nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Perspective

n|u - The Open Security Community
n|u - The Open Security Communityn|u - The Open Security Community
Steganography & Stegananalysis: A Technical & Psychological Perspective ,[object Object],[object Object],nullcon Goa 2010 http://nullcon.net There are only 10 kind of people in the world Those who understand binary and those who dont
The Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Steganogrphy The art of data hiding in carrier files ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Essentials before we begin ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The process ,[object Object],[object Object],[object Object]
Section 1 ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Pixel: The building block of Image
BMP files ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GrayscaleImages with colour palettes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RGB colour images with colour palette ,[object Object],[object Object],[object Object]
24 bit BMP image with the palette ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Section 2 ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Bitmap image ,[object Object],BMP File Header Stores general information about the BMP file. Bitmap Information  (DIB header) Stores detailed information about the bitmap image. Color Palette Stores the definition of the colors being used for indexed color bitmaps. (At times not needed) Bitmap Data Stores the actual image, pixel by pixel.
The BMP header This is intel Processor  so Use little Endian system
The DIB header Offset # Size Purpose Eh 4 the size of this header (40 bytes) 12h 4 the bitmap width in pixels  16h 4 the bitmap height in pixels. 1Ah 2 the number of color planes being used. Must be set to 1. 1Ch 2 the number of bits per pixel, which is the color depth of the image. Typical values are 1, 4, 8, 16, 24 and 32. 1Eh 4 the compression method being used.  22h 4 the image size. This is the size of the raw bitmap data , and should not be confused with the file size. 26h 4 the horizontal resolution of the image. (pixel per meter, signed integer) 2Ah 4 the vertical resolution of the image. (pixel per meter, signed integer) 2Eh 4 the number of colors in the color palette, or 0 to default to 2 n . 32h 4 the number of important colors used, or 0 when every color is important; generally ignored.
With the structure ready its time to fill the pixels in the image ,[object Object],Pixel No Red value Green Value Blue Value Colour of pixel 1 8B=139 87 = 135 A0=160 2 8D=141 89=137 A2=162 3 8F=143  8B=139 A4=164 .. .. .. .. n C6=198 F7=247 FF=255
The JPEG File Format ,[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
JPEG File structure (JFIF) nullcon Goa 2010 http://nullcon.net Source: Wikipedia Bytes Payload Name Comments 0xFFD8 none Start Of Image 0xFFC0 variable  Start Of Frame (Baseline DCT) Indicates that this is a baseline DCT-based JPEG, and specifies the width, height, number of components, and component subsampling (e.g., 4:2:0). 0xFFC2 variable  Start Of Frame (Progressive DCT) Indicates that this is a progressive DCT-based JPEG, and specifies the width, height, number of components, and component subsampling (e.g., 4:2:0). 0xFFC4 variable  Huffman Table(s) Specifies one or more Huffman tables. 0xFFDB variable  Quantization Table(s) Specifies one or more quantization tables. 0xFFDD 2 bytes Define Restart Interval Specifies the interval between RST n  markers, in macroblocks. This marker is followed by two bytes indicating the fixed size so it can be treated like any other variable size segment. 0xFFDA variable  Start Of Scan Begins a top-to-bottom scan of the image. In baseline DCT JPEG images, there is generally a single scan. Progressive DCT JPEG images usually contain multiple scans. This marker specifies which slice of data it will contain, and is immediately followed by entropy-coded data. 0xFFD0 … 0xFFD7 none Restart Inserted every  r  macroblocks, where  r  is the restart interval set by a DRI marker. Not used if there was no DRI marker. The low 3 bits of the marker code, cycles from 0 to 7. 0xFFE n variable  Application-specific For example, an  Exif  JPEG file uses an APP1 marker to store metadata, laid out in a structure based closely on  TIFF . 0xFFFE variable  Comment Contains a text comment. 0xFFD9 none End Of Image
The Compression Process nullcon Goa 2010 http://nullcon.net Colour space transformation from RGB to YCbCr (Optional) Down Sampling (4:4:4 or 4:2:2 or 4:2:0) (Optional) Block Splitting (8X8, 16 X8 or 16X16) Discrete Cosine transform Quantization Entropy Coding Final JPEG image data Results in higher values at top left of the matrix and a lot of low value at the bottom right The division table resulting in actual compression with lot of zero values at the bottom right corner Arranging the values in zig zag manner to get all the zero values at the end. Thus using a single byte to represent them Data hiding in LSB’s here
The JPEG Compression at work nullcon Goa 2010 http://nullcon.net DCT 8 X 8 Pixel data for one component e.g “Y” Averaged out matrix DCT Coefficients of the block
Cont…. nullcon Goa 2010 http://nullcon.net Round off quantized DCT Coefficients DCT Coefficients of the block Quantization table
Cont…. nullcon Goa 2010 http://nullcon.net -26, -3, 0, -3, -2, -6, 2, -4, 1, -4, 1, 1, 5, 1, 2, -1, 1, -12, 0, 0, 0, 0, 0, -1, -1, EOB Round off quantized DCT Coefficients Zig-Zag  arrangement of binaries Finally compressed block
GIF image ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Steganography techniques ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net Section 3
Appending data at the end of the file ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Inserting data in comment or junk field ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Data hiding with LSB ,[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Concept of LSB ,[object Object],01111111 10111111 11011111 11101111 11110111 11111011 11111101 11111110 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data hiding with LSB ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Image date in hex before hiding data Image date in Binary before hiding data Image date in Binary after hiding data Image date in hex after hiding data
Palette manipulation ,[object Object],nullcon Goa 2010 http://nullcon.net
