SlideShare ist ein Scribd-Unternehmen logo
1 von 120
Steganography & Stegananalysis: A Technical & Psychological Perspective ,[object Object],[object Object],nullcon Goa 2010 http://nullcon.net There are only 10 kind of people in the world Those who understand binary and those who dont
The Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Steganogrphy The art of data hiding in carrier files ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Essentials before we begin ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The process ,[object Object],[object Object],[object Object]
Section 1 ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Pixel: The building block of Image
BMP files ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GrayscaleImages with colour palettes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RGB colour images with colour palette ,[object Object],[object Object],[object Object]
24 bit BMP image with the palette ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Section 2 ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Bitmap image ,[object Object],BMP File Header Stores general information about the BMP file. Bitmap Information  (DIB header) Stores detailed information about the bitmap image. Color Palette Stores the definition of the colors being used for indexed color bitmaps. (At times not needed) Bitmap Data Stores the actual image, pixel by pixel.
The BMP header This is intel Processor  so Use little Endian system
The DIB header Offset # Size Purpose Eh 4 the size of this header (40 bytes) 12h 4 the bitmap width in pixels  16h 4 the bitmap height in pixels. 1Ah 2 the number of color planes being used. Must be set to 1. 1Ch 2 the number of bits per pixel, which is the color depth of the image. Typical values are 1, 4, 8, 16, 24 and 32. 1Eh 4 the compression method being used.  22h 4 the image size. This is the size of the raw bitmap data , and should not be confused with the file size. 26h 4 the horizontal resolution of the image. (pixel per meter, signed integer) 2Ah 4 the vertical resolution of the image. (pixel per meter, signed integer) 2Eh 4 the number of colors in the color palette, or 0 to default to 2 n . 32h 4 the number of important colors used, or 0 when every color is important; generally ignored.
With the structure ready its time to fill the pixels in the image ,[object Object],Pixel No Red value Green Value Blue Value Colour of pixel 1 8B=139 87 = 135 A0=160 2 8D=141 89=137 A2=162 3 8F=143  8B=139 A4=164 .. .. .. .. n C6=198 F7=247 FF=255
The JPEG File Format ,[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
JPEG File structure (JFIF) nullcon Goa 2010 http://nullcon.net Source: Wikipedia Bytes Payload Name Comments 0xFFD8 none Start Of Image 0xFFC0 variable  Start Of Frame (Baseline DCT) Indicates that this is a baseline DCT-based JPEG, and specifies the width, height, number of components, and component subsampling (e.g., 4:2:0). 0xFFC2 variable  Start Of Frame (Progressive DCT) Indicates that this is a progressive DCT-based JPEG, and specifies the width, height, number of components, and component subsampling (e.g., 4:2:0). 0xFFC4 variable  Huffman Table(s) Specifies one or more Huffman tables. 0xFFDB variable  Quantization Table(s) Specifies one or more quantization tables. 0xFFDD 2 bytes Define Restart Interval Specifies the interval between RST n  markers, in macroblocks. This marker is followed by two bytes indicating the fixed size so it can be treated like any other variable size segment. 0xFFDA variable  Start Of Scan Begins a top-to-bottom scan of the image. In baseline DCT JPEG images, there is generally a single scan. Progressive DCT JPEG images usually contain multiple scans. This marker specifies which slice of data it will contain, and is immediately followed by entropy-coded data. 0xFFD0 … 0xFFD7 none Restart Inserted every  r  macroblocks, where  r  is the restart interval set by a DRI marker. Not used if there was no DRI marker. The low 3 bits of the marker code, cycles from 0 to 7. 0xFFE n variable  Application-specific For example, an  Exif  JPEG file uses an APP1 marker to store metadata, laid out in a structure based closely on  TIFF . 0xFFFE variable  Comment Contains a text comment. 0xFFD9 none End Of Image
The Compression Process nullcon Goa 2010 http://nullcon.net Colour space transformation from RGB to YCbCr (Optional) Down Sampling (4:4:4 or 4:2:2 or 4:2:0) (Optional) Block Splitting (8X8, 16 X8 or 16X16) Discrete Cosine transform Quantization Entropy Coding Final JPEG image data Results in higher values at top left of the matrix and a lot of low value at the bottom right The division table resulting in actual compression with lot of zero values at the bottom right corner Arranging the values in zig zag manner to get all the zero values at the end. Thus using a single byte to represent them Data hiding in LSB’s here
