Recognizing_the_Use_of_Steganography_in_Forensic_Evidence_4e_-_Julio_Barros

pdf

School

Eastern Michigan University *

*We aren’t endorsed by this school

Course

427

Subject

Information Systems

Date

Dec 6, 2023

Type

pdf

Pages

8

Uploaded by ChancellorWombatPerson967

Report
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 Student: Email: Julio Barros jribeir2@emich.edu Time on Task: Progress: 2 hours, 55 minutes 100% Report Generated: Wednesday, September 27, 2023 at 5:04 PM Section 1: Hands-On Demonstration Part 1: Detect Steganography Software on a Drive Image 14. Make a screen capture showing the search result and its description . Part 2: Detect Hidden Data in Image Files Page 1 of 8
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 10. Make a screen capture showing the StegExpose results . 13. Make a screen capture showing the suspicious file in Microsoft Paint . Part 3: Extract Hidden Data from Image Files 2. Record the passphrase saved in the ReadMe file. landmarks Page 2 of 8
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 16. Make a screen capture showing the contents of the file extracted by OpenPuff . 17. Describe the contents of the hidden file. How might it be relevant to the current investigation? The file contains locations and names from other people Page 3 of 8
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 Section 2: Applied Learning Part 1: Detect Steganography Software on a Drive Image 5. Make a screen capture showing the search result and its description . Part 2: Detect Hidden Data in Image and Audio Files 4. Identify the image file with concealed data according to the StegExpose steganalysis tool. dB9olser.gif is the suspicious file Page 4 of 8
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 7. Make a screen capture showing the WAV file sizes and hash values in E3 . Part 3: Extract Hidden Data from Image and Audio Files 9. Make a screen capture showing the contents of the hidden file extracted by S-Tools . Page 5 of 8
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 15. Make a screen capture showing the contents of the hidden file extracted by Xiao . 16. Describe the contents of the two hidden files. How might they be relevant to the current investigation? The files gives personal information, so that can be relevant to the investigation since now we have names to look up Page 6 of 8
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 Section 3: Challenge and Analysis Part 1: Detect More Hidden Data Record the names of the files that contain concealed data. There are two suspicious files. chicago.bmp chicago1.bmp Part 2: Extract More Hidden Data Make a screen capture showing the first file extracted by OpenStego . Page 7 of 8
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 Make a screen capture showing the second file extracted by OpenStego . Powered by TCPDF (www.tcpdf.org) Page 8 of 8