[object Object],Palette manipulation nullcon Goa 2010 http://nullcon.net ,[object Object],[object Object],A better variation can be not using the exact colour but using the near approximation of that colour
Data Hiding strategies ,[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Section 4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
LSB Enhancement File: test.bmp  (Contains no hidden data) File: test1.bmp  (Contains hidden data)
Launch an LSB enhancement attack (Replacing all the bits in every byte with the LSB of that Byte) ,[object Object],[object Object],[object Object],[object Object]
Explanation ,[object Object],[object Object],[object Object]
Why this pattern emerge  (Nature of the ASCII ) Char Decimal Binary Hex a 97 011 00001  61  b 98 011 00010  62  c 99 011 00011  63  d 100 011 00100  64  e 101 011 00101  65  f 102 011 00110  66  g 103 011 00111  67  h 104 011 01000  68  I 105 011 01001  69  j 106 011 01010  6A  k 107 011 01011  6B  l 108 011 01100  6C  m 109 011 01101  6D  Char Decimal Binary Hex n 110 011 01110  6E  o 111 011 01111  6F  p 112 011 10000  70  q 113 011 10001  71  r 114 011 10010  72  s 115 011 10011  73  t 116 011 10100  74  u 117 011 10101  75  v 118 011 10110  76  w 119 011 10111  77  x 120 011 11000  78  y 121 011 11001  79  z 122 011 11010  7A
Data encryption  (The new challenge that defeats LSB enhancement attack) ,[object Object],[object Object],[object Object],[object Object]
Same text with various encryption and LSB enhanced images Text encrypted as ASCII Text encrypted as Binary with IDEA encryption  (S-Tools) Image with no data hidden
Which is the better option for hiding the data 1 2 3 4
Take a break and look at this Image nullcon Goa 2010 http://nullcon.net
Chi square test ,[object Object],[object Object]
How chi square works in steganalysis ,[object Object],[object Object],[object Object],[object Object],[object Object]
Lets see the chi square result of the images shown
Chi square with encrypted data in pure black image ,[object Object],[object Object]
Cracking the algorithm Jsteg ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Camouflage ,[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Other Methods ,[object Object],nullcon Goa 2010 http://nullcon.net File with no Hidden data File with Hidden data
Other methods ,[object Object],nullcon Goa 2010 http://nullcon.net With no data hidden it was compressed to 98.4% with Winrar With 5 MB of data hidden the file could not  achieve any compression with winrar If the hidden data is more than the file size in JPEG the compression will be close to 0
Other methods ,[object Object],nullcon Goa 2010 http://nullcon.net Plain white BMP image of 1.42 MB was compressed to 2 kb with winrar Plain white BMP image of 1.42 MB with 18 KB of hidden data was compressed to 48 kb with winrar Extremely colorful image  of 2.25 MB without any data hidden was compressed to 43.5% with winrar Extremely colorful image  of 2.25 MB with 500 KB of hidden datwithout any data hidden was compressed to 46.8% with winrar
Other Methods ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Other Methods ,[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Check these palettes nullcon Goa 2010 http://nullcon.net Palette of complete black image original Palette of complete black image as changed by S-tools after hiding the data
Check these palettes nullcon Goa 2010 http://nullcon.net Original Palette of image with Black red and a custom colour Palette as changed by S-tools
Other Methods and tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Few Steganalysis tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Section 5 Beyond Technology Dr. Reena Bhansali Prince Komal Boonlia
Peeping in Expressions Body Language  Micro expressions
Body Language
[object Object],[object Object],[object Object],[object Object],[object Object],Is it important
[object Object],[object Object],[object Object]
Deception A successful or unsuccessful deliberate attempt without forewarning, to create in another  belief which the communicator considers to be untrue. Deception involves acting in such a way which leads another person to believe something, that you, yourself, do not believe to be true (Ekman, Miller and Stiff).  If you have nothing to hide, why not tell the complete truth?
Non verbal Behavior and deception Emotions  Content Complexity Attempted Control Behaviour
Emotions Telling lie evokes emotions undergo Guilt, Fear, Duping Delight Liars might feel guilty because they are lying, might be afraid of getting caught, or might be excited about having the opportunity to fool someone The strength of these emotions depends on the personality of the liar and on the circumstances under which the lie takes place Guilt might results in gaze aversion Fear and Excitement might result in signs of arousal, limb movements, speech fillers, speech errors, facial emotional expressions or a high pitched voice.
Content Complexity ,[object Object],[object Object],[object Object]
Attempted Behavioral Control Liars are busy in Impression Management Convincing others requires suppressing nerves effectively, masking evidence of heightened cognitive load, knowledge of how an honest person normally behaves and ability to show the behavior. Usually they tend to over control themselves, resulting in behavior that looks rehearsed and rigid and speech that sounds too smooth. Performance may look contrived due to lack of involvement.
Non Verbal Cues ,[object Object],During Deception Non Verbal High Pitch of Voice Speech errors Illustrators Hand/Finger Movement > > < < Verbal Cues Unstructured Production Logical Structure Quantity of detail Contextual Embedding Description of interactions Reproduction of speech Unusual Detail Spontaneous Correction Admitting lack of memory < < < < < < < < <
Verbal Behavior and deception CBCA:- Criteria Based Content Analysis-is a  tool to assess the veracity of written statements, and is used as evidence in criminal courts in several countries in the world. CBCA scores are expected to be higher for truth tellers than for liars.  Assumptions:- (i) Lying is cognitively more difficult than truth telling, (ii)Liars are more concerned with the impression they make on others than truth tellers.  Three Phase A specific interview procedure to obtain a statement from information about what constitute a properly conducted interview Coding of the transcribed statement using the CBCA procedure  An evaluation of the CBCA outcomes