The JPEG Compression at work nullcon Goa 2010 http://nullcon.net DCT 8 X 8 Pixel data for one component e.g “Y” Averaged out matrix DCT Coefficients of the block
Cont…. nullcon Goa 2010 http://nullcon.net Round off quantized DCT Coefficients DCT Coefficients of the block Quantization table
Cont…. nullcon Goa 2010 http://nullcon.net -26, -3, 0, -3, -2, -6, 2, -4, 1, -4, 1, 1, 5, 1, 2, -1, 1, -12, 0, 0, 0, 0, 0, -1, -1, EOB Round off quantized DCT Coefficients Zig-Zag  arrangement of binaries Finally compressed block
GIF image ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Steganography techniques ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net Section 3
Appending data at the end of the file ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Inserting data in comment or junk field ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Data hiding with LSB ,[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Concept of LSB ,[object Object],01111111 10111111 11011111 11101111 11110111 11111011 11111101 11111110 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data hiding with LSB ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Image date in hex before hiding data Image date in Binary before hiding data Image date in Binary after hiding data Image date in hex after hiding data
Palette manipulation ,[object Object],nullcon Goa 2010 http://nullcon.net
[object Object],Palette manipulation nullcon Goa 2010 http://nullcon.net ,[object Object],[object Object],A better variation can be not using the exact colour but using the near approximation of that colour
Data Hiding strategies ,[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Section 4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
LSB Enhancement File: test.bmp  (Contains no hidden data) File: test1.bmp  (Contains hidden data)
Launch an LSB enhancement attack (Replacing all the bits in every byte with the LSB of that Byte) ,[object Object],[object Object],[object Object],[object Object]
Explanation ,[object Object],[object Object],[object Object]
Why this pattern emerge  (Nature of the ASCII ) Char Decimal Binary Hex a 97 011 00001  61  b 98 011 00010  62  c 99 011 00011  63  d 100 011 00100  64  e 101 011 00101  65  f 102 011 00110  66  g 103 011 00111  67  h 104 011 01000  68  I 105 011 01001  69  j 106 011 01010  6A  k 107 011 01011  6B  l 108 011 01100  6C  m 109 011 01101  6D  Char Decimal Binary Hex n 110 011 01110  6E  o 111 011 01111  6F  p 112 011 10000  70  q 113 011 10001  71  r 114 011 10010  72  s 115 011 10011  73  t 116 011 10100  74  u 117 011 10101  75  v 118 011 10110  76  w 119 011 10111  77  x 120 011 11000  78  y 121 011 11001  79  z 122 011 11010  7A
Data encryption  (The new challenge that defeats LSB enhancement attack) ,[object Object],[object Object],[object Object],[object Object]
Same text with various encryption and LSB enhanced images Text encrypted as ASCII Text encrypted as Binary with IDEA encryption  (S-Tools) Image with no data hidden
Which is the better option for hiding the data 1 2 3 4
Take a break and look at this Image nullcon Goa 2010 http://nullcon.net
Chi square test ,[object Object],[object Object]
How chi square works in steganalysis ,[object Object],[object Object],[object Object],[object Object],[object Object]
Lets see the chi square result of the images shown
Chi square with encrypted data in pure black image ,[object Object],[object Object]
Cracking the algorithm Jsteg ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Camouflage ,[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Other Methods ,[object Object],nullcon Goa 2010 http://nullcon.net File with no Hidden data File with Hidden data
Other methods ,[object Object],nullcon Goa 2010 http://nullcon.net With no data hidden it was compressed to 98.4% with Winrar With 5 MB of data hidden the file could not  achieve any compression with winrar If the hidden data is more than the file size in JPEG the compression will be close to 0
Other methods ,[object Object],nullcon Goa 2010 http://nullcon.net Plain white BMP image of 1.42 MB was compressed to 2 kb with winrar Plain white BMP image of 1.42 MB with 18 KB of hidden data was compressed to 48 kb with winrar Extremely colorful image  of 2.25 MB without any data hidden was compressed to 43.5% with winrar Extremely colorful image  of 2.25 MB with 500 KB of hidden datwithout any data hidden was compressed to 46.8% with winrar
Other Methods ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Other Methods ,[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Check these palettes nullcon Goa 2010 http://nullcon.net Palette of complete black image original Palette of complete black image as changed by S-tools after hiding the data
