Upload
sanjaysankar
View
17
Download
0
Embed Size (px)
DESCRIPTION
a ppt about hacking and other stuff. qweodkfmodsjkdfkdsdfosdkmfkvmocifjdskfmkcvsojdfkcosdkfjkfdsoifisjdfkjdkfjdsiof
Citation preview
A HACKING SYSTEM BASED ON
IMAGE BINDING
SUBMITTED TO:Ms.DIVYA K VMs.VIDYA MMs.JUCY VAREED
SUBMITTED BY: SAVITHA K JLAKSHMI RAJJASEENA ABUBACKERANJANA DEVARAJSHABINA P S
CONTENTS
1. AIM2. REQUIREMENT ANALYSIS– SOFTWARE REQUIREMENTS– HARDWARE REQUIREMENTS– FUNCTIONAL REQUIREMENTS
3. ARCHITECTURE OF THE SYSTEM4. PROPOSED SYSTEM5. TESTING6. TESTING STRATEGIES7. PERFORMANCE AND EVALUATION STRATEGIES8. CONCLUSION9. REFERENCE
AIM
To build a hacking system which uses image stegnography
REQUIREMENT ANALYSIS
HARDWARE ANALYSIS SOFTWARE ANALYSIS FUNCTIONAL ANALYSIS
HARDWARE REQUIREMENTS
• System Type: IBM compatible PC with 1GHz• RAM: 512MB• Cache: 512KB• Storage: 120GB
SOFTWARE REQUIREMENTS
• Operating System: Windows 2000 Server/• Windows XP/Windows 7• Language Used:JDK-7• Softwaresused:Netbeans IDE 7.3• DATABASE: MYSQL• FUD Binder
FUNCTIONAL REQUIREMENTS
• Image selection: careful selection of the Image so as to maintain it as original as possible.• Image bit extraction: extraction of the bit representation of the selected image.
• Binding: binding program in the selected image• Image exchange via e-mail: Sending the processed image to victim via e-mail
ARCHITECTURE OF THE SYSTEM
LOGIN TO
SELECT IMAGE
IMAGE PROCESSING
IMAGE BINDING
HACKINGKEYLOG RECORDS
INPUT BLURRED IMAGE
OUTPUT
INSIDE SOFTWARE
LOGOUTSTORE
IMAGE
ARCHITECTURE OF THE SYSTEM
• THERE ARE 3 MODULES IN THIS SYSTEM NAMELY:
IMAGE PROCESSINGIMAGE BINDINGHACKING
TOGETHER IN A SOFTWARE
1. IMAGE PROCESSING
IMAGE MANIPULATION
IS THERE ANY
WHITE SPACE
CONVERT TO BITS
BLURRED IMAGE
DELETION OF WHITE SPACE
NO
YES
IMAGE SELECTION
1. IMAGE PROCESSING
Image manipulation consists of 3 options• Resize• Image cropping• Image autofillingManipulation of the image is done to create adequate space to bind the keylogger.
1. IMAGE PROCESSING
STEPS:o Select an image with considerable white space in it and manipulate the image
o Covert the image into bit representationo Delete the white space bitsoWe get the blurred image
2. IMAGE BINDING
SELECT KEYLOGGER ATTACH FUD BINDER
INSERT TO AVAILABLE BIT
SPACESTEGO OBJECT
ENCRYPT
2. IMAGE BINDING
STEPS:
o Select the keylogger software that is to be binded with the image
o Insert it to the available bit space of the processed image along with FUD binder
o Finally we get the stego image objecto Store the stego object and attach it to send.
3. HACKINGSTEGO OBJECT RECEIVER KEYLOGGER
ACTIVATION
KEYLOG
SENT TO OPENS IMAGE
STAR
TS
RECO
RDING
HACKER
RECEIVES
DATABASE OF LOGS
3. HACKINGSYSTEM OF HACKER ACTS AS A CHILD OF THE HACKED SYSTEM SYSTEM OF THE
VICTIM ACTS AS THE PARENT OF THE HACKER SYSTEM
RECORD OF THE KEYS PRESSED BY THE
PARENT
STEGO OBJECT SENT TO VICTIM
KEYLOGS STORED IN DATABASE
3. HACKING
STEPS:o stego object is sent to the victimo the victim opens it and the keylogger is activatedo the victim ,unknown about the activation, continues the work
o hacker gets the keylogs of victim
PROPOSED SYSTEMThe proposed system is hacking system which uses image binding. It aims to produce a passive attack. It doesn't crash the system or it doesn't cause any harm or modification to the data present in the system. We are proposing a technique of binding a keylogger to an image using image steganography. Once a computer user has been infected with a Keylogger, it will continue to run in a hidden manner, and report all the information that is being input into the computer, and this is sent back to the hacker or some other hidden third party. After the hacker has compiled enough information using the Keylogger, keylogger sends the all key strokes of the master system
TESTING • SpyShelter Security Test Tool (AntiTest.exe): An easy way to test
anti-keyloggers and similar privacy applications.
• AKLT(Anti-Keylogger Tester): is a free portable tool for Windows that tests whether the anti-keylogger tools installed in your computer actually works.
• Key-Logger Simulation Test Program: This test program simulates the activities of a keylogger. If your security software is protecting you proactively, then the simulation should trigger a warning message.
PERFORMANCE AND EVALUATION
FEASIBILITY ASPECTS ANALYSED ASPECT
ECONOMIC BENEFITS HIGH RETURNS
OPERATIONAL SECURITY HARDLY SECURE
CONTROL DIFFICULT TO CONTROL
SERVICES EXTENSIVELY RELIABLE
TECHNICAL COMPATIBILITY DEPENDS ON SYSTEM SERVICES
PORTABILITY MACHINE INDEPENDENT
CONCLUSION
Our objective was to build an authenticated software which processes a selected image and binds a keylogger with it. Later the stored image is to be sent to the victim.
The work is successfully started and we hope to expand the work further to achieve best
results.
REFERENCEREFERENCE PAPERS:• Data hiding in audio signal, video signal,text and jpeg images • Keyloggers:Increasing Threats to Computer Security and Privacy• Reversible Data Hiding in Encrypted Image• Unprivileged Black-Box Detection of User-Space Keyloggers• On the Limits of Steganography• Detecting LSB Steganography in Color and Gray• Hide and Seek: An Introduction to Steganography• Hiding Text behind Image for Secure Communication IEEE-International Conference On Advances In Engineering, Science And
Management (ICAESM2012) March 30, 31, 2012
REFERENCEREFERENCE SITES:
http://williamstallings.com/Cryptography/
http://williamstallings.com/Crypto/Crypto4e.html
http://www.securelist.com/en/analysis?pubid=204791931
http://pro-hac.blogspot.in/2010/04/what-is-fud-crypter-hide-trojans.html
http://www.combofix.org/what-is-a-keylogger-virus-and-how-to-remove-it.php
http://www.hackersthirst.com/2011/03/hiding-ratstrojans-and-keyloggers-from.html
http://www.101hacker.com/2011/03/crypter-software-to-bypass-antivirus.html
http://hackclarify.blogspot.in/2012/05/hiding-keyloggersratswormsviruses-using.html
http://k1ng420.blogspot.in/2013/06/binders-and-crypters.html
http://hack-o-crack.blogspot.in/2011/01/hide-keyloggers-and-trojans-with.html