Physiological  Reactions and Deception  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Polygraph ,[object Object],[object Object],[object Object],[object Object]
CQT:- Control Question technique ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GKT:- Guilt Knowledge Test ,[object Object],[object Object],[object Object],[object Object],[object Object]
Validity of Polygraphs ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Counter-Measures to the Polygraph ,[object Object],[object Object],[object Object],[object Object],[object Object]
How Effective are Physical Counter-measures? ,[object Object],[object Object],[object Object],[object Object]
Mental Counter-Measures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Micro Expressions ,[object Object],[object Object],[object Object],[object Object]
Peeping in Words Statement Analysis
Statement Analysis is a very useful interviewing technique for detecting deception on the part of either the suspect or the victim. It's the process of examining a person's words to see exactly what they're saying.   I t's based on the principle that people do not lie. Most people want to tell the truth. Even liars will tell a partial truth. It's easier to tell a partial truth than to completely fabricate a statement It's been theorized that the psychological ID part of our personality, the subconscious primitive part, tends to be truthful at all times.  If we're being deceptive, a conflict occurs with our ID and it creates stress.  &quot;Vrij and Winkel (1993) stated that the deception framework includes both emotional and cognitive components.&quot; When a person lies, this causes a conflict within ourselves and creates stress (emotional).  That stress then triggers a sympathetic nervous system to act, as part of the &quot;Fight or Flight&quot; syndrome.   Statement Analysis
Technique Truthful statements differ from fabricated ones in both content and quality  Norm Investigators determine what is typical of a truthful statement Deviation from the norm
Part of Speech Extraneous Information Lack of Conviction Balance in statement Components
Important Parts Of Speech ,[object Object],[object Object],[object Object],[object Object],If a deviation from the norm appears, they then should ask, &quot;Why?&quot;
Extraneous Information Extraneous information in a statement also can provide clues to deception.  A truthful person with nothing to hide, when asked the question, &quot;What happened,&quot; will recount the events chronologically and concisely.  Any information given that does not answer this question is extraneous. People involved in crimes may feel the need to justify their actions.  In such cases, the information in the statements will not follow a logical time frame or will skirt what really happened.  They also may include more information than is necessary to tell the story. In such instances, investigators should scrutinize this extraneous information and question why this person felt the need to include it.
Lack of conviction When analyzing a statement, investigators should note if the person feigns a loss of memory by repeatedly inserting &quot;I don't remember&quot; or &quot;I can't recall.&quot;  They also should look to see if the person hedges during the narrative by using such phrases as &quot;I think,&quot; &quot;I believe,&quot; &quot;to the best of my knowledge,&quot; or &quot;kind of.&quot;  These phrases, also called qualifiers, serve to temper the action about to be described, thereby discounting the message before it even is transmitted.
Balance of statement A statement given by a suspect or an alleged victim should be examined by investigators for overall balance.  Statements should be more than just a series of details.  They need to sound like an account of the event.
[object Object],[object Object],[object Object],Truthful statement has THREE parts ,[object Object],[object Object],[object Object],If any part of a statement is incomplete or missing altogether, then the statement is probably false.
Signs to Observe ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Graphology
Time is an important element in the subject's statement. It can give us clues as to how much information the subject has provided.  Truthful people will provide a logical statement that follows a chronological time frame.  Deceptive people often won't.  Gaps in a statement indicate deception.  When a person says, &quot;I don't remember,&quot; they are often concealing a critical detail.  Any missing time elements should raise red flags  Time
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Emotions
Peeping in Mind Brain Fingerprinting
Criminal Brain   ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Techniques
[object Object],[object Object],[object Object],[object Object],[object Object],Techniques
Role in Criminal Findings ,[object Object],[object Object],[object Object],[object Object]
Investigation ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Investigation
Interview of the subject ,[object Object],[object Object],[object Object],[object Object]
Interview of the subject ,[object Object],[object Object],[object Object]
Interview of the subject ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Keep in mind
Keep in mind ,[object Object],[object Object],[object Object],[object Object],[object Object]
Scientific Testing with Brain Fingerprinting  ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Attributes
[object Object],[object Object],[object Object],Scientific Testing with Brain Fingerprinting
[object Object],[object Object],[object Object],[object Object],Scientific Testing with Brain Fingerprinting
A Good Password  ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object]
Social Engineering should we USE or not BUT  If they can why cant we!!!!
[object Object],[object Object],[object Object],[object Object],[object Object],Why use Social Engineering
[object Object],Reverse Social Engineering
[object Object],Reverse /Social Engineering
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Reverse Social Engineering
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Why it works!!!!
nullcon Goa 2010 http://nullcon.net You can reach us at [email_address] [email_address]
1 of 120

