DFIR Blog
  • Infosec
    • Blog
    • Threat Landscape
  • Digital Forensics
    • Windows Forensics
    • Mac Forensics
    • Memory Forensics
    • Forensic Resources
  • Incident Response
  • CISSP
    • Domain-1
    • Domain-2
    • Domain-3
    • Domain-4
    • Domain-5
    • Domain-6
    • Domain-7
    • Domain-8
  • Contact
  • HTB
  • Productivity

Covert Channels

7/12/2021

 
Covert Channels are the mechanism used to transmit information using not the originally intended for Data Transmission.

​Generally Unauthorized and hidden used to send information that violates Information security policy.

*Covert Storage Channels* - They are a line of communication that can be seen by everyone but not understand by everyone.  Processes are able to communicate through some type of storage on the system. 
* Stagnograhy is a type of Covert Storage Channel. Example - Hiding a picture or a message inside a PDF Document. 

*Covert Timing Channel*  - One precess relays information to another by modulating  the use of system resources. For example, mixing illegitimate traffic with legitimated traffic.

Micro-Architectural Attacks
* Cache Timing Attacks 
* Cache memory sits in between processor and memory. It is used for faster processing. 

Symmetric Key Encryption

7/11/2021

 
  • Encryption & Decryption happens using the same key.
  • Transferring the key is a challenge. 

CISSP Overview

7/11/2021

 
Picture

    Author

    Write something about yourself. No need to be fancy, just an overview.

    Archives

    November 2022
    June 2022
    January 2022
    October 2021
    September 2021
    July 2021

    Categories

    All
    Domain8

    RSS Feed

  • Infosec
    • Blog
    • Threat Landscape
  • Digital Forensics
    • Windows Forensics
    • Mac Forensics
    • Memory Forensics
    • Forensic Resources
  • Incident Response
  • CISSP
    • Domain-1
    • Domain-2
    • Domain-3
    • Domain-4
    • Domain-5
    • Domain-6
    • Domain-7
    • Domain-8
  • Contact
  • HTB
  • Productivity