Anti-Virus - Backup - Encryption - File System - Forensics Media - Networking - Office - Password Recovery Pen-Testing - Registry - System - Utilities

Total Page:16

File Type:pdf, Size:1020Kb

Anti-Virus - Backup - Encryption - File System - Forensics Media - Networking - Office - Password Recovery Pen-Testing - Registry - System - Utilities Katana Tool Kit: Portable Applications Anti-Virus - Backup - Encryption - File System - Forensics Media - Networking - Office - Password Recovery Pen-Testing - Registry - System - Utilities Portable applications are those which do not require installation on a system to be executed. They can be run directly from an external device allowing you to bring all your favorite applications around with you on one drive. The Katana Tool Kit comes preconfigured with over a hundred portable applications. Anti-Virus ClamAV 0.96 ClamWin Portable is the popular ClamWin antivirus packaged as a portable app, so you can take your antivirus with you to scan files on the go. You can place it on your USB flash drive, iPod, portable hard drive or a CD and use it on any computer, without leaving any personal information behind. SpyDLLRemover 3.2 SpyDLLRemover is the standalone tool to effectively detect and delete spywares from the system. It comes with advanced spyware scanner which quickly discovers hidden Rootkit processes as well suspcious/injected DLLs within all running processes. StreamArmor 1 StreamArmor is the sophisticated tool for discovering hidden alternate data streams (ADS) as well as clean them completely from the system. It's advanced auto analysis coupled with online threat verification mechanism makes it the best tool available in the market for eradicating the evil streams. StreamArmor comes with fast multi threaded ADS scanner which can recursively scan over entire system and quickly uncover all hidden streams. Backup Unstoppable Copier 4.4 Unstoppable Copier is a Free Portable tool that allows you to recover files from hard drives, flash drives, CDs/DVDs and other media disks that have physical damage or are starting to go bad. I.E (copy files from disks with bad sectors, CDs or DVD's with scratches or drives that display read errors while accessing data). Unstoppable Copier is very intuitive and super easy to use. From intense data recovery to skipping damaged files completely, the data recovery level is fully adjustable. Encryption FreeOTFE 5.21 FreeOTFE is a free, open source, "on-the-fly" transparent disk encryption program for PCs. Using this software, you can create one or more "virtual disks" on your PC. These disks operate exactly like a normal disk, with the exception that anything written to one of them is transparently, and securely, encrypted before being stored on your computer's hard drive. Keypass 1.17 KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish). TrueCypt 6.3a Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux File System Eraser 5.8.8 Eraser Portable is a secure data removal tool that runs directly from your iPod, USB thumbdrive, portable hard drive or any other portable media. You can plug it right into any Windows computer and use it just like you would on your own. It is a repackaged version of the popular Eraser utility designed with portability in mind, so it has all the same great features of Eraser, but there's nothing to install. CCleaner 2.27.1070 CCleaner is a Portable System Cleaner, system optimization and privacy tool that can help speed up Windows and free up valuable hard disk space. It can remove unused files from your system and further clean all traces of your personal online activities like your Internet browsing history, typed urls, cookies, index, dat files and much more. Best of all, it's portable software, so you can bring it with you on a USB flash drive or other external device. CleanAfterMe 1.37 CleanAfterMe allows you to easily clean files and Registry entries that are automatically created by the Windows operating system during your regular computer work. With CleanAfterMe, you can clean the cookies/history/cache/passwords of Internet Explorer, the 'Recent' folder, the Registry entries that record the last opened files, the temporary folder of Windows, the event logs, the Recycle Bin, and more. Dist Wipe 1.5 Disk Wipe is Free, portable Windows application for permanent volume data destruction. With Disk Wipe you can erase all disk data and prevent recovery of those data. Formatting a hard drive with regular method leaves an open possibility to recover the data back. WinDirStat 1.1.2.80 WinDirStat Portable is a disk usage analyzer and cleanup tool packaged as a portable app, so you can see exactly what's on your device or a host computer's hard drive and easily free up space. Forensics ChromeCacheView 1.22 ChromeCacheView is a small utility