Check these palettes nullcon Goa 2010 http://nullcon.net Original Palette of image with Black red and a custom colour Palette as changed by S-tools
Other Methods and tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Few Steganalysis tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Section 5 Beyond Technology Dr. Reena Bhansali Prince Komal Boonlia
Peeping in Expressions Body Language  Micro expressions
Body Language
[object Object],[object Object],[object Object],[object Object],[object Object],Is it important
[object Object],[object Object],[object Object]
Deception A successful or unsuccessful deliberate attempt without forewarning, to create in another  belief which the communicator considers to be untrue. Deception involves acting in such a way which leads another person to believe something, that you, yourself, do not believe to be true (Ekman, Miller and Stiff).  If you have nothing to hide, why not tell the complete truth?
Non verbal Behavior and deception Emotions  Content Complexity Attempted Control Behaviour
Emotions Telling lie evokes emotions undergo Guilt, Fear, Duping Delight Liars might feel guilty because they are lying, might be afraid of getting caught, or might be excited about having the opportunity to fool someone The strength of these emotions depends on the personality of the liar and on the circumstances under which the lie takes place Guilt might results in gaze aversion Fear and Excitement might result in signs of arousal, limb movements, speech fillers, speech errors, facial emotional expressions or a high pitched voice.
Content Complexity ,[object Object],[object Object],[object Object]
Attempted Behavioral Control Liars are busy in Impression Management Convincing others requires suppressing nerves effectively, masking evidence of heightened cognitive load, knowledge of how an honest person normally behaves and ability to show the behavior. Usually they tend to over control themselves, resulting in behavior that looks rehearsed and rigid and speech that sounds too smooth. Performance may look contrived due to lack of involvement.
Non Verbal Cues ,[object Object],During Deception Non Verbal High Pitch of Voice Speech errors Illustrators Hand/Finger Movement > > < < Verbal Cues Unstructured Production Logical Structure Quantity of detail Contextual Embedding Description of interactions Reproduction of speech Unusual Detail Spontaneous Correction Admitting lack of memory < < < < < < < < <
Verbal Behavior and deception CBCA:- Criteria Based Content Analysis-is a  tool to assess the veracity of written statements, and is used as evidence in criminal courts in several countries in the world. CBCA scores are expected to be higher for truth tellers than for liars.  Assumptions:- (i) Lying is cognitively more difficult than truth telling, (ii)Liars are more concerned with the impression they make on others than truth tellers.  Three Phase A specific interview procedure to obtain a statement from information about what constitute a properly conducted interview Coding of the transcribed statement using the CBCA procedure  An evaluation of the CBCA outcomes
Physiological  Reactions and Deception  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Polygraph ,[object Object],[object Object],[object Object],[object Object]
CQT:- Control Question technique ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GKT:- Guilt Knowledge Test ,[object Object],[object Object],[object Object],[object Object],[object Object]
Validity of Polygraphs ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Counter-Measures to the Polygraph ,[object Object],[object Object],[object Object],[object Object],[object Object]
How Effective are Physical Counter-measures? ,[object Object],[object Object],[object Object],[object Object]
Mental Counter-Measures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Micro Expressions ,[object Object],[object Object],[object Object],[object Object]
Peeping in Words Statement Analysis
Statement Analysis is a very useful interviewing technique for detecting deception on the part of either the suspect or the victim. It's the process of examining a person's words to see exactly what they're saying.   I t's based on the principle that people do not lie. Most people want to tell the truth. Even liars will tell a partial truth. It's easier to tell a partial truth than to completely fabricate a statement It's been theorized that the psychological ID part of our personality, the subconscious primitive part, tends to be truthful at all times.  If we're being deceptive, a conflict occurs with our ID and it creates stress.  &quot;Vrij and Winkel (1993) stated that the deception framework includes both emotional and cognitive components.&quot; When a person lies, this causes a conflict within ourselves and creates stress (emotional).  That stress then triggers a sympathetic nervous system to act, as part of the &quot;Fight or Flight&quot; syndrome.   Statement Analysis
