[ Log On ]
  • Home
  • Tst
  • Cha
  • Enc
  • Code
  • IP
  • Fun
  • Sub
  • DigF
  • Cis
  • Com
  • Db
  • About
  • Netsim

Book

Chapter 10: Obfuscation

Objectives

[Back] The key objectives of this chapter are:

  • Outline obfuscation methods.
  • Define methods used to encode data in order to hide its original content.
  • Understand encryption methods used to hide data, and possible methods to overcome this obfuscation.
  • Define how file types can be discovered.

Associated software: Toolkit.

Lecture

Test

The test for this unit is Test.

File Signatures

  • File signatures

Related Material

  • Encryption/Hashing/etc This shows examples from the encryption/hashing part of the Toolkit. Install Toolkit
  • RSA Brute Force This shows examples from the RSA encryption part of the Toolkit. Install Toolkit
  • Brute Force on Hash This shows an example of brute force on encrypted content. Install Toolkit
  • Digital Certificates This shows the importing of digital certificates.
  • Encoding This shows an example of converting from ASCII, Base-64, Hex, and Binary, into the other formats.
  • Ex-OR coding This shows an example of Ex-OR encoding.
  • Frequency Analysis This shows an example of frequency encoding.
  • IP Packet (Windows)
  • IP Packet (Ubuntu)
  • Random scrambled alphabet

Lab

The lab is [here]

Slides

The slides for the chapter are [here]