that reads the cache folder of Google Chrome Web browser, and displays the list of all files currently stored in the cache. For each cache file, the following information is displayed: URL, Content type, File size, Last accessed time, Expiration time, Server name, Server response, and more. You can easily select one or more items from the cache list, and then extract the files to another folder, or copy the URLs list to the clipboard. FavoritesView 1.25 FavoritesView displays the list of all your Favorties (of Internet Explorer browser) and bookmarks (of Netscape/Mozilla browsers) in a single page. Each line in the list specifies the title of the item, the URL address, the created/modified date of the bookmark item, and the folder name. You select one or more of these bookmarks, and then copy them to the clipboard, delete them (Only for Internet Explorer Favorites), export them to tab-delimited text file, HTML file, or XML file. FavoritesView also allows you to locate duplicate URL addresses in your Favorites/Bookmarks or find specific item by specifying the URL or the title. FileAlyzer 1.6.0.4 FileAlyzer allows a basic analysis of files (showing file properties and file contents in hex dump form) and is able to interpret common file contents like resources structures (like text, graphics, HTML, media and PE). FindSSN 4.2 Find_SSNs is not a silver bullet against identity theft. It helps individuals and organizations find sensitive numbers in files on computers. It does not secure the files it discovers. It may produce false positives and false negatives. It may miss some files altogether. Use it as part of a larger plan to identify and protect sensitive data stored on computers. Do not rely solely on it. To be 100% certain that sensitive data does not exist in files, humans should manually examine the files. Preventing sensitive data disclosures is a process. Organizations should have ongoing, recurring efforts in place to locate and secure sensitive data before a break-in occurs. You should also note that Find_SSNs is a tool. Like any tool, it can be used for good or bad purposes. For example, it can just as easily be used by 'bad guys' to find your sensitive data before you do. FolderAlyzer 1.6.0.4 FolderAlyzer allows a basic analysis of folders and content. Forensic Acquisition Utilities 1.3.0.2390a This is a collection of utilities and libraries By George M. Garner Jr. is intended for forensic or forensic-related investigative use in a modern Microsoft Windows environment. The components in this collection are intended to permit the investigator to sterilize media for forensic duplication, discover where logical volume information is located and to collect the evidence from a running computer system while at the same time ensuring data integrity (e.g. with a cryptographic checksums) and while minimizing distortive alterations to the subject system. * dd: A completely new implementation inspired by the popular GNU dd utility program. * volume_dump: An original utility to dump volume information and drive information and USN journals. * fmdata: An original utility to collect files system metadata, to produce and verify security catalogs (cryptographic hash sets) using one or more cryptographic hash algorithms and to verify system binaries using the system file checker (SFC) API. * wipe: An original utility to sterilize media prior to forensic duplication. * nc: A completely new implementation of the popular Netcat utility inspired by the original version created by Hobbit. Hex-Ed 1.01.04 HEX-ED is a Free Portable Hex Editor that is both small and efficient. It was originally used by it's author to modify programs written in assembler. Hex-Ed began life decades ago, as a BASIC program compiled in BASCOM under CP/M. The author has since recompiled Hex-ED in Visual C for Windows, first 16 bits and now 32 bits. IECacheView 1.32 IECacheView is a small utility that reads the cache folder of Internet Explorer, and displays the list of all files currently stored in the cache. For each cache file, the following information is displayed: Filename, Content Type, URL, Last Accessed Time, Last Modified Time, Expiration Time, Number Of Hits, File Size, Folder Name, and full path of the cache filename. You can easily save the cache information into text/html/xml file, or copy the cache table to the clipboard and then paste it to another application, like Excel or OpenOffice Spreadsheet. IECookiesView 1.74 This utility displays the details of all cookies that Internet Explorer stores on your computer. In addition, it allows you to change the content of the cookies, delete unwanted cookies files, save the cookies into a readable text file, find cookies by specifying the domain name, view the cookies of other users and in other computers, and more..
