Difference between pages "Introduction to Steganography: Steganography and Data Exfiltration" and "The Art of Keylogging"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
 
(Created page with ''''The Art of Keylogging'''[http://www.wetstonetech.com/cgi-bin/shop.cgi?view,32] == == WetStone has created a unique virtualized cyber-safe environment where investigators …')
 
Line 1: Line 1:
'''Introduction to Steganography:  Steganography and Data Exfiltration'''[http://www.wetstonetech.com/cgi-bin/shop.cgi?view,22]
+
'''The Art of Keylogging'''[http://www.wetstonetech.com/cgi-bin/shop.cgi?view,32]
  
  
 
==  ==
 
==  ==
  
This virtual one-day class will introduce you to the latest methods,techniques and threats posed by steganography. Students will learn how steganography has evolved, where it is going and how it is being used by criminals and terrorist organizations. Learn about the latest techniques to detect, shunt, disrupt and destroy steganography communications. Identify those using steganography and stop the leak of vital information from your organization.
+
WetStone has created a unique virtualized cyber-safe environment where investigators and information technology professionals can experiment with key logging technologies, including both software based and hardware based. Beyond the offensive use of these tools, investigators will discover how to investigate keyloggers with varied sophistication levels. To truly get into the mind of a cyber criminal an investigator must know what they are looking for, and then deeply understand how the tools they uncover work. Establishing this can mean the difference between pulling the plug on a memory resident keyloggers, and losing all traces of evidence, or uncovering the activity needed for prosecution.
  
  
  
'''Steganography is Global Threat!'''
+
'''Is Someone Looking Over Your Shoulder?'''
  
Steganography is capable of concealing the mere existence of  incriminating  information and/or covert communications. Steganography weapons are easy to use, and are readily available to our adversaries.
+
Desktops without keyboards, and laptops without keys are like baseball without a bat. It is impossible to take away keyboards from computers and still be efficient and functional. The question that then surfaces is, how do we secure them? Keyboards are under attack from software and hardware based tools designed to steal the content typed on the keys. Whether infected at home or at work, keyloggers are responsible for massive amounts of identity theft and corporate leakage of data.
  
When Steganogpraphy is used in conjunction with the internet, it becomes a globally effective tool for command control communication and intelligence.
 
 
Criminals are armed with the ability to…
 
 
▫ Conceal incriminating information
 
▫ Covertly communicate with accomplices
 
▫ Innocuously share large amounts of potentially dangerous information
 
 
   
 
   
  

Latest revision as of 14:29, 9 October 2009

The Art of Keylogging[1]


WetStone has created a unique virtualized cyber-safe environment where investigators and information technology professionals can experiment with key logging technologies, including both software based and hardware based. Beyond the offensive use of these tools, investigators will discover how to investigate keyloggers with varied sophistication levels. To truly get into the mind of a cyber criminal an investigator must know what they are looking for, and then deeply understand how the tools they uncover work. Establishing this can mean the difference between pulling the plug on a memory resident keyloggers, and losing all traces of evidence, or uncovering the activity needed for prosecution.


Is Someone Looking Over Your Shoulder?

Desktops without keyboards, and laptops without keys are like baseball without a bat. It is impossible to take away keyboards from computers and still be efficient and functional. The question that then surfaces is, how do we secure them? Keyboards are under attack from software and hardware based tools designed to steal the content typed on the keys. Whether infected at home or at work, keyloggers are responsible for massive amounts of identity theft and corporate leakage of data.


Who Should Attend?

▫ Forensic Investigators
▫ Local, state and federal law enforcement
▫ Private investigators
▫ IT security professionals
▫ Security auditors


Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.



Contact Information:

1-877-WETSTONE ext 2

www.wetstonetech.com [2]