Technique Truthful statements differ from fabricated ones in both content and quality  Norm Investigators determine what is typical of a truthful statement Deviation from the norm
Part of Speech Extraneous Information Lack of Conviction Balance in statement Components
Important Parts Of Speech ,[object Object],[object Object],[object Object],[object Object],If a deviation from the norm appears, they then should ask, &quot;Why?&quot;
Extraneous Information Extraneous information in a statement also can provide clues to deception.  A truthful person with nothing to hide, when asked the question, &quot;What happened,&quot; will recount the events chronologically and concisely.  Any information given that does not answer this question is extraneous. People involved in crimes may feel the need to justify their actions.  In such cases, the information in the statements will not follow a logical time frame or will skirt what really happened.  They also may include more information than is necessary to tell the story. In such instances, investigators should scrutinize this extraneous information and question why this person felt the need to include it.
Lack of conviction When analyzing a statement, investigators should note if the person feigns a loss of memory by repeatedly inserting &quot;I don't remember&quot; or &quot;I can't recall.&quot;  They also should look to see if the person hedges during the narrative by using such phrases as &quot;I think,&quot; &quot;I believe,&quot; &quot;to the best of my knowledge,&quot; or &quot;kind of.&quot;  These phrases, also called qualifiers, serve to temper the action about to be described, thereby discounting the message before it even is transmitted.
Balance of statement A statement given by a suspect or an alleged victim should be examined by investigators for overall balance.  Statements should be more than just a series of details.  They need to sound like an account of the event.
[object Object],[object Object],[object Object],Truthful statement has THREE parts ,[object Object],[object Object],[object Object],If any part of a statement is incomplete or missing altogether, then the statement is probably false.
Signs to Observe ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Graphology
Time is an important element in the subject's statement. It can give us clues as to how much information the subject has provided.  Truthful people will provide a logical statement that follows a chronological time frame.  Deceptive people often won't.  Gaps in a statement indicate deception.  When a person says, &quot;I don't remember,&quot; they are often concealing a critical detail.  Any missing time elements should raise red flags  Time
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Emotions
Peeping in Mind Brain Fingerprinting
Criminal Brain   ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Techniques
[object Object],[object Object],[object Object],[object Object],[object Object],Techniques
Role in Criminal Findings ,[object Object],[object Object],[object Object],[object Object]
Investigation ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Investigation
Interview of the subject ,[object Object],[object Object],[object Object],[object Object]
Interview of the subject ,[object Object],[object Object],[object Object]
Interview of the subject ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Keep in mind
Keep in mind ,[object Object],[object Object],[object Object],[object Object],[object Object]
Scientific Testing with Brain Fingerprinting  ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Attributes
[object Object],[object Object],[object Object],Scientific Testing with Brain Fingerprinting
[object Object],[object Object],[object Object],[object Object],Scientific Testing with Brain Fingerprinting
A Good Password  ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object]
Social Engineering should we USE or not BUT  If they can why cant we!!!!
[object Object],[object Object],[object Object],[object Object],[object Object],Why use Social Engineering
[object Object],Reverse Social Engineering
[object Object],Reverse /Social Engineering
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Reverse Social Engineering
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Why it works!!!!
nullcon Goa 2010 http://nullcon.net You can reach us at [email_address] [email_address]