Recommended publications
  • Omegakey Manage Your Device at the Management Module
    Welcome to use our latest version of Lost Mode How to Start to Use it Bluetooth tracker. Detect the distance between the device and Bluetooth Tracker module your phone under the lost mode .Turn on the Step 1: Download the latest version App(version 1.6.0) from Apple App store. omegakey Manage your device at the management module. alarm at alert whether the device is lost, there Step 2: Open the Bluetooth and App. are two levels of lost alarm mode. Select the Thank you for purchasing omegakey Freely set and remove your device here. Step 3: Tap the Beacon for 3-5 times on hard surface, and the Beacon will be connectable when you Double-click the “call” button to find your device. alarm mode you want from the device. Phone hear a buzz. alarm, and both ends alarm. Step 4: Click the Beacon in the App which you want to configure and enter a name to connect it. Step 5: Now, you can configure and use the Beacon normally. NEXT Note: If you're having trouble with the Bluetooth, we recommend you completely remove the battery from the unit for 10 sec and reinsert it. There are many apps you can download some are better than others, we have linked just click on the apple / android icons on the first page Once you have selected the app you like download it and follow the on screen instructions ATTACH BLUETOOTH BEACON EXTERNALLY FOR MAX PERFORMANCE Found mode More View the alarm location or item's last location Find the device under the find mode according p.s make sure your Bluetooth is on and your phone is compatible with 4.0 Bluetooth to the strength of the signal.
    [Show full text]
  • A Future-Focused Forensic Imager Designed to Streamline Evidence Collection Processes
    A Future-Focused Forensic Imager Designed to Streamline Evidence Collection Processes Extremely fast forensic imaging speed surpassing 50GB/min. Clone PCIe to PCIe at speeds above 90GB/min Image to/from Thunderbolt™ 3/USB-C external storage enclosures with an optional I/O card. Image and verify from up to 5 source drives up to 9 destinations simultaneously Create a logical image to capture only specific files needed Concurrent Image+Verify greatly reduces duration of image plus verification process Two 10GbE connections provide fast network imaging performance Network capture feature to capture network traffic, VOIP, internet activity Multi-task. Image from multiple sources simultaneously FEATURES n The Falcon®-NEO achieves imaging speeds when imaging directly to large capacity Thunder- n Image from a Mac® computer with USB-C ports surpassing 50GB/min and can clone PCIe to PCIe bolt 3 RAID storage enclosures for evidence data using a USB-C to USB-A cable and Target Disk at speeds at over 90GB/min. collection. The card connects to the Falcon-NEO’s Mode or use Logicube’s USB boot device to n Image and verify to multiple image formats; 2 write-blocked source I/O ports or 1 destination I/O image a source drive from a Mac computer on the native copy, .dd, dmg, e01 and ex01. The Falcon- port. The I/O card does not currently support imaging same network without booting the Mac computer’s ® NEO provides MD5, SHA1, SHA256, and dual hash in TDM from Mac systems, refer to the Falcon-NEO native OS. The Falcon-NEO supports imaging from ® authentication at extremely fast speeds.
    [Show full text]
  • Mobiflage: Deniable Storage Encryption for Mobile Devices 3
    TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 1 Mobiflage: Deniable Storage Encryption for Mobile Devices Adam Skillen and Mohammad Mannan Abstract—Data confidentiality can be effectively preserved through encryption. In certain situations, this is inadequate, as users may be coerced into disclosing their decryption keys. Steganographic techniques and deniable encryption algorithms have been devised to hide the very existence of encrypted data. We examine the feasibility and efficacy of deniable encryption for mobile devices. To address obstacles that can compromise plausibly deniable encryption (PDE) in a mobile environment, we design a system called Mobiflage. Mobiflage enables PDE on mobile devices by hiding encrypted volumes within random data in a devices free storage space. We leverage lessons learned from deniable encryption in the desktop environment, and design new countermeasures for threats specific to mobile systems. We provide two implementations for the Android OS, to assess the feasibility and performance of Mobiflage on different hardware profiles. MF-SD is designed for use on devices with FAT32 removable SD cards. Our MF-MTP variant supports devices that instead share a single internal partition for both apps and user accessible data. MF-MTP leverages certain Ext4 file system mechanisms and uses an adjusted data-block allocator. These new techniques for storing hidden volumes in Ext4 file systems can also be applied to other file systems to enable deniable encryption for desktop OSes and other mobile platforms. Index Terms—File system security, Mobile platform security, Storage Encryption, Deniable encryption ✦ 1 INTRODUCTION AND MOTIVATION plaintext can be recovered by decrypting with the true key. In the event that a ciphertext is intercepted, and the Smartphones and other mobile computing devices are user is coerced into revealing the key, she may instead being widely adopted globally.
