Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Hi there,
I found out with great interest about covert channels and covert communication some time ago I thought I must add this type of information to my INFOSEC knowledge.
So if someone wants to talk about covert channels from a theoretical and practical but educational perspective he/she is welcomed.
Any thoughts, links, books, tools etc ....
Until now I've studied about steganography and little about hiding info in network traffic (tcp, udp , icmp etc.)
I liked steghide (linux and windows version) and stegdetect for hiding/finding info in images and audio files.
Interesting is also hyden which embeds info in any binary file.
Covert Channel Tunnelling Testing (cctt) should also be mentioned.
I thought this would be an interesting discussion...
No Feedback?
Maybe then you could break the ice with some examples and links? Maybe pose a question that has the potential to lead to a discussion? Maybe narrow the scope a bit as well. Covert channels is quite a wide topic.
1) cctt (covert channel tunnelling tool) seems also a great tool for making arbitrary tcp/udp tunnels and for passing firewall rules.
2) I found out very interesting how hyden uses steganography and hides data in binary files. Your /bin/ls cound carry a text file and it is guarateed from the author (I I've tested it) that the file size doesn't change a bit after the other file is embedded. The algorithm works based on the redundant instruction set of the x86. An inconvenient is that this redundant instructions are limited and the data hidden rate is only 1/110 comparing with steganography in images which has a rate of 1/17 - hidded data/cover data
3) A nice book is http://www.syngress.com/catalog/?pid=3140 It is not very technical and is like a story, but in the end you find out how much you have learnt.
4) Other links: http://www.sarc-wv.com/ http://www.jjtc.com/pub/r2026.pdf http://www.fbi.gov/hq/lab/fsc/backis...research01.htm
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.