Weitere ähnliche Inhalte

Andere mochten auch

5. [Daily hack] Truecrypt
5. [Daily hack] Truecrypt5. [Daily hack] Truecrypt
5. [Daily hack] Truecryptdefconmoscow
 
Steganography
SteganographySteganography
SteganographyPavninder
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystemsdmc5abdulla
 
DWT based approach for steganography using biometrics
DWT based approach for steganography using biometricsDWT based approach for steganography using biometrics
DWT based approach for steganography using biometricsSri Madhur
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYacijjournal
 
One-Byte Modification for Breaking Memory Forensic Analysis
One-Byte Modification for Breaking Memory Forensic AnalysisOne-Byte Modification for Breaking Memory Forensic Analysis
One-Byte Modification for Breaking Memory Forensic AnalysisTakahiro Haruyama
 
PDF secrets - hiding & revealing secrets in PDF documents
PDF secrets - hiding & revealing secrets in PDF documentsPDF secrets - hiding & revealing secrets in PDF documents
PDF secrets - hiding & revealing secrets in PDF documentsAnge Albertini
 
Windows Memory Forensic Analysis using EnCase
Windows Memory Forensic Analysis using EnCaseWindows Memory Forensic Analysis using EnCase
Windows Memory Forensic Analysis using EnCaseTakahiro Haruyama
 
HITCON CTF 2016導覽
HITCON CTF 2016導覽HITCON CTF 2016導覽
HITCON CTF 2016導覽HITCON GIRLS
 
Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Mohamed Loey
 
QR Codes PowerPoint Presentation
QR Codes PowerPoint PresentationQR Codes PowerPoint Presentation
QR Codes PowerPoint PresentationZachary Moore
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 

Andere mochten auch (20)

Windows Forensics
Windows ForensicsWindows Forensics
Windows Forensics
 
5. [Daily hack] Truecrypt
5. [Daily hack] Truecrypt5. [Daily hack] Truecrypt
5. [Daily hack] Truecrypt
 
Steganography
SteganographySteganography
Steganography
 
Decoding QR codes
Decoding QR codesDecoding QR codes
Decoding QR codes
 
Steganography
SteganographySteganography
Steganography
 
2 classical cryptosystems
2 classical cryptosystems2 classical cryptosystems
2 classical cryptosystems
 
DWT based approach for steganography using biometrics
DWT based approach for steganography using biometricsDWT based approach for steganography using biometrics
DWT based approach for steganography using biometrics
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
 
One-Byte Modification for Breaking Memory Forensic Analysis
One-Byte Modification for Breaking Memory Forensic AnalysisOne-Byte Modification for Breaking Memory Forensic Analysis
One-Byte Modification for Breaking Memory Forensic Analysis
 
Memory Forensics
Memory ForensicsMemory Forensics
Memory Forensics
 
PDF secrets - hiding & revealing secrets in PDF documents
PDF secrets - hiding & revealing secrets in PDF documentsPDF secrets - hiding & revealing secrets in PDF documents
PDF secrets - hiding & revealing secrets in PDF documents
 
Windows Memory Forensic Analysis using EnCase
Windows Memory Forensic Analysis using EnCaseWindows Memory Forensic Analysis using EnCase
Windows Memory Forensic Analysis using EnCase
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
HITCON CTF 2016導覽
HITCON CTF 2016導覽HITCON CTF 2016導覽
HITCON CTF 2016導覽
 
Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1
 
QR code
QR codeQR code
QR code
 
QR Codes PowerPoint Presentation
QR Codes PowerPoint PresentationQR Codes PowerPoint Presentation
QR Codes PowerPoint Presentation
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
Steganography Steganography
Steganography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Ähnlich wie nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Perspective

Ähnlich wie nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Perspective (20)

Image stegnography and steganalysis
Image stegnography and steganalysisImage stegnography and steganalysis
Image stegnography and steganalysis
 
Dip
DipDip
Dip
 
//STEIM Workshop: A Vernacular of File Formats
//STEIM Workshop: A Vernacular of File Formats//STEIM Workshop: A Vernacular of File Formats
//STEIM Workshop: A Vernacular of File Formats
 
Lecture 2-2023.pdf
Lecture 2-2023.pdfLecture 2-2023.pdf
Lecture 2-2023.pdf
 
Lecture 2-2023.pdf
Lecture 2-2023.pdfLecture 2-2023.pdf
Lecture 2-2023.pdf
 
Image compression and jpeg
Image compression and jpegImage compression and jpeg
Image compression and jpeg
 