    [Show full text]
  • Deep Web for Journalists: Comms, Counter-Surveillance, Search
    Deep Web for Journalists: Comms, Counter-surveillance, Search Special Complimentary Edition for Delegates attending the 28th World Congress of the International Federation of Journalists * By Alan Pearce Edited by Sarah Horner * © Alan Pearce June 2013 www.deepwebguides.com Table of Contents Introduction by the International Federation of Journalists A Dangerous Digital World What is the Deep Web and why is it useful to Journalists? How Intelligence Gathering Works How this affects Journalists 1 SECURITY ALERT . Setting up Defenses 2 Accessing Hidden Networks . Using Tor . Entry Points 3 Secure Communications . Email . Scramble Calls . Secret Messaging . Private Messaging . Deep Chat . Deep Social Networks 4 Concealed Carry 5 Hiding Things . Transferring Secret Data . Hosting, Storing and Sharing . Encryption . Steganography – hiding things inside things 6 Smartphones . Counter-Intrusion . 007 Apps 7 IP Cameras 8 Keeping out the Spies . Recommended Free Programs . Cleaning Up . Erasing History . Alternative Software Share the Knowledge About the Authors Foreword by the International Federation of Journalists Navigating the Dangerous Cyber Jungle Online media safety is of the highest importance to the International Federation of Journalists. After all, the victims are often our members. The IFJ is the world’s largest organization of journalists and our focus is on ways and means to stop physical attacks, harassment and the killing of journalists and media staff. In an age where journalism – like everything else in modern life – is dominated by the Internet, online safety is emerging as a new front. In this new war, repressive regimes now keep a prying eye on what journalists say, write and film. They want to monitor contacts and they want to suppress information.
    [Show full text]
  • Mobigyges: a Mobile Hidden Volume for Preventing Data Loss, Improving Storage Utilization, and Avoiding Device Reboot
    MobiGyges: A Mobile Hidden Volume for Preventing Data Loss, Improving Storage Utilization, and Avoiding Device Reboot Wendi Fenga, Chuanchang Liua, Zehua Guob,c, Thar Bakerd, Gang Wangb,c, Meng Wanga, Bo Chenga, and Junliang Chena aBeijing University of Posts and Telecommunications, 10 Xitucheng RD, 100876, Beijing, China bBeijing Institute of Technology, 5 Zhongguancun ST South, 100081, Beijing, China cUniversity of Minnesota Twin Cities, 117 Pleasant ST, 55455, Minneapolis, USA dLiverpool John Moores University, James Parson Building, Liverpool, L3 3AF, UK Abstract Sensitive data protection is essential for mobile users. Plausibly Deniable Encryption (PDE) systems provide an effective manner to protect sensitive data by hiding them on the device. However, existing PDE systems can lose data due to overriding the hidden volume, waste physical storage because of the \reserved area" used for avoiding data loss, and require device reboot when using the hidden volume. This paper presents MobiGyges, a hidden volume based mobile PDE system, to fill the gap. MobiGyges addresses the problem of data loss by restricting each storage block used only by one volume, and it improves storage utilization by eliminating the \reserved area". MobiGyges can also avoid device reboot by mounting the hidden volume dynamically on-demand with the Dynamic Mounting service. Moreover, we identify two novel PDE oriented attacks, the capacity comparison attack and the fill-to-full attack. MobiGyges can defend them by jointly leveraging the Shrunk U-disk method and multi-level deniability. We implement the MobiGyges proof-of-concept system on a real mobile phone Google Nexus 6P with LineageOS 13. Experimental results show that MobiGyges prevents data loss, avoids device reboot, improves storage utilization by over 30% with acceptable performance overhead compared with current works.
