Encrypted Covert Channel Application icon

Encrypted Covert Channel 1.0

472.8 KB / 1+ Downloads / Rating 4.5 - 2 reviews


See previous versions

Encrypted Covert Channel, developed and published by James Kwon(Soon Zoo Kwon), has released its latest version, 1.0, on 2015-08-16. This app falls under the Productivity category on the Google Play Store and has achieved over 100 installs. It currently holds an overall rating of 4.5, based on 2 reviews.

Encrypted Covert Channel APK available on this page is compatible with all Android devices that meet the required specifications (Android 4.0+). It can also be installed on PC and Mac using an Android emulator such as Bluestacks, LDPlayer, and others.

Read More

App Screenshot

App Screenshot

App Details

Package name: ca.bcit.comp8045

Updated: 9 years ago

Developer Name: James Kwon(Soon Zoo Kwon)

Category: Productivity

App Permissions: Show more

Installation Instructions

This article outlines two straightforward methods for installing Encrypted Covert Channel on PC Windows and Mac.

Using BlueStacks

  1. Download the APK/XAPK file from this page.
  2. Install BlueStacks by visiting http://bluestacks.com.
  3. Open the APK/XAPK file by double-clicking it. This action will launch BlueStacks and begin the application's installation. If the APK file does not automatically open with BlueStacks, right-click on it and select 'Open with...', then navigate to BlueStacks. Alternatively, you can drag-and-drop the APK file onto the BlueStacks home screen.
  4. Wait a few seconds for the installation to complete. Once done, the installed app will appear on the BlueStacks home screen. Click its icon to start using the application.

Using LDPlayer

  1. Download and install LDPlayer from https://www.ldplayer.net.
  2. Drag the APK/XAPK file directly into LDPlayer.

If you have any questions, please don't hesitate to contact us.

App Rating

4.5
Total 2 reviews

Previous Versions

Encrypted Covert Channel 1.0
2015-08-16 / 472.8 KB / Android 4.0+

About this app

Please, don't hesitate to send me an email if you want to test the program with the server module.
I made this as a my final project of CST Btech program at BCIT.

Encrypted Covert channel is a type of computer software attacks that allow the communication of information by transferring objects through existing information channels or networks. It uses the structure of the existing medium to convey the data in small parts. This makes conveyance through a covert channel virtually undetectable by administrators or users. Covert channels have been used to steal data from highly secure systems.

Encrypted Covert channel can pass the undetected payload through most firewalls and IDS (Intrusion Detection System) hiding its data in a packet header or payload. It camouflages its data as a part of an ordinary packet header or a packet body so that packets pass most firewalls and IDSs. However, covert channel also can be detected by an intelligent IDS or highly skilled network administrators even though it can hide the data in Sequence number or ACK (Acknowledge) of TCP/IP header reserved field or use a tool. The encrypted covert channel can prevent extracting the encrypted payload in any case. This technique can be applied to TCP and UDP packets both. This project adopts the UDP covert channel to implement.
Covert channel is created by using some of the space available either within the padding or within other parts of the transport of network packets. Covert channels use any means where data can be added to a data stream without affecting the main body of data being transmitted. This allows the covert receiver to abstract data from a system without creating any type of data trail. A single packet might only contain one or two bytes of the covert data stream, making a detection very difficult.
Creating a covert channel takes some ingenious programming, and access to the file system at the source end of the communication is essential. This means that a covert channel can only be instigated through viral infection or through a programming effort that has administrative or other authorized access to the system.

App Permissions

Allows an application to write to external storage.
Allows applications to open network sockets.
Allows applications to access information about networks.
Allows an application to read from external storage.