728x90

1. ๋””์ง€ํ„ธ ํฌ๋ Œ์‹

๋””์ง€ํ„ธํฌ๋ Œ์‹์ด๋ž€?

: Digital + Forensic = ๋””์ง€ํ„ธ ๋ฒ”์ฃ„์˜ ๋ถ€๊ฒ€

→ ๋””์ง€ํ„ธ ์ฆ๊ฑฐ๋ฌผ(์Šค๋งˆํŠธํฐ, PC)์„ ์ˆ˜์ง‘, ๋ถ„์„ํ•˜์—ฌ ๋ฒ”์ฃ„์˜ ๋‹จ์„œ์™€ ์ฆ๊ฑฐ๋ฅผ ์ฐพ์•„๋‚ด๋Š” ๊ณผํ•™์ˆ˜์‚ฌ ๊ธฐ๋ฒ•

๋””์ง€ํ„ธ ํฌ๋ Œ์‹์˜ ๋Œ€์ƒ

  • ๋””์Šคํฌ ํฌ๋ Œ์‹: ์ปดํ“จํ„ฐ ๋””์Šคํฌ(์œˆ๋„์šฐ, ๋ฆฌ๋ˆ…์Šค, MacOS/๊ฐœ์ธ, ์„œ๋ฒ„, ํด๋ผ์šฐ๋“œ)
  • ๋ฉ”๋ชจ๋ฆฌ ํฌ๋ Œ์‹: ์ปดํ“จํ„ฐ ๋ฉ”๋ชจ๋ฆฌ(RAM)
  • ๋„คํŠธ์›Œํฌ ํฌ๋ Œ์‹: ๋„คํŠธ์›Œํฌ ํŒจํ‚ท, ๋„คํŠธ์›Œํฌ ์žฅ๋น„ ๋กœ๊ทธ, ๋„คํŠธ์›Œํฌ ๊ด€๋ จ ์„ค์ •๋“ค
  • ๋ชจ๋ฐ”์ผ ํฌ๋ Œ์‹: ๋ชจ๋ฐ”์ผ ๋””๋ฐ”์ด์Šค(์ €์žฅ์†Œ, ๋ฉ”๋ชจ๋ฆฌ)/IoT ๋””๋ฐ”์ด์Šค
  • ๊ธฐํƒ€: ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ํฌ๋ Œ์‹, ์•”ํ˜ธ ํฌ๋ Œ์‹, ํšŒ๊ณ„ ํฌ๋ Œ์‹, ์†Œ์Šค์ฝ”๋“œ ํฌ๋ Œ์‹ ๋“ฑ

๋””์ง€ํ„ธํฌ๋ Œ์‹ 5๋Œ€ ์›์น™

  1. ์ •๋‹น์„ฑ์˜ ์›์น™: ๋””์ง€ํ„ธ ์ฆ๊ฑฐ๋Š” ๋ฒ•์  ์ ˆ์ฐจ์— ์˜ํ•ด ์ˆ˜์ง‘๋˜์–ด์•ผ ํ•œ๋‹ค. ์œ„๋ฒ•ํ•œ ๋ฐฉ๋ฒ•์œผ๋กœ ์ˆ˜์ง‘ ์‹œ ๋ฒ•์  ํšจ๋ ฅ์ด ์ƒ์‹คํ•œ๋‹ค.
  2. ๋ฌด๊ฒฐ์„ฑ์˜ ์›์น™: ๋””์ง€ํ„ธ ์ฆ๊ฑฐ๋Š” ์Šต๋“ ํ›„ ์–ด๋– ํ•œ ์ผ์ด ๋ฐœ์ƒํ•˜์—ฌ๋„ ๋ณ€์กฐ๊ฐ€ ๋˜์–ด์„œ๋Š” ์•ˆ ๋œ๋‹ค.
  3. ์—ฐ๊ณ„์„ฑ์˜ ์›์น™: ๋””์ง€ํ„ธ ์ฆ๊ฑฐ์˜ ์Šต๋“, ์ด์†ก, ๋ถ„์„, ๋ณด๊ฐ„, ๋ฒ•์ • ์ œ์ถœ ๊ฐ ๋‹จ๊ณ„์—์„œ ๋‹ด๋‹น์ž์™€ ์—…๋ฌด์ž๋ฅผ ๋ช…ํ™•ํžˆ ํ•˜์—ฌ์•ผ ํ•œ๋‹ค.
  4. ์‹ ์†์„ฑ์˜ ์›์น™: ๋ชจ๋“  ๊ณผ์ •์€ ์ง€์ฒด ์—†์ด ์‹ ์†ํ•˜๊ฒŒ ์ง„ํ–‰๋˜์–ด์•ผ ํ•œ๋‹ค.
  5. ์žฌํ˜„์˜ ์›์น™: ํ”ผํ•ด ์ง์ „๊ณผ ๊ฐ™์€ ํ™˜๊ฒฝ์—์„œ ํ˜„์žฅ ์žฌํ˜„ ์‹œ ํ”ผํ•ด ๋‹น์‹œ์™€ ๋™์ผํ•œ ๊ฒฐ๊ณผ๊ฐ€ ๋‚˜์™€์•ผ ํ•œ๋‹ค.