    [Show full text]
  • Or As I Like to Call It, Occult Computing Adrian Crenshaw
    Or as I like to call it, Occult Computing Adrian Crenshaw http://Irongeek.com I run Irongeek.com I have an interest in InfoSec education I don’t know everything - I’m just a geek with time on my hands http://Irongeek.com Occult comes from the Latin word occultus (clandestine, hidden, secret), referring to "knowledge of the hidden". Forensic: Relating to the use of science and technology in the investigation and establishment of facts or evidence in a court of law. Since hiding activities is what we are doing, Occult Computing seems like a good name. Since people are not necessarily hiding their activities from a court of law, the term anti-forensics may not apply. Occult Computing sounds cooler than Anti-forensics Cthulhu fhtagn http://Irongeek.com Thanks to Wikipedia and Wiktionary for wording of definitions Why: Not about just hiding your stash from the Fuzz… Law/policy enforcement may find it useful to know how folks hide their computer activities Users may want to know how to hide their activities from invasive law/policy enforcement Companies may want to know how to clear boxes before donating them What: Mostly Windows, but most ideas are applicable to other operating systems Not going to cover malware analysis, nor network anti-forensics (at least not much) Mostly we will cover hiding tracks left on storage media http://Irongeek.com 1. Don’t leave tracks in the first place 2. Selective file removal and encryption tools 3. Parlor Tricks 4. Nuke it from orbit, it's the only way to be sure http://Irongeek.com Bow down before my Venn diagram of doom!!! If it’s not easy, folks won’t do it.
    [Show full text]
  • Comparison of Disk Encryption Software 1 Comparison of Disk Encryption Software
    Comparison of disk encryption software 1 Comparison of disk encryption software This is a technical feature comparison of different disk encryption software. Background information Name Developer First released Licensing Maintained? ArchiCrypt Live Softwaredevelopment Remus ArchiCrypt 1998 Proprietary Yes [1] BestCrypt Jetico 1993 Proprietary Yes BitArmor DataControl BitArmor Systems Inc. 2008-05 Proprietary Yes BitLocker Drive Encryption Microsoft 2006 Proprietary Yes Bloombase Keyparc Bloombase 2007 Proprietary Yes [2] CGD Roland C. Dowdeswell 2002-10-04 BSD Yes CenterTools DriveLock CenterTools 2008 Proprietary Yes [3][4][5] Check Point Full Disk Encryption Check Point Software Technologies Ltd 1999 Proprietary Yes [6] CrossCrypt Steven Scherrer 2004-02-10 GPL No Cryptainer Cypherix (Secure-Soft India) ? Proprietary Yes CryptArchiver WinEncrypt ? Proprietary Yes [7] cryptoloop ? 2003-07-02 GPL No cryptoMill SEAhawk Proprietary Yes Discryptor Cosect Ltd. 2008 Proprietary Yes DiskCryptor ntldr 2007 GPL Yes DISK Protect Becrypt Ltd 2001 Proprietary Yes [8] cryptsetup/dmsetup Christophe Saout 2004-03-11 GPL Yes [9] dm-crypt/LUKS Clemens Fruhwirth (LUKS) 2005-02-05 GPL Yes DriveCrypt SecurStar GmbH 2001 Proprietary Yes DriveSentry GoAnywhere 2 DriveSentry 2008 Proprietary Yes [10] E4M Paul Le Roux 1998-12-18 Open source No e-Capsule Private Safe EISST Ltd. 2005 Proprietary Yes Dustin Kirkland, Tyler Hicks, (formerly [11] eCryptfs 2005 GPL Yes Mike Halcrow) FileVault Apple Inc. 2003-10-24 Proprietary Yes FileVault 2 Apple Inc. 2011-7-20 Proprietary
    [Show full text]
  • A New Standard in Digital Forensics
    A New Standard in Digital Forensics Extremely fast forensic imaging at over 30GB/min* Image and verify from 4 source drives to 5 destinations Write-blocked preview & triage of suspect drive contents Image to or from a network location Multi-task. Set Image, wipe, hash tasks to run concurrently Targeted Imaging feature allows you to create a logical image using pre-set, custom filters, file signature filters and/or keyword search to capture only specific files needed Supports PCIe SSDs (M.2 SATA/AHCI/NVME type) with optional adapters Without exception, the most technologically advanced forensic imaging solution available. Blazing fast performance, feature-packed, and designed to meet future technology advances, the Falcon sets a new standard of excellence in digital forensic imaging solutions. FEATURES ­n The Falcon is blazing fast with imaging speeds of ­n Built-in support for SAS/SATA/USB3/FireWire n Write-blocked preview/triage hard drive contents. over 30GB/min* storage devices. Adapters are included with Use the Falcon as a write-blocker. The file browser ­n Image and verify to multiple image formats; Falcon to support 1.8”/2.5”/3.5”/1.8” ZIF IDE and feature provides write-blocked access to source or native copy, dd image, e01, ex01 and file-based microSATA drive interfaces. Optional adapters are destination drives connected to Falcon. View the copy. Compression available for E01/Ex01 available for eSATA, mSATA and compact flash drive’s partitions and contents and view text files, formats. Uses SHA1, SHA256, MD5 and dual-hash drives. An optional SCSI module provides support jpeg, PDF, XML, or HTML files.