Compression presentation 415 (1)
Compression presentation 415 (1)Compression presentation 415 (1)
Compression presentation 415 (1)
 
Multimedia Object - Image
Multimedia Object - ImageMultimedia Object - Image
Multimedia Object - Image
 
Commonly Used Image File Formats
Commonly Used Image File FormatsCommonly Used Image File Formats
Commonly Used Image File Formats
 
File types photorestoration and panoramics
File types photorestoration and panoramicsFile types photorestoration and panoramics
File types photorestoration and panoramics
 
PPT
PPTPPT
PPT
 
Jpegxr readme
Jpegxr readmeJpegxr readme
Jpegxr readme
 
Jpeg
JpegJpeg
Jpeg
 
Unit i mm_chap3_graphics and image data representation
Unit i mm_chap3_graphics and image data representationUnit i mm_chap3_graphics and image data representation
Unit i mm_chap3_graphics and image data representation
 
Mm01 a vformat
Mm01 a vformatMm01 a vformat
Mm01 a vformat
 
Jpeg and mpeg ppt
Jpeg and mpeg pptJpeg and mpeg ppt
Jpeg and mpeg ppt
 
Digital image formats
Digital image formatsDigital image formats
Digital image formats
 
Image Files Formats
Image Files FormatsImage Files Formats
Image Files Formats
 
ColorLab.pdf
ColorLab.pdfColorLab.pdf
ColorLab.pdf
 
Lec2
Lec2Lec2
Lec2
 

Mehr von n|u - The Open Security Community

Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...n|u - The Open Security Community
 

Mehr von n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Kürzlich hochgeladen

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Kürzlich hochgeladen (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Perspective

