storage: encode in packet Timing: Delay packet
  • 11. DEMO • Store information within TCP header • Program: Covert_tcp • Wireshark • Local machine
  • 12. Appearance in Pop Culture Most popular- Exfiltrate from protected network Some Botnets use protocol channels to shealthily communicate to C&C. Eg. Turnelling tcp traffic over ICMP using ptunnel proxy Enterprise Data Exfiltration Botnets, backdoors and reverse shells Firewall Bypass
  • 13. Detection and Mitigation To identify packet signatures of common types Analyzing packet variation size, header size variation and bandwith use vs time of day Eg. Turnelling tcp traffic over ICMP using ptunnel proxy IDS Packet Signatures Traffic Anomaly Detction Firewall Bypass
  • 14. Detection and Mitigation Most popular- Exfiltrate from protected network Some Botnets use protocol channels to shealthily communicate to C&C. Eg. Turnelling tcp traffic over ICMP using ptunnel proxy Enterprise Data Exfiltration Botnets, backdoors and reverse shells Firewall Bypass
  • 15. CREDITS: This presentation template was created by Slidesgo, including icons by Flaticon, and infographics & images by Freepik. THANKS! Do you have any questions? joel@smarttech247.com Please keep this slide for attribution.

Editor's Notes

  1. Two prisoners locked in two near-by cells are planning their escape. They are allowed to talk with each other, but there’s a jailer who can hear their conversation. Talking with each other is the only way of communication between the two of them, but they need to be careful. If the jailer senses that they are planning for something, he might move them to distant cells, which will jeopardize their escape plan. How can the prisoners plan their escape without making the jailer suspicious?
  2. Covert channels are not new. Hiding a secret message within a message is a concept that has existed for hundreds of year. In computer network CCs, message hiding relies not on shared complex algorithms or keys to keep the message safe, but pure security through obscurity. It is fundamental to recognize this difference between covert communications and encrypted communications. In the latter, the data stream is ideally unintelligible and irretrievable by an unauthorized party but encrypted communications don’t hide the fact that a communication took place. It is this shortcoming which CCs address; how does one send a message, or exfiltrate data from a secure network, without detection? As this presentation will outline, there are nearly infinite ways to implement CCs, which makes the technique a formidable one to detect and defend against.
  3. Let’s say that the prisoners decided to transform their conversation using a secret code, which the jailer is unaware of. This is called “Encryption” in general. In this case, only the two prisoners can translate the transformed messages back to the original because only those two know the secret code used to transform the messages. But, even though the jailer cannot understand the conversation, the inability to understand the conversation could easily make him suspicious. Therefore, Encryption is not the solution for the prisoners’ problem. Finding a solution to the prisoners’ problem introduces a new way of secret communication called Covert Channels. The goal of a covert channel is to provide communication between two parties in an unusual way so that an intermediate party can hardly notice that there’s such communication. For example, a covert channel between the two prisoners could be that the number of words in a sentence serves as the actual information to be passed. e.g: The prisoners can successfully pass the message “345” by using 3 irrelevant sentences as follows. “Are you okay? I feel like sleeping. The food was not good.” Are you okay? => 3 I feel like sleeping => 4 The food was not good=> 5 This is a primitive example for a covert channel. But the most important fact is, both entities in the covert channel should understand how it works in order to successfully pass messages.
  4. A network protocol is basically a contract between a sender and a receiver, where the sender sends structured information in a format that can be interpreted by the receiver. This ‘structure’ of the information is defined as the ‘network packet’ structure. A packet mainly consists of 3 parts which are called the header, data, and an optional trailer. Firewalls and Intrusion Detection Systems (IDS) are particularly interested in the data section of a packet as it carries the actual payload of the transmission.tion is defined as the ‘network packet’ structure. Storage Channels — Storage Covert channels encode covert data in the packets themselves (encoded in headers as I mentioned before) Timing (temporal) Channels —Delay between the packets is used to transmit data. Timing channels are not as reliable as storage channels and are mostly research-oriented. Therefore, during the rest of the article, we’ll be discussing storage covert channels.
  5. Use Cases of Protocol Channels Enterprise Data Exfiltration — The most popular use case of covert channels is to exfiltrate confidential data out of a protected network. Bypassing Firewalls to access forbidden content — Covert Channels can also be used to access forbidden content otherwise forbidden by a firewall. An example is tunneling TCP traffic over ICMP using a ptunnel proxy as described at the end of this article. Botnet Communications, Remote Backdoors, and Reverse Shells — Some Botnets use protocol channels in order to stealthily communicate with their command and control (C&C) centers. Also, remote backdoors or reverse shells can also use covert channels to download additional malicious scripts without detection
  6. Covert Channels can be used with good intent, as well as malicious intent. Therefore, identifying and blocking them is also equally important. Though it is very hard to identify and 100% block covert channels, there are certain ways to make it difficult to set up covert channels. IDS Packet Signatures— Configuring Intrusion Detection Systems with rules to identify the packet signatures of the common types of covert channels. Traffic Anomaly Detection — Mostly research-oriented. For example, analyzing packet size variation, header size variation and bandwidth usage vs time of the day can lead to discovering unusual network activities. Active Warden (Wendzel, Steffen & Keller, Jörg. (2012). Design and Implementation of an Active Warden Addressing Protocol Switching Covert Channels) — A firewall-like service which randomly delays packets if protocol switching is detected, making it hard to establish reliable covert communication. This is useful to prevent protocol switching covert channels. Packet Data Padding — Intercepting and padding packet header fields which are likely to be used for covert communication. Still, though, it’s difficult to 100% prevent covert channels without disrupting the legitimate traffic. There’s so much research work done in this area and new types of covert channels and protection mechanisms are invented from time to time.
  7. Use Cases of Protocol Channels Enterprise Data Exfiltration — The most popular use case of covert channels is to exfiltrate confidential data out of a protected network. Bypassing Firewalls to access forbidden content — Covert Channels can also be used to access forbidden content otherwise forbidden by a firewall. An example is tunneling TCP traffic over ICMP using a ptunnel proxy as described at the end of this article. Botnet Communications, Remote Backdoors, and Reverse Shells — Some Botnets use protocol channels in order to stealthily communicate with their command and control (C&C) centers. Also, remote backdoors or reverse shells can also use covert channels to download additional malicious scripts without detection