    [Show full text]
  • Falcon®-NEO User's Manual
    Falcon®-NEO User’s Manual Logicube, Inc. Chatsworth, CA 91311 USA Phone: 818 700 8488 Fax: 818 700 8466 Version: 3.2u1 Date: 10/22/2020 MAN-FALCON-NEO Logicube Falcon®-NEO User’s Manual I Limitation of Liability and Warranty Information Logicube Disclaimer LOGICUBE IS NOT LIABLE FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES, INCLUDING, BUT NOT LIMITED TO PROPERTY DAMAGE, LOSS OF TIME OR DATA FROM USE OF A LOGICUBE PRODUCT, OR ANY OTHER DAMAGES RESULTING FROM PRODUCT MALFUNCTION OR FAILURE OF (INCLUDING WITHOUT LIMITATION, THOSE RESULTING FROM: (1) RELIANCE ON THE MATERIALS PRESENTED, (2) COSTS OF REPLACEMENT GOODS, (3) LOSS OF USE, DATA OR PROFITS, (4) DELAYS OR BUSINESS INTERRUPTIONS, (5) AND ANY THEORY OF LIABILITY, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE (OR FROM DELAYS IN SERVICING OR INABILITY TO RENDER SERVICE ON ANY) LOGICUBE PRODUCT. LOGICUBE MAKES EVERY EFFORT TO ENSURE PROPER OPERATION OF ALL PRODUCTS. HOWEVER, THE CUSTOMER IS RESPONSIBLE TO VERIFY THAT THE OUTPUT OF LOGICUBE PRODUCT MEETS THE CUSTOMER’S QUALITY REQUIREMENT. THE CUSTOMER FURTHER ACKNOWLEDGES THAT IMPROPER OPERATION OF LOGICUBE PRODUCT AND/OR SOFTWARE, OR HARDWARE PROBLEMS, CAN CAUSE LOSS OF DATA, DEFECTIVE FORMATTING, OR DATA LOADING. LOGICUBE WILL MAKE EFFORTS TO SOLVE OR REPAIR ANY PROBLEMS IDENTIFIED BY CUSTOMER, EITHER UNDER WARRANTY OR ON A TIME AND MATERIALS BASIS. Warranty DISCLAIMER IMPORTANT - PLEASE READ THE TERMS OF THIS AGREEMENT CAREFULLY. BY INSTALLING OR USING LOGICUBE PRODUCTS, YOU AGREE TO BE BOUND BY THIS AGREEMENT. IN NO EVENT WILL LOGICUBE BE LIABLE (WHETHER UNDER THIS AGREEMENT, RESULTING FROM THE PERFORMANCE OR USE OF LOGICUBE PRODUCTS, OR OTHERWISE) FOR ANY AMOUNTS REPRESENTING LOSS OF PROFITS, LOSS OR INACCURACY OF DATA, LOSS OR DELAYS OF BUSINESS, LOSS OF TIME, COSTS OF PROCUREMENT OF SUBSTITUTE GOODS, SERVICES, OR TECHNOLOGY, PROPERTY DAMAGE, OR INDIRECT, CONSEQUENTIAL, OR PUNITIVE DAMAGES OF A PURCHASER OR USER OF LOGICUBE PRODUCTS OR ANY THIRD PARTY.
