Recognizing_the_Use_of_Steganography_in_Forensic_Evidence_4e_-_Sam_Martins
pdf
keyboard_arrow_up
School
Cambrian College *
*We aren’t endorsed by this school
Course
1010
Subject
Information Systems
Date
Apr 3, 2024
Type
Pages
8
Uploaded by CountWildcat980
Recognizing the Use of Steganography in Forensic Evidence (4e)
Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02
Student:
Email:
Sam Martins
martwave@yahoo.com
Time on Task:
Progress:
9 hours, 40 minutes
100%
Report Generated:
Saturday, March 30, 2024 at 7:36 PM
Section 1: Hands-On Demonstration
Part 1: Detect Steganography Software on a Drive Image
14.
Make a screen capture
showing the
search result and its description
.
Part 2: Detect Hidden Data in Image Files
Page 1 of 8
Recognizing the Use of Steganography in Forensic Evidence (4e)
Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02
10.
Make a screen capture
showing the StegExpose results
.
13.
Make a screen capture
showing the suspicious file in Microsoft Paint
.
Part 3: Extract Hidden Data from Image Files
Page 2 of 8
Recognizing the Use of Steganography in Forensic Evidence (4e)
Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02
2.
Record
the passphrase saved in the ReadMe file.
landmarks
16.
Make a screen capture
showing the
contents of the file extracted by OpenPuff
.
17.
Describe
the contents of the hidden file. How might it be relevant to the current investigation?
The data reveals geographical coordinates situated in Chicago, Illinois, accompanied by
corresponding zip codes and addresses. Given the ongoing investigation, this information could
potentially aid in identifying and locating a suspect.
Page 3 of 8
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Recognizing the Use of Steganography in Forensic Evidence (4e)
Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02
Section 2: Applied Learning
Part 1: Detect Steganography Software on a Drive Image
5.
Make a screen capture
showing the search result and its description
.
Part 2: Detect Hidden Data in Image and Audio Files
4.
Identify
the image file with concealed data according to the StegExpose steganalysis tool.
dB9olser.gif
Page 4 of 8
Recognizing the Use of Steganography in Forensic Evidence (4e)
Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02
7.
Make a screen capture
showing the WAV file sizes and hash values in E3
.
Part 3: Extract Hidden Data from Image and Audio Files
9.
Make a screen capture
showing the contents of the hidden file extracted by S-Tools
.
Page 5 of 8
Recognizing the Use of Steganography in Forensic Evidence (4e)
Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02
15.
Make a screen capture
showing the contents of the hidden file extracted by Xiao
.
16.
Describe
the contents of the two hidden files. How might they be relevant to the current
investigation?
The initial concealed file displayed addresses and locations, while this file reveals contacts. Utilizing
these files can serve to validate the residences or business affiliations of these contacts.
Page 6 of 8
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Recognizing the Use of Steganography in Forensic Evidence (4e)
Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02
Section 3: Challenge and Analysis
Part 1: Detect More Hidden Data
Record
the names of the files that contain concealed data.
chicago.bmp
chicago1.bmp
Part 2: Extract More Hidden Data
Make a screen capture
showing the first file extracted by OpenStego
.
Page 7 of 8
Recognizing the Use of Steganography in Forensic Evidence (4e)
Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02
Make a screen capture
showing the second file extracted by OpenStego
.
Powered by TCPDF (www.tcpdf.org)
Page 8 of 8