Difference between pages "WetStone Technologies, Inc." and "Hidden channels"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(New page: WetStone Technologies offers Digital Investigation products and training. Our products include: * Gargoyle Investigator™ * LiveWire Investigator™. * LiveDiscover™ * [[...)
 
(New page: {{expand}} '''Hidden channels''' (covert channels) are communication channels that transmit information without the authorization or knowledge of the channel's designer, owner, or operato...)
 
Line 1: Line 1:
WetStone Technologies offers Digital Investigation products and training.
+
{{expand}}
Our products include:
+
*  [[Gargoyle Investigator™]]
+
* [[LiveWire Investigator™]].
+
* [[LiveDiscover™]]
+
* [[Stego Suite™]]
+
  
Our trainings include:
+
'''Hidden channels''' (covert channels) are communication channels that transmit information without the authorization or knowledge of the channel's designer, owner, or operator.
* [[Hacking BootCamp for Investigators™]]
+
* [[Live Investigator Training™]].  
+
* [[Steganography Investigator Training™]]
+
  
 +
== Common Uses ==
  
==Industry Awards==
+
* Bypassing network filters;
 +
* Bypassing network [[Sniffer|sniffers]].
  
In both 2007 and 2008 WetStone was named Best Computer Forensics Solution from SC Magazine
+
== Techniques ==
and the 2007 Innovator
+
  
== External Links ==
+
Information can be hidden within:
  
[http://www.wetstonetech.com/ Official Website]
+
* IP ID;
[http://www.wetstonetech.com/blogs/ Blog]
+
* TCP SEQ/ACK numbers;
[http://www.wetstonetech.com/forensictools.html/ Products]
+
* TCP options;
[http://www.wetstonetech.com/trainings.html/ Trainings]
+
* etc.
 +
 
 +
== External Links ==
 +
 
 +
* [http://www.firstmonday.org/issues/issue2_5/rowland/ Covert Channels in the TCP/IP Protocol Suite]
 +
 
 +
[[Category:Network Forensics]]
 +
[[Category:Steganography]]

Revision as of 15:29, 9 October 2008

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

Hidden channels (covert channels) are communication channels that transmit information without the authorization or knowledge of the channel's designer, owner, or operator.

Common Uses

  • Bypassing network filters;
  • Bypassing network sniffers.

Techniques

Information can be hidden within:

  • IP ID;
  • TCP SEQ/ACK numbers;
  • TCP options;
  • etc.

External Links