Recommended

Next generation image compression standards: JPEG XR and AIC by
Next generation image compression standards: JPEG XR and AICNext generation image compression standards: JPEG XR and AIC
Next generation image compression standards: JPEG XR and AICTouradj Ebrahimi
1.9K views56 slides
A New Cross Diamond Search Motion Estimation Algorithm for HEVC by
A New Cross Diamond Search Motion Estimation Algorithm for HEVCA New Cross Diamond Search Motion Estimation Algorithm for HEVC
A New Cross Diamond Search Motion Estimation Algorithm for HEVCIJERA Editor
432 views4 slides
Image processing with matlab by
Image processing with matlabImage processing with matlab
Image processing with matlabAman Gupta
1.3K views30 slides
Optimized Feedforward Network of CNN with Xnor Final Presentation by
Optimized Feedforward Network of CNN with Xnor Final PresentationOptimized Feedforward Network of CNN with Xnor Final Presentation
Optimized Feedforward Network of CNN with Xnor Final PresentationIndiana University Bloomington
184 views49 slides
Optimizedfeedforwardnetworkofcnnwithxnorv5 180321130759 by
Optimizedfeedforwardnetworkofcnnwithxnorv5 180321130759Optimizedfeedforwardnetworkofcnnwithxnorv5 180321130759
Optimizedfeedforwardnetworkofcnnwithxnorv5 180321130759Vandna Sambyal
84 views21 slides
Optimized feedforward network of cnn with xnor v5 by
Optimized feedforward network of cnn with xnor v5Optimized feedforward network of cnn with xnor v5
Optimized feedforward network of cnn with xnor v5Indiana University Bloomington
337 views21 slides