    [Show full text]
  • Artifice: a Deniable Steganographic File System
    Artifice: A Deniable Steganographic File System Austen Barker Staunton Sample Yash Gupta Anastasia McTaggart Ethan L. Miller Darrell D. E. Long University of California, Santa Cruz Abstract nations and law enforcement to legally obligate disclosure of The challenge of deniability for sensitive data can be a life encryption keys [24]. or death issue depending on location. Plausible deniability Since carrying encrypted files or dedicated hardware is in- directly impacts groups such as democracy advocates relay- herently suspicious, a deniable storage system must co-exist ing information in repressive regimes, journalists covering with an open public file system to maintain plausible de- human rights stories in a war zone, and NGO workers hid- niability. It is highly suspicious if there are visible drivers ing food shipment schedules from violent militias. All of or firmware, unconventional partitioning schemes, unusable these users would benefit from a plausibly deniable data stor- space in a file system, or unexplained changes to disk free age system. Previous deniable storage solutions only offer space. The hidden file system must therefore operate in such pieces of an implementable solution. Artifice is the first tun- a way that the encapsulating file system and operating system able, operationally secure, self repairing, and fully deniable are unaware of the hidden file system’s existence, even when steganographic file system. faced with a detailed forensic examination. A deniable sys- Artifice operates through the use of a virtual block device tem must therefore meet four requirements: effectively hide driver stored separately from the hidden data. It uses external existence of the data, disguise hidden data accesses, have no entropy sources and erasure codes to deniably and reliably impact on the behavior of the public system, and hide the store data within the unallocated space of an existing file software used to access the hidden data.
    [Show full text]
  • Delineation of Trivial PGP Security
    IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 20, Issue 3, Ver. I (May. - June. 2018), PP 17-23 www.iosrjournals.org Delineation of Trivial PGP Security Mr. Nikhil Joshi1, Mr. Gaurav Kumar2, 3 Prof. Divya Premchandran Asst Professor , 1mca Student, Bvimit Cbd Belapur, Navi Mumbai. 2mca Student, Bvimit Cbd Belapur, Navi Mumbai. 3mca Bvimit Cbd Belapur, Navi Mumbai. Corresponding Author:Mr. Nikhil Joshi Abstract: The enhanced PGP Security that we are proposing is based only for digital signatures & encryption/decryption of the messages. The algorithm that is used here consists of asymmetric algorithm as RSA 4096 & the symmetric algorithm used is AES-256(Advance Encryption standard). Also we require hashing function in order to secure the digital signature as well as messages. Hence we use Whirlpool hashing function which is open source & is based on 512 block cipher that makes the application more powerful than the previously used. Keywords: -Asymmetry algorithm, AES-256, Digital Signature, Hash Function, OpenPGP , PGP, RSA 4096, Rijndael Cipher, SHA-256, Symmetric algorithm, Whirlpool. -------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: 07-05-2018 Date of acceptance: 26-05-2018 ----------------------------------------------------------------------------------------------------------------------------- ---------- I. Introduction The process of creating & maintaining digitalsignature along with encryption/decryption of messages is widely known & used in PGP. Various symmetric algorithms like DES, Triple DES, Twofish & IDEA along with hashing functions like MD5, SHA-1, SHA-256 has been introduced to provide a stronger encryption technique. The key exchange policy RSA 4096 is still considered the best asymmetric algorithm so far. Although being so strong in their encryption technique it is still slower & weaker compared to the newly concept that we are going to introduce is AES-256 & Whirlpool.
    [Show full text]
  • Operating Systems
    Operating Systems Find information about different operating systems. Recommended Operating Systems: MacOS & Windows Computer Backup Computer Storage Management Computer Performance Change your macOS Login Password Change your Windows 10 Login Password Backing Up with Windows File History Change the Default Application Associated with a File Type How do I install device drivers? Help for New Mac Users Start your Windows Computer in Safe Mode macOS Startup Key Commands Use VirtualBox to Create a Windows Virtual Machine Create a Disk Image Backup with Macrium Reflect Recommended Operating Systems: MacOS & Windows IT highly recommends using either macOS or Windows 10 operating systems. Keeping your operating system up to date with the most current upgrades available will allow your system to run at optimal performance and security levels. macOS Apple provides free upgrades to newer operating systems when they become available. Big Sur Apple's newest version of macOS Compatible with these computers: https://support.apple.com/en-us/HT211238 Once you have installed the latest operating system available, keep it up-to-date by enabling automatic updates by following the instructions here. Windows Microsoft's newest operating systems must be purchased before being installed. Windows 10 Microsoft's newest windows operating system Windows 10 is compatible with most PCs Once you have installed the latest operating system available, keep it up-to-date by enabling automatic updates by following the instructions here. Windows 7 Microsoft no longer provides support for Windows 7. If you have any computers that are still running Windows 7, contact IT as soon as possible to be upgraded to Windows 10.
    [Show full text]