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Pixel: The building block of Image
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. The BMP header This is intel Processor so Use little Endian system
  • 15. The DIB header Offset # Size Purpose Eh 4 the size of this header (40 bytes) 12h 4 the bitmap width in pixels 16h 4 the bitmap height in pixels. 1Ah 2 the number of color planes being used. Must be set to 1. 1Ch 2 the number of bits per pixel, which is the color depth of the image. Typical values are 1, 4, 8, 16, 24 and 32. 1Eh 4 the compression method being used. 22h 4 the image size. This is the size of the raw bitmap data , and should not be confused with the file size. 26h 4 the horizontal resolution of the image. (pixel per meter, signed integer) 2Ah 4 the vertical resolution of the image. (pixel per meter, signed integer) 2Eh 4 the number of colors in the color palette, or 0 to default to 2 n . 32h 4 the number of important colors used, or 0 when every color is important; generally ignored.
  • 16.
  • 17.
  • 18. JPEG File structure (JFIF) nullcon Goa 2010 http://nullcon.net Source: Wikipedia Bytes Payload Name Comments 0xFFD8 none Start Of Image 0xFFC0 variable Start Of Frame (Baseline DCT) Indicates that this is a baseline DCT-based JPEG, and specifies the width, height, number of components, and component subsampling (e.g., 4:2:0). 0xFFC2 variable Start Of Frame (Progressive DCT) Indicates that this is a progressive DCT-based JPEG, and specifies the width, height, number of components, and component subsampling (e.g., 4:2:0). 0xFFC4 variable Huffman Table(s) Specifies one or more Huffman tables. 0xFFDB variable Quantization Table(s) Specifies one or more quantization tables. 0xFFDD 2 bytes Define Restart Interval Specifies the interval between RST n markers, in macroblocks. This marker is followed by two bytes indicating the fixed size so it can be treated like any other variable size segment. 0xFFDA variable Start Of Scan Begins a top-to-bottom scan of the image. In baseline DCT JPEG images, there is generally a single scan. Progressive DCT JPEG images usually contain multiple scans. This marker specifies which slice of data it will contain, and is immediately followed by entropy-coded data. 0xFFD0 … 0xFFD7 none Restart Inserted every r macroblocks, where r is the restart interval set by a DRI marker. Not used if there was no DRI marker. The low 3 bits of the marker code, cycles from 0 to 7. 0xFFE n variable Application-specific For example, an Exif JPEG file uses an APP1 marker to store metadata, laid out in a structure based closely on TIFF . 0xFFFE variable Comment Contains a text comment. 0xFFD9 none End Of Image
  • 19. The Compression Process nullcon Goa 2010 http://nullcon.net Colour space transformation from RGB to YCbCr (Optional) Down Sampling (4:4:4 or 4:2:2 or 4:2:0) (Optional) Block Splitting (8X8, 16 X8 or 16X16) Discrete Cosine transform Quantization Entropy Coding Final JPEG image data Results in higher values at top left of the matrix and a lot of low value at the bottom right The division table resulting in actual compression with lot of zero values at the bottom right corner Arranging the values in zig zag manner to get all the zero values at the end. Thus using a single byte to represent them Data hiding in LSB’s here
  • 20. The JPEG Compression at work nullcon Goa 2010 http://nullcon.net DCT 8 X 8 Pixel data for one component e.g “Y” Averaged out matrix DCT Coefficients of the block
  • 21. Cont…. nullcon Goa 2010 http://nullcon.net Round off quantized DCT Coefficients DCT Coefficients of the block Quantization table
  • 22. Cont…. nullcon Goa 2010 http://nullcon.net -26, -3, 0, -3, -2, -6, 2, -4, 1, -4, 1, 1, 5, 1, 2, -1, 1, -12, 0, 0, 0, 0, 0, -1, -1, EOB Round off quantized DCT Coefficients Zig-Zag arrangement of binaries Finally compressed block
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. LSB Enhancement File: test.bmp (Contains no hidden data) File: test1.bmp (Contains hidden data)
  • 35.
  • 36.
  • 37. Why this pattern emerge (Nature of the ASCII ) Char Decimal Binary Hex a 97 011 00001 61 b 98 011 00010 62 c 99 011 00011 63 d 100 011 00100 64 e 101 011 00101 65 f 102 011 00110 66 g 103 011 00111 67 h 104 011 01000 68 I 105 011 01001 69 j 106 011 01010 6A k 107 011 01011 6B l 108 011 01100 6C m 109 011 01101 6D Char Decimal Binary Hex n 110 011 01110 6E o 111 011 01111 6F p 112 011 10000 70 q 113 011 10001 71 r 114 011 10010 72 s 115 011 10011 73 t 116 011 10100 74 u 117 011 10101 75 v 118 011 10110 76 w 119 011 10111 77 x 120 011 11000 78 y 121 011 11001 79 z 122 011 11010 7A
  • 38.
  • 39. Same text with various encryption and LSB enhanced images Text encrypted as ASCII Text encrypted as Binary with IDEA encryption (S-Tools) Image with no data hidden
  • 40. Which is the better option for hiding the data 1 2 3 4
  • 41. Take a break and look at this Image nullcon Goa 2010 http://nullcon.net
  • 42.
  • 43.
  • 44. Lets see the chi square result of the images shown
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53. Check these palettes nullcon Goa 2010 http://nullcon.net Palette of complete black image original Palette of complete black image as changed by S-tools after hiding the data
  • 54. Check these palettes nullcon Goa 2010 http://nullcon.net Original Palette of image with Black red and a custom colour Palette as changed by S-tools
  • 55.
  • 56.
  • 57. Section 5 Beyond Technology Dr. Reena Bhansali Prince Komal Boonlia
  • 58. Peeping in Expressions Body Language Micro expressions
  • 60.
  • 61.