๋””์ง€ํ„ธํฌ๋ Œ์‹์˜ ์œ ํ˜•

๋””์ง€ํ„ธํฌ๋ Œ์‹์˜ ์ ˆ์ฐจ


2. ์Šคํ…Œ๊ฐ€๋…ธ๊ทธ๋ž˜ํ”ผ

์Šคํ…Œ๊ฐ€๋…ธ๊ทธ๋ž˜ํ”ผ๋ž€?

: Steganography = Stegano(๊ฐ์ถฐ์ง„) + Graphy(๊ธ€) = ๊ฐ์ถฐ์ง„ ๊ธ€

์ „๋‹ฌํ•˜๋ ค๋Š” ๊ธฐ๋ฐ€ ์ •๋ณด๋ฅผ ๋‹ค๋ฅธ ํŒŒ์ผ, ๋ฉ”์‹œ์ง€, ์ด๋ฏธ์ง€ ๋˜๋Š” ๋น„๋””์˜ค ์•ˆ์— ์ˆจ๊ธฐ๋Š” ์‹ฌ์ธต ์•”ํ˜ธ ๊ธฐ์ˆ 

์Šคํ…Œ๊ฐ€๋…ธ๊ทธ๋ž˜ํ”ผ์˜ ์ข…๋ฅ˜

  • Text Steganography: ํ…์ŠคํŠธ ํŒŒ์ผ์— ๋‹ค๋ฅธ ํŒŒ์ผ์„ ์ˆจ๊ธฐ๋Š” ๊ธฐ์ˆ 
    1. Format based method: ํ…์ŠคํŠธ ํŒŒ์ผ ํ™•์žฅ์ž ๋ณ€ํ™˜
    2. random and statistical generation
    3. linguistic method
  • Audio Steganography: ๋น„ํŠธ์ŠคํŠธ๋ฆผ์œผ๋กœ ์น˜ํ™˜๋  ์ˆ˜ ์žˆ๋Š” secret message๋ฅผ ์˜ค๋””์˜ค ํŒŒ์ผ์— ์‚ฝ์ž…ํ•˜๋Š” ๊ธฐ์ˆ (์–ด๋ ค์›€)
    • WAV/AU/MP3 ๋“ฑ์˜ ํ™•์žฅ์ž ์‚ฌ์šฉ
      1. Least Siginificant Bit Encoding
      2. Parity Encoding
      3. Phase Coding
      4. Spread Spectrum
  • Image Steganography: ์ด๋ฏธ์ง€๋ฅผ ๋‹ค๋ฅธ ํŒŒ์ผ์„ ์ˆจ๊ธฐ๊ธฐ ์œ„ํ•œ ์ˆ˜๋‹จ์œผ๋กœ ์‚ฌ์šฉํ•˜๋Š” ๊ธฐ์ˆ (๊ฐ€์žฅ ํ”ํ•˜๊ฒŒ ์‚ฌ์šฉ)
    1. Least Significant Bit(LSB) Insertion
    2. Masking and Filtering
    3. Redundant Pattern Encoding
    4. Encrypt and Scatter
    5. Coding and Cosine Transformation
  • Network Steganography
  • Video Steganography: ๋””์ง€ํ„ธ ๋น„๋””์˜ค ํ˜•์‹์— ๋‹ค๋ฅธ ํŒŒ์ผ์„ ์ˆจ๊ธฐ๋Š” ๊ธฐ์ˆ (Image + Audio Steganography)
    1. Embedding data in uncompressed raw video and compressing it later
    2. Embedding data directly into the compressed data stream
  • Email Steganography

์ด๋ฏธ์ง€์˜ ๋ณ€์กฐ - Bit Pland

  • ์ ์ ˆํ•œ ์—ฐ์‚ฐ ๋ฐฉ์‹์œผ๋กœ ํŠน์ • bit๋ฅผ ์ˆ˜์ •ํ•˜์—ฌ ์ด๋ฏธ์ง€์— ๋น„๋ฐ€ ์ •๋ณด๋ฅผ ์‚ฝ์ž…
  • LSB ๋ณ€์กฐ ๋ฐฉ์‹์ด ๋Œ€ํ‘œ์ 


3. ํŒŒ์ผ ์‹œ๊ทธ๋‹ˆ์ฒ˜

ํŒŒ์ผ ์‹œ๊ทธ๋‹ˆ์ฒ˜๋ž€?

์ปดํ“จํ„ฐ๋Š” ํŒŒ์ผ ์ด๋ฆ„๊ณผ ํŒŒ์ผ ํ™•์žฅ์ž(extension)๋ฅผ ํ†ตํ•ด ํŒŒ์ผ ์ข…๋ฅ˜๋ฅผ ์‹๋ณ„ํ•œ๋‹ค.

