Recognizing_the_Use_of_Steganography_in_Forensic_Evidence_4e_-_verity_Pobst

pdf

School

State College of Florida, Manatee-Sarasota *

*We aren’t endorsed by this school

Course

1600

Subject

Information Systems

Date

Oct 30, 2023

Type

pdf

Pages

9

Uploaded by MateDogMaster554

Report
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 Student: Email: verity Pobst veritypobst@usf.edu Time on Task: Progress: 14 hours, 50 minutes 100% Report Generated: Saturday, October 14, 2023 at 5:48 PM Section 1: Hands-On Demonstration Part 1: Detect Steganography Software on a Drive Image 14. Make a screen capture showing the search result and its description . Part 2: Detect Hidden Data in Image Files Page 1 of 9
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 10. Make a screen capture showing the StegExpose results . 13. Make a screen capture showing the suspicious file in Microsoft Paint . Page 2 of 9
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 Part 3: Extract Hidden Data from Image Files 2. Record the passphrase saved in the ReadMe file. landmarks 16. Make a screen capture showing the contents of the file extracted by OpenPuff . 17. Describe the contents of the hidden file. How might it be relevant to the current investigation? This is relevant to the current investigation because it was a hidden content that the creator thought would not be suspicious. They thought that it would not have been found. Page 3 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 Section 2: Applied Learning Part 1: Detect Steganography Software on a Drive Image 5. Make a screen capture showing the search result and its description . Part 2: Detect Hidden Data in Image and Audio Files 4. Identify the image file with concealed data according to the StegExpose steganalysis tool. dB9olser.gif is suspicious according to the StegExpose steganalysis tool. Page 4 of 9
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 7. Make a screen capture showing the WAV file sizes and hash values in E3 . Part 3: Extract Hidden Data from Image and Audio Files Page 5 of 9
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 9. Make a screen capture showing the contents of the hidden file extracted by S-Tools . 15. Make a screen capture showing the contents of the hidden file extracted by Xiao . Page 6 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 16. Describe the contents of the two hidden files. How might they be relevant to the current investigation? The 2 files are relevant because they show proof that the accused have contact numbers of their drug dealers. The other file shows what they are hiding which is the IP address using TOR. These 2 files are relevant because they show proof the accused company has hidden contact numbers for their drug dealers. The other file shows that they are actively trying to hide their IP address using TOR. Page 7 of 9
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 Section 3: Challenge and Analysis Part 1: Detect More Hidden Data Record the names of the files that contain concealed data. The names of the files that contain the concealed data are chicago1.bpm and chicago.bpm Part 2: Extract More Hidden Data Make a screen capture showing the first file extracted by OpenStego . Page 8 of 9
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 Make a screen capture showing the second file extracted by OpenStego . Powered by TCPDF (www.tcpdf.org) Page 9 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help

Browse Popular Homework Q&A

Q: Write the balanced neutralization reaction that occurs between H2SO4H2SO4 and KOHKOH in aqueous…
Q: Ice cubes from the freezer weigh about 25 g and are at a temperature of -15.0 °C. Suppose I have a…
Q: A ball is thrown into the air and its position is given by h(t) = – 3.6t² + 76t + 24 where h is the…
Q: A beam of length L and mass M is supported by, but not attached to, two posts as in the figure…
Q: -3 N (0, -8) 3 X H
Q: A sample 200 marbles from Company A had a mean diameter of .745 inches with a standard deviation of…
Q: Solve the logarithmic equation. Be sure to reject any value of x that is not in the domain of the…
Q: Classify each number below as an integer or not. 16 4 -34 - 10 —— 13 24 4 -22.92 Integer? Yes No O O…
Q: Many investors and financial analysts believe the Dow Jones Industrial Average (DJIA) gives a good…
Q: Nickel (ii) chloride + Potassium phosphate Molecular Equation Ionic Equation Net Ionic Equation
Q: . 67 grams of NaOH (strong base, MM 40 g/mol) are reacted with an excess of HCL ( strong acid, MM…
Q: F. Suppose that gcd(n,m) >1, and let G = Zn xZm. Show that there exists a number k 1, then Zn xZm is…
Q: Əw Find when r = 3 and s= - 3 if w = (x+y+z)²₁ x=r-s, y = cos (r + s), z = sin (r + s). ər Əw ər |r=…
Q: If f(x) = 4x² – 7x + 6, find f'(- 2). Use this to find the equation of the tangent line to the…
Q: Objects can possess energy as ________.            (a) endothermic energy          (b) potential…
Q: m sample of size n₁ = 13 is selected from a normal population with a mean of 76 and a standard…
Q: Chlorine gas can be prepared in the laboratory by the reaction of hydrochloric acid with…
Q: Flagstaff Inc.'s stock has a 42% chance of producing a 42% return, a 31% chance of producing a 31%…
Q: For Problems 11-14, determine orthogonal bases for rowspace(A) and colspace(A). 11. A = 12. A = 13.…
Q: How did Carter undermine the good relations we had with the Soviet Union that were established by…
Q: Exercise 4.4.15. Consider a plane with Cartesian coordinates. Let O be the point (0, 0), let A be…
Q: True or False: The following statement accurately describes how firms make decisions related to…