  • 62. Deception A successful or unsuccessful deliberate attempt without forewarning, to create in another belief which the communicator considers to be untrue. Deception involves acting in such a way which leads another person to believe something, that you, yourself, do not believe to be true (Ekman, Miller and Stiff). If you have nothing to hide, why not tell the complete truth?
  • 63. Non verbal Behavior and deception Emotions Content Complexity Attempted Control Behaviour
  • 64. Emotions Telling lie evokes emotions undergo Guilt, Fear, Duping Delight Liars might feel guilty because they are lying, might be afraid of getting caught, or might be excited about having the opportunity to fool someone The strength of these emotions depends on the personality of the liar and on the circumstances under which the lie takes place Guilt might results in gaze aversion Fear and Excitement might result in signs of arousal, limb movements, speech fillers, speech errors, facial emotional expressions or a high pitched voice.
  • 65.
  • 66. Attempted Behavioral Control Liars are busy in Impression Management Convincing others requires suppressing nerves effectively, masking evidence of heightened cognitive load, knowledge of how an honest person normally behaves and ability to show the behavior. Usually they tend to over control themselves, resulting in behavior that looks rehearsed and rigid and speech that sounds too smooth. Performance may look contrived due to lack of involvement.
  • 67.
  • 68. Verbal Behavior and deception CBCA:- Criteria Based Content Analysis-is a tool to assess the veracity of written statements, and is used as evidence in criminal courts in several countries in the world. CBCA scores are expected to be higher for truth tellers than for liars. Assumptions:- (i) Lying is cognitively more difficult than truth telling, (ii)Liars are more concerned with the impression they make on others than truth tellers. Three Phase A specific interview procedure to obtain a statement from information about what constitute a properly conducted interview Coding of the transcribed statement using the CBCA procedure An evaluation of the CBCA outcomes
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79. Peeping in Words Statement Analysis
  • 80. Statement Analysis is a very useful interviewing technique for detecting deception on the part of either the suspect or the victim. It's the process of examining a person's words to see exactly what they're saying.   I t's based on the principle that people do not lie. Most people want to tell the truth. Even liars will tell a partial truth. It's easier to tell a partial truth than to completely fabricate a statement It's been theorized that the psychological ID part of our personality, the subconscious primitive part, tends to be truthful at all times. If we're being deceptive, a conflict occurs with our ID and it creates stress. &quot;Vrij and Winkel (1993) stated that the deception framework includes both emotional and cognitive components.&quot; When a person lies, this causes a conflict within ourselves and creates stress (emotional). That stress then triggers a sympathetic nervous system to act, as part of the &quot;Fight or Flight&quot; syndrome.   Statement Analysis
  • 81. Technique Truthful statements differ from fabricated ones in both content and quality Norm Investigators determine what is typical of a truthful statement Deviation from the norm
  • 82. Part of Speech Extraneous Information Lack of Conviction Balance in statement Components
  • 83.
  • 84. Extraneous Information Extraneous information in a statement also can provide clues to deception. A truthful person with nothing to hide, when asked the question, &quot;What happened,&quot; will recount the events chronologically and concisely. Any information given that does not answer this question is extraneous. People involved in crimes may feel the need to justify their actions. In such cases, the information in the statements will not follow a logical time frame or will skirt what really happened. They also may include more information than is necessary to tell the story. In such instances, investigators should scrutinize this extraneous information and question why this person felt the need to include it.
  • 85. Lack of conviction When analyzing a statement, investigators should note if the person feigns a loss of memory by repeatedly inserting &quot;I don't remember&quot; or &quot;I can't recall.&quot; They also should look to see if the person hedges during the narrative by using such phrases as &quot;I think,&quot; &quot;I believe,&quot; &quot;to the best of my knowledge,&quot; or &quot;kind of.&quot; These phrases, also called qualifiers, serve to temper the action about to be described, thereby discounting the message before it even is transmitted.
  • 86. Balance of statement A statement given by a suspect or an alleged victim should be examined by investigators for overall balance. Statements should be more than just a series of details. They need to sound like an account of the event.
  • 87.
  • 88.
  • 89.
  • 90. Time is an important element in the subject's statement. It can give us clues as to how much information the subject has provided. Truthful people will provide a logical statement that follows a chronological time frame. Deceptive people often won't. Gaps in a statement indicate deception. When a person says, &quot;I don't remember,&quot; they are often concealing a critical detail. Any missing time elements should raise red flags Time
  • 91.
  • 92. Peeping in Mind Brain Fingerprinting
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114. Social Engineering should we USE or not BUT If they can why cant we!!!!
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120. nullcon Goa 2010 http://nullcon.net You can reach us at [email_address] [email_address]