More Related Content

Viewers also liked

Windows Forensics by
Windows ForensicsWindows Forensics
Windows ForensicsPrince Boonlia
3.9K views26 slides
5. [Daily hack] Truecrypt by
5. [Daily hack] Truecrypt5. [Daily hack] Truecrypt
5. [Daily hack] Truecryptdefconmoscow
1.1K views12 slides
Steganography by
SteganographySteganography
Steganographymohamed3kh
373 views11 slides
Decoding QR codes by
Decoding QR codesDecoding QR codes
Decoding QR codesMaria Vassilopoulou
264 views11 slides
Steganography by
SteganographySteganography
SteganographyPavninder
1.8K views21 slides
2 classical cryptosystems by
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystemsdmc5abdulla
1.8K views56 slides

Viewers also liked(20)

5. [Daily hack] Truecrypt by defconmoscow
5. [Daily hack] Truecrypt5. [Daily hack] Truecrypt
5. [Daily hack] Truecrypt
defconmoscow1.1K views
Steganography by mohamed3kh
SteganographySteganography
Steganography
mohamed3kh373 views
Steganography by Pavninder
SteganographySteganography
Steganography
Pavninder1.8K views
2 classical cryptosystems by dmc5abdulla
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystems
dmc5abdulla1.8K views
DWT based approach for steganography using biometrics by Sri Madhur
DWT based approach for steganography using biometricsDWT based approach for steganography using biometrics
DWT based approach for steganography using biometrics
Sri Madhur2.5K views
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY by acijjournal
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
acijjournal1K views
One-Byte Modification for Breaking Memory Forensic Analysis by Takahiro Haruyama
One-Byte Modification for Breaking Memory Forensic AnalysisOne-Byte Modification for Breaking Memory Forensic Analysis
One-Byte Modification for Breaking Memory Forensic Analysis
Takahiro Haruyama3.9K views
PDF secrets - hiding & revealing secrets in PDF documents by Ange Albertini
PDF secrets - hiding & revealing secrets in PDF documentsPDF secrets - hiding & revealing secrets in PDF documents
PDF secrets - hiding & revealing secrets in PDF documents
Ange Albertini29K views
Windows Memory Forensic Analysis using EnCase by Takahiro Haruyama
Windows Memory Forensic Analysis using EnCaseWindows Memory Forensic Analysis using EnCase
Windows Memory Forensic Analysis using EnCase
Takahiro Haruyama19.2K views
HITCON CTF 2016導覽 by HITCON GIRLS
HITCON CTF 2016導覽HITCON CTF 2016導覽
HITCON CTF 2016導覽
HITCON GIRLS2.3K views
Computer Security Lecture 2: Classical Encryption Techniques 1 by Benha University
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1
Benha University2.4K views
QR code by Noah Kim
QR codeQR code
QR code
Noah Kim7.1K views
QR Codes PowerPoint Presentation by Zachary Moore
QR Codes PowerPoint PresentationQR Codes PowerPoint Presentation
QR Codes PowerPoint Presentation
Zachary Moore28.8K views
Steganography presentation by Ashwin Prasad
Steganography presentationSteganography presentation
Steganography presentation
Ashwin Prasad28.5K views
Steganography by Uttam Jain
Steganography Steganography
Steganography
Uttam Jain106K views
Cryptography.ppt by kusum sharma
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma203.6K views

Similar to nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Perspective

Image stegnography and steganalysis by
Image stegnography and steganalysisImage stegnography and steganalysis
Image stegnography and steganalysisPrince Boonlia
4.9K views57 slides
Dip by
DipDip
Diprenukarenuka9
22 views13 slides
//STEIM Workshop: A Vernacular of File Formats by
//STEIM Workshop: A Vernacular of File Formats//STEIM Workshop: A Vernacular of File Formats
//STEIM Workshop: A Vernacular of File FormatsRosa ɯǝukɯɐn
1.8K views37 slides
Lecture 2-2023.pdf by
Lecture 2-2023.pdfLecture 2-2023.pdf
Lecture 2-2023.pdfssuserff72e4
3 views9 slides
Lecture 2-2023.pdf by
Lecture 2-2023.pdfLecture 2-2023.pdf
Lecture 2-2023.pdfssuserff72e4
3 views9 slides
Image compression and jpeg by
Image compression and jpegImage compression and jpeg
Image compression and jpegtheem college of engineering
848 views25 slides

Similar to nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Perspective(20)