 

  • ํŒŒ์ผ ํ˜•์‹๋งˆ๋‹ค ๊ฐ€์ง€๊ณ  ์žˆ๋Š” ๊ณ ์œ ์˜ ํŠน์ง•
  • ํ˜•์‹๋งˆ๋‹ค ํŠน์ •ํ•œ byte๊ฐ’์ด ์ •ํ•ด์ ธ ์žˆ๋‹ค.
  • ํšจ์œจ์ ์ธ ์‹๋ณ„์„ ์œ„ํ•ด ํŒŒ์ผ ํฌ๋งท์„ ๊ตฌ๋ถ„ํ•˜๊ณ , ํŠน์ • ์œ„์น˜์˜ ๊ณ ์œ  ์ •๋ณด๋ฅผ ์ด์šฉํ•œ๋‹ค.
  • ํŒŒ์ผ ํฌ๋งท๋ณ„๋กœ jpeg, gif, doc, ppt ๋“ฑ ๊ณ ์œ ํ•œ ํฌ๋งท์„ ๊ฐ€์ง„๋‹ค.
  • ํŒŒ์ผ์˜ ์‹œ์ž‘๊ณผ ๋์— ๋ฐฐ์น˜๋œ ํŠน์ • ๋ฐ”์ดํŠธ๋“ค์˜ ๊ณ ์œ ํ•œ ๊ฐ’ ๋„๋Š” ์ •๋ณด๊ฐ€ ์ •ํ•ด์ ธ ์žˆ๋‹ค.
  • header & footer signature

ํŒŒ์ผ ์‹œ๊ทธ๋‹ˆ์ฒ˜ ๋ถ„์„ ์ด์œ 

  • ํšจ์œจ์„ฑ: ํŒŒ์ผ์˜ ํ™•์žฅ์ž๊ฐ€ ์ง„์งœ์ธ์ง€๋ฅผ ํ™•์ธํ•˜๊ธฐ ์œ„ํ•จ
    • ํ—ค๋”์™€ ํ‘ธํ„ฐ ์‹œ๊ทธ๋‹ˆ์ฒ˜๊ฐ€ ๋‹ค๋ฅธ ํ˜•์‹์ผ ๊ฒฝ์šฐ ํŒŒ์ผ์— ๋ฌธ์ œ๊ฐ€ ์žˆ๊ฑฐ๋‚˜ ์กฐ์ž‘๋œ ํŒŒ์ผ์ผ ๊ฐ€๋Šฅ์„ฑ์ด ์กด์žฌํ•œ๋‹ค.
  • ์œก์•ˆ์œผ๋กœ ํ™•์ธํ•  ์ˆ˜ ์—†๊ฒŒ ์€ํ๋œ ํŒŒ์ผ์˜ ์กด์žฌ ์—ฌ๋ถ€๋ฅผ ํ™•์ธํ•  ์ˆ˜ ์žˆ๋‹ค.

http://forensic-proof.com/archives/300

 

ํŒŒ์ผ ์‹œ๊ทธ๋‹ˆ์ฒ˜ ๋ชจ์Œ (Common File Signatures) | FORENSIC-PROOF

 

forensic-proof.com

HxD ์‚ฌ์šฉ๋ฒ•

  • HxD๋Š” Hex ๊ฐ’ ํ™•์ธ, Hex ๊ฐ’ ๋ณ€๊ฒฝ, ํŒŒ์ผ ์‹œ๊ทธ๋‹ˆ์ฒ˜ ํ™•์ธ ๋“ฑ ์—ฌ๋Ÿฌ ๋ชฉ์ ์œผ๋กœ ์“ฐ์ด๊ณ  ์žˆ๋Š” ๋„๊ตฌ๋กœ, ํŒŒ์ผ์— ๋Œ€ํ•œ ๋ฐ์ดํ„ฐ ๊ฐ’์„ ๋ณผ ์ˆ˜ ์žˆ๋„๋ก ํ•˜๋Š” ํ”„๋กœ๊ทธ๋žจ

 


4. ์ด๋ฏธ์ง€ ๋ณ€์กฐ

  • ์ด๋ฏธ์ง€ ํŒŒ์ผ 1๊ฐœ ์ค€๋น„
  • ํ…์ŠคํŠธ ํŒŒ์ผ์„ ์••์ถ•ํ•˜์—ฌ .zip ํŒŒ์ผ 1๊ฐœ ์ค€๋น„
  • copy /b img,jpg+text.zip result.jpg

 

'E-COPS > ๋””์ง€ํ„ธ ํฌ๋ Œ์‹' ์นดํ…Œ๊ณ ๋ฆฌ์˜ ๋‹ค๋ฅธ ๊ธ€

๋„คํŠธ์›Œํฌํฌ๋ Œ์‹  (0) 2024.11.11

+ Recent posts