Skip to content

Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.

License

Notifications You must be signed in to change notification settings

cdpxe/NetworkCovertChannels

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

62 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Steffen Wendzel's Network Covert Channel Tools

This repository contains some of my covert channel projects and also refers to some other repositories where I host my additional covert channel projects.

If you need an introduction, check out my free open online class on network covert channels.

In this repository:

  • pct, 2008: Protocol Channel Tool (pct a PoC implementation to show that so-called protocol channels/protocol switching covert channels are feasible).
  • phcct, 2007: Protocol Hopping Covert Channel Tool (phcct was the first (2007) implementation of a protocol hopping covert channel).
  • vstt, 2006: Very Strange Tunneling Tool (This was my first network CC tool. I wrote vstt as a 2nd semester undergrad student. It can tunnel through ICMP, TCP, ...).
  • pcaw, 2012: Protocol Channel-aware Active Warden (pcaw is a countermeasure to reduce the error-free transmission performance of so-caled protocol switching covert channels/pct (and protocol hopping covert channels). I wrote this in 2012 while working on my PhD thesis).

My other covert channel projects on GitHub

  • CCEAP, 2016: Covert Channel Educational Analysis Protocol (a tool for teaching network covert channel patterns).
  • NELphase, 2017: Network Environment Learning Phase (a tool that implements a covert channel capable of performing an network environment learning (NEL) phase and that can be used to test active and passive wardens).

Tools of my students

  • DYST, 2022-2025: The covert channel that allows covert channel amplification. It is also the first implementation of a history covert channel.
  • OPPRESSION, 2024: An implementation of a history covert channel that is based on online text repositories.
  • WiFi Reconnection-based Covert Channel, 2021: My PhD student Sebastian Zillien developed this PoC code to demonstrate a WiFi reconnection-based covert channel that exploits pattern PT15 (Artificial Reconnections) by forcing WiFi clients to reconnect. The channel can provide anonymity for covert sender and covert receiver.
  • CoAP Reset-/Reconnection-based Covert Channels, 2021: Another tool by my PhD students.

Other Stego Tools