Image stegnography and steganalysis by Prince Boonlia
Image stegnography and steganalysisImage stegnography and steganalysis
Image stegnography and steganalysis
Prince Boonlia4.9K views
//STEIM Workshop: A Vernacular of File Formats by Rosa ɯǝukɯɐn
//STEIM Workshop: A Vernacular of File Formats//STEIM Workshop: A Vernacular of File Formats
//STEIM Workshop: A Vernacular of File Formats
Rosa ɯǝukɯɐn1.8K views
Compression presentation 415 (1) by Godo Dodo
Compression presentation 415 (1)Compression presentation 415 (1)
Compression presentation 415 (1)
Godo Dodo728 views
Commonly Used Image File Formats by Fatih Özlü
Commonly Used Image File FormatsCommonly Used Image File Formats
Commonly Used Image File Formats
Fatih Özlü5.6K views
File types photorestoration and panoramics by daviddiener
File types photorestoration and panoramicsFile types photorestoration and panoramics
File types photorestoration and panoramics
daviddiener278 views
PPT by Videoguy
PPTPPT
PPT
Videoguy1.9K views
Unit i mm_chap3_graphics and image data representation by Eellekwameowusu
Unit i mm_chap3_graphics and image data representationUnit i mm_chap3_graphics and image data representation
Unit i mm_chap3_graphics and image data representation
Eellekwameowusu116 views
Mm01 a vformat by gotovikas
Mm01 a vformatMm01 a vformat
Mm01 a vformat
gotovikas435 views
Lec2 by Kh Ravy
Lec2Lec2
Lec2
Kh Ravy553 views

More from n|u - The Open Security Community

Hardware security testing 101 (Null - Delhi Chapter) by
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)n|u - The Open Security Community
588 views19 slides
Osint primer by
Osint primerOsint primer
Osint primern|u - The Open Security Community
362 views22 slides
SSRF exploit the trust relationship by
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationshipn|u - The Open Security Community
467 views24 slides
Nmap basics by
Nmap basicsNmap basics
Nmap basicsn|u - The Open Security Community
516 views38 slides
Metasploit primary by
Metasploit primaryMetasploit primary
Metasploit primaryn|u - The Open Security Community
196 views26 slides
Api security-testing by
Api security-testingApi security-testing
Api security-testingn|u - The Open Security Community
774 views24 slides

More from n|u - The Open Security Community(20)

Recently uploaded

Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... by
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...ShapeBlue
44 views13 slides
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online by
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineShapeBlue
75 views19 slides
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueShapeBlue
70 views7 slides
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...Jasper Oosterveld
27 views49 slides
Network Source of Truth and Infrastructure as Code revisited by
Network Source of Truth and Infrastructure as Code revisitedNetwork Source of Truth and Infrastructure as Code revisited
Network Source of Truth and Infrastructure as Code revisitedNetwork Automation Forum
32 views45 slides
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...ShapeBlue
64 views20 slides

Recently uploaded(20)

Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... by ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue44 views
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online by ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue75 views
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue70 views
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue64 views
State of the Union - Rohit Yadav - Apache CloudStack by ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue106 views
NTGapps NTG LowCode Platform by Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu28 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson126 views
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates by ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue84 views
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... by ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue46 views
Five Things You SHOULD Know About Postman by Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman38 views
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT by ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue66 views
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue54 views
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... by ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue28 views
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... by ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue61 views
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... by ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue60 views
HTTP headers that make your website go faster - devs.gent November 2023 by Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn26 views
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... by ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue55 views

nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Perspective

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Pixel: The building block of Image
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. The BMP header This is intel Processor so Use little Endian system
  • 15. The DIB header Offset # Size Purpose Eh 4 the size of this header (40 bytes) 12h 4 the bitmap width in pixels 16h 4 the bitmap height in pixels. 1Ah 2 the number of color planes being used. Must be set to 1. 1Ch 2 the number of bits per pixel, which is the color depth of the image. Typical values are 1, 4, 8, 16, 24 and 32. 1Eh 4 the compression method being used. 22h 4 the image size. This is the size of the raw bitmap data , and should not be confused with the file size. 26h 4 the horizontal resolution of the image. (pixel per meter, signed integer) 2Ah 4 the vertical resolution of the image. (pixel per meter, signed integer) 2Eh 4 the number of colors in the color palette, or 0 to default to 2 n . 32h 4 the number of important colors used, or 0 when every color is important; generally ignored.
  • 16.
  • 17.
  • 18. JPEG File structure (JFIF) nullcon Goa 2010 http://nullcon.net Source: Wikipedia Bytes Payload Name Comments 0xFFD8 none Start Of Image 0xFFC0 variable Start Of Frame (Baseline DCT) Indicates that this is a baseline DCT-based JPEG, and specifies the width, height, number of components, and component subsampling (e.g., 4:2:0). 0xFFC2 variable Start Of Frame (Progressive DCT) Indicates that this is a progressive DCT-based JPEG, and specifies the width, height, number of components, and component subsampling (e.g., 4:2:0). 0xFFC4 variable Huffman Table(s) Specifies one or more Huffman tables. 0xFFDB variable Quantization Table(s) Specifies one or more quantization tables. 0xFFDD 2 bytes Define Restart Interval Specifies the interval between RST n markers, in macroblocks. This marker is followed by two bytes indicating the fixed size so it can be treated like any other variable size segment. 0xFFDA variable Start Of Scan Begins a top-to-bottom scan of the image. In baseline DCT JPEG images, there is generally a single scan. Progressive DCT JPEG images usually contain multiple scans. This marker specifies which slice of data it will contain, and is immediately followed by entropy-coded data. 0xFFD0 … 0xFFD7 none Restart Inserted every r macroblocks, where r is the restart interval set by a DRI marker. Not used if there was no DRI marker. The low 3 bits of the marker code, cycles from 0 to 7. 0xFFE n variable Application-specific For example, an Exif JPEG file uses an APP1 marker to store metadata, laid out in a structure based closely on TIFF . 0xFFFE variable Comment Contains a text comment. 0xFFD9 none End Of Image
  • 19. The Compression Process nullcon Goa 2010 http://nullcon.net Colour space transformation from RGB to YCbCr (Optional) Down Sampling (4:4:4 or 4:2:2 or 4:2:0) (Optional) Block Splitting (8X8, 16 X8 or 16X16) Discrete Cosine transform Quantization Entropy Coding Final JPEG image data Results in higher values at top left of the matrix and a lot of low value at the bottom right The division table resulting in actual compression with lot of zero values at the bottom right corner Arranging the values in zig zag manner to get all the zero values at the end. Thus using a single byte to represent them Data hiding in LSB’s here
  • 20. The JPEG Compression at work nullcon Goa 2010 http://nullcon.net DCT 8 X 8 Pixel data for one component e.g “Y” Averaged out matrix DCT Coefficients of the block
  • 21. Cont…. nullcon Goa 2010 http://nullcon.net Round off quantized DCT Coefficients DCT Coefficients of the block Quantization table
  • 22. Cont…. nullcon Goa 2010 http://nullcon.net -26, -3, 0, -3, -2, -6, 2, -4, 1, -4, 1, 1, 5, 1, 2, -1, 1, -12, 0, 0, 0, 0, 0, -1, -1, EOB Round off quantized DCT Coefficients Zig-Zag arrangement of binaries Finally compressed block
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. LSB Enhancement File: test.bmp (Contains no hidden data) File: test1.bmp (Contains hidden data)
  • 35.
  • 36.
  • 37. Why this pattern emerge (Nature of the ASCII ) Char Decimal Binary Hex a 97 011 00001 61 b 98 011 00010 62 c 99 011 00011 63 d 100 011 00100 64 e 101 011 00101 65 f 102 011 00110 66 g 103 011 00111 67 h 104 011 01000 68 I 105 011 01001 69 j 106 011 01010 6A k 107 011 01011 6B l 108 011 01100 6C m 109 011 01101 6D Char Decimal Binary Hex n 110 011 01110 6E o 111 011 01111 6F p 112 011 10000 70 q 113 011 10001 71 r 114 011 10010 72 s 115 011 10011 73 t 116 011 10100 74 u 117 011 10101 75 v 118 011 10110 76 w 119 011 10111 77 x 120 011 11000 78 y 121 011 11001 79 z 122 011 11010 7A
  • 38.
  • 39. Same text with various encryption and LSB enhanced images Text encrypted as ASCII Text encrypted as Binary with IDEA encryption (S-Tools) Image with no data hidden
  • 40. Which is the better option for hiding the data 1 2 3 4
  • 41. Take a break and look at this Image nullcon Goa 2010 http://nullcon.net
  • 42.
  • 43.
  • 44. Lets see the chi square result of the images shown
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53. Check these palettes nullcon Goa 2010 http://nullcon.net Palette of complete black image original Palette of complete black image as changed by S-tools after hiding the data
  • 54. Check these palettes nullcon Goa 2010 http://nullcon.net Original Palette of image with Black red and a custom colour Palette as changed by S-tools
  • 55.
  • 56.
  • 57. Section 5 Beyond Technology Dr. Reena Bhansali Prince Komal Boonlia
  • 58. Peeping in Expressions Body Language Micro expressions
  • 60.
  • 61.
