Difference between revisions of "Advanced Steganography Demystifying Steganography Investigation"

From Forensics Wiki
Jump to: navigation, search
(New page: '''Live Investigator Training''' [https://www.wetstonetech.com/cgi/shop.cgi?view,7] == == Live Investigator Training is designed to teach students the techniques for acquiring digital...)
 
Line 1: Line 1:
'''Live Investigator Training''' [https://www.wetstonetech.com/cgi/shop.cgi?view,7]
+
'''Advanced Steganography Demystifying Steganography Investigation''' [http://www.wetstonetech.com/cgi-bin/shop.cgi?view,23]
  
  
 
==  ==
 
==  ==
  
Live Investigator Training is designed to teach students the techniques for acquiring digital evidence from a running suspect’s system in an overt or covert manner. This includes acquiring running process state, open handles, process/port associations, system logs, installed devices, physical and logical drives, network statistics and configuration, user accounts and logged in users.  Class participants will also learn how to acquire volatile memory and/or registry snapshots from the target host. This could include recently used applications and documents, recently visited web sites, chat logs and e-mails. Physical RAM capture may contain vital password and account information, remnants of visited web sites, recent messages, phone numbers, e-mail addresses and chat identities.
+
During this 2 day advanced class, students will participate in hands on experiments with stego’d images, multimedia files, advanced network protocols and Steganographic file systems. Detailed analytical and jamming methods will be utilized to both discover and disrupt Steganographic operations. Analysis of Steganographic file systems, streaming steganography and Voice Over Internet Protocol (VOIP) based steganography will be covered. A host of both open source and proprietary technologies will be utilized during this class.
  
  
'''Why Live Investigation?'''
 
  
As many corporation’s networks are becoming large and often geographically divers, it is imperative to practice a live investigation technique. LiveWire Investigator™ and it’s associated software bundle provides the capability of collecting and analyzing comprehensive information regarding evidence contained on ‘live-running’ devices.
+
'''Steganography is Evolving!'''
 +
 
 +
The art of analyzing steganography within images, multimedia and in network protocols is considered a black art. As criminals communicate and conceal vital information in new Steganographic file systems, voice over internet protocol (VOIP) streams and in a host of multimedia carriers, it is vital and urgent that a cadre of trained experts exist to counter this threat. A deep understanding and analysis of images, multimedia files and network protocols along with clear understanding of the known methods of data hiding are essential in order to participate in this analysis.
 +
 
  
  
Line 18: Line 20:
 
  ▫ Private investigators
 
  ▫ Private investigators
 
  ▫ IT security professionals
 
  ▫ IT security professionals
  ▫ Security auditors
+
   
 
+
 
+
'''Skills Learned'''
+
 
+
Upon completion of the course, students will have gained knowledge in the fundamentals of investigating a system in it’s running state to include...
+
  
▫ Forensic network discovery
 
▫ Evidence collection process
 
▫ Acquisition of volatile data
 
▫ Automated audit trail
 
▫ Forensic reporting
 
  
 
Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.
 
Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.

Revision as of 15:30, 6 October 2009

Advanced Steganography Demystifying Steganography Investigation [1]


During this 2 day advanced class, students will participate in hands on experiments with stego’d images, multimedia files, advanced network protocols and Steganographic file systems. Detailed analytical and jamming methods will be utilized to both discover and disrupt Steganographic operations. Analysis of Steganographic file systems, streaming steganography and Voice Over Internet Protocol (VOIP) based steganography will be covered. A host of both open source and proprietary technologies will be utilized during this class.


Steganography is Evolving!

The art of analyzing steganography within images, multimedia and in network protocols is considered a black art. As criminals communicate and conceal vital information in new Steganographic file systems, voice over internet protocol (VOIP) streams and in a host of multimedia carriers, it is vital and urgent that a cadre of trained experts exist to counter this threat. A deep understanding and analysis of images, multimedia files and network protocols along with clear understanding of the known methods of data hiding are essential in order to participate in this analysis.


Who Should Attend?

▫ Forensic Investigators
▫ Local, state and federal law enforcement
▫ Private investigators
▫ IT security professionals


Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.



Contact Information:

1-877-WETSTONE ext 2

www.wetstonetech.com [2]