hacking new

24
A HACKING SYSTEM BASED ON IMAGE BINDING SUBMITTED TO: Ms.DIVYA K V Ms.VIDYA M Ms.JUCY VAREED SUBMITTED BY: SAVITHA K J LAKSHMI RAJ JASEENA ABUBACKER ANJANA DEVARAJ SHABINA P S

Upload: sanjaysankar

Post on 19-Jan-2016

18 views

Category:

Documents


0 download

DESCRIPTION

a ppt about hacking and other stuff. qweodkfmodsjkdfkdsdfosdkmfkvmocifjdskfmkcvsojdfkcosdkfjkfdsoifisjdfkjdkfjdsiof

TRANSCRIPT

Page 1: Hacking New

A HACKING SYSTEM BASED ON

IMAGE BINDING

SUBMITTED TO:Ms.DIVYA K VMs.VIDYA MMs.JUCY VAREED

 

 SUBMITTED BY: SAVITHA K JLAKSHMI RAJJASEENA ABUBACKERANJANA DEVARAJSHABINA P S

Page 2: Hacking New

CONTENTS

1. AIM2. REQUIREMENT ANALYSIS– SOFTWARE REQUIREMENTS– HARDWARE REQUIREMENTS– FUNCTIONAL REQUIREMENTS

3. ARCHITECTURE OF THE SYSTEM4. PROPOSED SYSTEM5. TESTING6. TESTING STRATEGIES7. PERFORMANCE AND EVALUATION STRATEGIES8. CONCLUSION9. REFERENCE

Page 3: Hacking New

AIM

To build a hacking system which uses image stegnography   

Page 4: Hacking New

REQUIREMENT ANALYSIS

HARDWARE ANALYSIS SOFTWARE ANALYSIS FUNCTIONAL ANALYSIS

Page 5: Hacking New

HARDWARE REQUIREMENTS

• System Type: IBM compatible PC with 1GHz• RAM: 512MB• Cache: 512KB• Storage: 120GB

Page 6: Hacking New

SOFTWARE REQUIREMENTS

• Operating System: Windows 2000 Server/• Windows XP/Windows 7• Language Used:JDK-7• Softwaresused:Netbeans IDE 7.3• DATABASE: MYSQL• FUD Binder

Page 7: Hacking New

FUNCTIONAL REQUIREMENTS

• Image selection: careful selection of the    Image so as to maintain it as original as      possible.• Image bit extraction: extraction of the bit representation of the selected image.

• Binding: binding program in the selected image• Image exchange via e-mail: Sending the processed image to victim via e-mail

Page 8: Hacking New

ARCHITECTURE OF THE SYSTEM

LOGIN TO 

SELECT IMAGE

IMAGE PROCESSING

IMAGE BINDING

HACKINGKEYLOG RECORDS

INPUT BLURRED IMAGE

E-MAIL

OUTPUT

INSIDE SOFTWARE

LOGOUTSTORE 

IMAGE

Page 9: Hacking New

ARCHITECTURE OF THE SYSTEM

• THERE ARE 3 MODULES IN THIS SYSTEM NAMELY:

 IMAGE PROCESSINGIMAGE BINDINGHACKING

TOGETHER IN A SOFTWARE

Page 10: Hacking New

1. IMAGE PROCESSING

IMAGE MANIPULATION 

IS THERE ANY 

WHITE SPACE

CONVERT TO BITS

BLURRED IMAGE

DELETION OF WHITE SPACE

NO

YES

IMAGE SELECTION

Page 11: Hacking New

1. IMAGE PROCESSING

Image manipulation consists of 3 options• Resize• Image cropping• Image autofillingManipulation of the image is done to create adequate space to bind the keylogger.

Page 12: Hacking New

1. IMAGE PROCESSING

STEPS:o Select an image with considerable white space in it and manipulate the image

o Covert the image into bit representationo Delete the white space bitsoWe get the blurred image

Page 13: Hacking New

2. IMAGE BINDING

SELECT KEYLOGGER ATTACH FUD BINDER

INSERT TO AVAILABLE BIT 

SPACESTEGO OBJECT

ENCRYPT

Page 14: Hacking New

2. IMAGE BINDING

STEPS:

o Select the keylogger software that is to be binded with the image

o Insert it to the available bit space of the processed image along with FUD  binder

o Finally we get the stego image objecto Store the stego object and attach it to send.