  • 62. Deception A successful or unsuccessful deliberate attempt without forewarning, to create in another belief which the communicator considers to be untrue. Deception involves acting in such a way which leads another person to believe something, that you, yourself, do not believe to be true (Ekman, Miller and Stiff). If you have nothing to hide, why not tell the complete truth?
  • 63. Non verbal Behavior and deception Emotions Content Complexity Attempted Control Behaviour
  • 64. Emotions Telling lie evokes emotions undergo Guilt, Fear, Duping Delight Liars might feel guilty because they are lying, might be afraid of getting caught, or might be excited about having the opportunity to fool someone The strength of these emotions depends on the personality of the liar and on the circumstances under which the lie takes place Guilt might results in gaze aversion Fear and Excitement might result in signs of arousal, limb movements, speech fillers, speech errors, facial emotional expressions or a high pitched voice.
  • 65.
  • 66. Attempted Behavioral Control Liars are busy in Impression Management Convincing others requires suppressing nerves effectively, masking evidence of heightened cognitive load, knowledge of how an honest person normally behaves and ability to show the behavior. Usually they tend to over control themselves, resulting in behavior that looks rehearsed and rigid and speech that sounds too smooth. Performance may look contrived due to lack of involvement.
  • 67.
  • 68. Verbal Behavior and deception CBCA:- Criteria Based Content Analysis-is a tool to assess the veracity of written statements, and is used as evidence in criminal courts in several countries in the world. CBCA scores are expected to be higher for truth tellers than for liars. Assumptions:- (i) Lying is cognitively more difficult than truth telling, (ii)Liars are more concerned with the impression they make on others than truth tellers. Three Phase A specific interview procedure to obtain a statement from information about what constitute a properly conducted interview Coding of the transcribed statement using the CBCA procedure An evaluation of the CBCA outcomes
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79. Peeping in Words Statement Analysis
  • 80. Statement Analysis is a very useful interviewing technique for detecting deception on the part of either the suspect or the victim. It's the process of examining a person's words to see exactly what they're saying.   I t's based on the principle that people do not lie. Most people want to tell the truth. Even liars will tell a partial truth. It's easier to tell a partial truth than to completely fabricate a statement It's been theorized that the psychological ID part of our personality, the subconscious primitive part, tends to be truthful at all times. If we're being deceptive, a conflict occurs with our ID and it creates stress. &quot;Vrij and Winkel (1993) stated that the deception framework includes both emotional and cognitive components.&quot; When a person lies, this causes a conflict within ourselves and creates stress (emotional). That stress then triggers a sympathetic nervous system to act, as part of the &quot;Fight or Flight&quot; syndrome.   Statement Analysis
  • 81. Technique Truthful statements differ from fabricated ones in both content and quality Norm Investigators determine what is typical of a truthful statement Deviation from the norm
  • 82. Part of Speech Extraneous Information Lack of Conviction Balance in statement Components
  • 83.
  • 84. Extraneous Information Extraneous information in a statement also can provide clues to deception. A truthful person with nothing to hide, when asked the question, &quot;What happened,&quot; will recount the events chronologically and concisely. Any information given that does not answer this question is extraneous. People involved in crimes may feel the need to justify their actions. In such cases, the information in the statements will not follow a logical time frame or will skirt what really happened. They also may include more information than is necessary to tell the story. In such instances, investigators should scrutinize this extraneous information and question why this person felt the need to include it.
  • 85. Lack of conviction When analyzing a statement, investigators should note if the person feigns a loss of memory by repeatedly inserting &quot;I don't remember&quot; or &quot;I can't recall.&quot; They also should look to see if the person hedges during the narrative by using such phrases as &quot;I think,&quot; &quot;I believe,&quot; &quot;to the best of my knowledge,&quot; or &quot;kind of.&quot; These phrases, also called qualifiers, serve to temper the action about to be described, thereby discounting the message before it even is transmitted.
  • 86. Balance of statement A statement given by a suspect or an alleged victim should be examined by investigators for overall balance. Statements should be more than just a series of details. They need to sound like an account of the event.
  • 87.
  • 88.
  • 89.
  • 90. Time is an important element in the subject's statement. It can give us clues as to how much information the subject has provided. Truthful people will provide a logical statement that follows a chronological time frame. Deceptive people often won't. Gaps in a statement indicate deception. When a person says, &quot;I don't remember,&quot; they are often concealing a critical detail. Any missing time elements should raise red flags Time
  • 91.
  • 92. Peeping in Mind Brain Fingerprinting
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114. Social Engineering should we USE or not BUT If they can why cant we!!!!
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120. nullcon Goa 2010 http://nullcon.net You can reach us at [email_address] [email_address]