↑ Return to Security Tutorials

Print this Page

Data Hiding

Hidden

 

 

 

In these series of tutorials we are going to list different techniques to hide data under windows OS, we are going also to describe how to discover hidden data to prevent a malicious  attacker from hiding malicious software inside our computer , so prepare a cup of tea and let us start hiding!

Permanent link to this article: http://www.darknessgate.com/security-tutorials/date-hiding/

121.png

Changing File Attributes

Make extra hidden files and folder by changing their attributes under Windows OS We can change file/folder hidden attributes under windows to prevent causal user from seeing such hidden data as follow Open DOS command and navigate to directory that holds the file/folder you want to hide as follow Tip: you can change the current …

View page »

Figure 10:Select your hot keys to hide/unhide open windows & files

Hiding active windows

Sometimes we find ourselves needs to hide some open files/programs instantly when someone came in suddenly while we are working on our PC, this is not difficult with the existence of free tools,in this article we will describe the best free tools I found online: window hidie ,Minime ,Clicky Gone and hide win. Window Hide …

View page »

1.png

Hiding Data in Registry

We can hide data of different format within Windows registry (strings, binary data), some registry entries are already available for storing hidden data , the best known location is HKEY_LOCAL_MACHINESystemCurrentControlSetControlTimeZoneInformation , this key records the difference between PC local time and UTC time zone in addition to other functions. This key contains two entries that …

View page »

211.png

Hiding inside MS Word structure

How To hide secret data / Files inside MS Word files structures Newer office suite (2007 – 2010 – 2013) are built using the open XML file format, this format consists of a zip file that contains many XML and binary files and has the DOCX extension, if we unzip this file we can have …

View page »

ADS.jpg

NTFS Alternate Data Streams

The Ultimate guide to Data Hiding using alternative data stream Before we begin our discussion on data hiding using alternative data stream files, we need first to briefly describe the file system structure that supports this feature which is the NTFS file system. What is NTFS File System? NTFS (New Technology File System) is a …

View page »

411.png

OLE Structured Storage

Learn how to hide MS Word file inside MS Excel file or vise versa According to Wikipedia OLE Structured Storage is: COM Structured Storage (variously also known as COM structured storage or OLE structured storage) is a technology developed by Microsoft as part of its Windows operating system for storing hierarchical data within a single …

View page »

RTF1.png

RTF documents

Learn How to hide you secret data inside RTF documents Rich Text Format (RTF) files is a property file documents developed by Microsoft , it could be opened and edited using both WordPad and MS Word program (all versions), there are many versions of RTF specifications and it is continually developed with each release of …

View page »

241.png

Stealth Alternative Data Stream

The Ultimate guide to Data Hiding using STEALTH alternative data stream [copyrightsThis]Microsoft select a set of reserved names to be used for its connected hardware devices Output operations (like printer use LTP) or to enables software components to communicate (use COM), these names are CON, PRN, AUX, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, …

View page »

101-500x3751.png

Steganography

Hide data inside images Steganography is the science of hiding information, most people use steganography to hide images or data within other images. However, files used to hide data are not limited to image files as it could be images, music files, movies, or even text files associated with ADSs streams file. According to Wikipedia …

View page »

1

Volume Shadow Copy Data Hiding

Volume shadow copy (VSS) is a service available in both Windows 7 and Vista OS, it coordinates the actions that are required to create a consistent snapshot copy of the data to be backed up in a specific volume in a specific point-in-time over regular intervals. We can access this feature through the system restore …

View page »