Page 15: Hacking New

3. HACKINGSTEGO OBJECT RECEIVER KEYLOGGER 

ACTIVATION

KEYLOG 

SENT TO OPENS IMAGE

STAR

TS 

RECO

RDING

HACKER 

RECEIVES

DATABASE OF LOGS

Page 16: Hacking New

3. HACKINGSYSTEM OF HACKER ACTS AS A  CHILD  OF THE HACKED SYSTEM SYSTEM OF THE 

VICTIM ACTS AS THE PARENT OF THE HACKER SYSTEM

RECORD OF THE KEYS PRESSED BY THE 

PARENT

STEGO OBJECT SENT TO  VICTIM

KEYLOGS STORED IN DATABASE

Page 17: Hacking New

3. HACKING

STEPS:o stego object is sent to the victimo the victim opens it and the     keylogger is activatedo the victim ,unknown about the activation, continues the work

o hacker gets the keylogs of victim

Page 18: Hacking New

PROPOSED SYSTEMThe proposed system is hacking system which uses image binding. It aims to produce a passive attack. It doesn't crash the system or it doesn't cause any harm or modification to the data present in the system. We are proposing a technique of binding a keylogger to an image using image steganography.           Once a computer user has been infected with a Keylogger, it will continue to run in a hidden manner, and report all the information that is being input into the computer, and this is sent back to the hacker or some other  hidden third party. After the hacker has compiled enough information using the Keylogger, keylogger sends the all key strokes of the master system

Page 19: Hacking New

TESTING • SpyShelter Security Test Tool (AntiTest.exe): An easy way to test 

anti-keyloggers and similar privacy applications.

• AKLT(Anti-Keylogger Tester): is a free portable tool for Windows that tests whether the anti-keylogger tools installed in your computer actually works.

• Key-Logger Simulation Test Program: This test program simulates the activities of a keylogger. If your security software is protecting you proactively, then the simulation should trigger a warning message.

Page 20: Hacking New

PERFORMANCE AND EVALUATION

FEASIBILITY ASPECTS ANALYSED ASPECT

ECONOMIC BENEFITS HIGH RETURNS

OPERATIONAL SECURITY HARDLY SECURE

CONTROL DIFFICULT TO CONTROL

SERVICES EXTENSIVELY RELIABLE

TECHNICAL COMPATIBILITY DEPENDS ON SYSTEM SERVICES

PORTABILITY MACHINE INDEPENDENT

Page 21: Hacking New

CONCLUSION

Our objective was to build an authenticated software which processes a selected image and binds a keylogger with it. Later the stored image is to be sent to the victim.

The work is successfully started and we hope to         expand the work further to achieve best  

results. 

Page 22: Hacking New

REFERENCEREFERENCE PAPERS:•  Data hiding in audio signal, video signal,text and jpeg images • Keyloggers:Increasing Threats to Computer Security and Privacy• Reversible Data Hiding in Encrypted Image• Unprivileged Black-Box Detection of User-Space Keyloggers• On the Limits of Steganography• Detecting LSB Steganography in Color and Gray• Hide and Seek: An Introduction to Steganography• Hiding Text behind Image for Secure Communication         IEEE-International Conference On Advances In Engineering, Science And

Management (ICAESM2012) March 30, 31, 2012

Page 23: Hacking New

REFERENCEREFERENCE SITES:

http://williamstallings.com/Cryptography/

http://williamstallings.com/Crypto/Crypto4e.html

http://www.securelist.com/en/analysis?pubid=204791931

http://pro-hac.blogspot.in/2010/04/what-is-fud-crypter-hide-trojans.html

http://www.combofix.org/what-is-a-keylogger-virus-and-how-to-remove-it.php

http://www.hackersthirst.com/2011/03/hiding-ratstrojans-and-keyloggers-from.html

http://www.101hacker.com/2011/03/crypter-software-to-bypass-antivirus.html

http://hackclarify.blogspot.in/2012/05/hiding-keyloggersratswormsviruses-using.html

http://k1ng420.blogspot.in/2013/06/binders-and-crypters.html

http://hack-o-crack.blogspot.in/2011/01/hide-keyloggers-and-trojans-with.html

Page 24: Hacking New