Recognizing_the_Use_of_Steganography_in_Forensic_Evidence_4e_-_Sam_Martins

pdf

School

Cambrian College *

*We aren’t endorsed by this school

Course

1010

Subject

Information Systems

Date

Apr 3, 2024

Type

pdf

Pages

8

Uploaded by CountWildcat980

Report
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 Student: Email: Sam Martins martwave@yahoo.com Time on Task: Progress: 9 hours, 40 minutes 100% Report Generated: Saturday, March 30, 2024 at 7:36 PM Section 1: Hands-On Demonstration Part 1: Detect Steganography Software on a Drive Image 14. Make a screen capture showing the search result and its description . Part 2: Detect Hidden Data in Image Files Page 1 of 8
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 10. Make a screen capture showing the StegExpose results . 13. Make a screen capture showing the suspicious file in Microsoft Paint . Part 3: Extract Hidden Data from Image Files Page 2 of 8
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 2. Record the passphrase saved in the ReadMe file. landmarks 16. Make a screen capture showing the contents of the file extracted by OpenPuff . 17. Describe the contents of the hidden file. How might it be relevant to the current investigation? The data reveals geographical coordinates situated in Chicago, Illinois, accompanied by corresponding zip codes and addresses. Given the ongoing investigation, this information could potentially aid in identifying and locating a suspect. Page 3 of 8
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 Section 2: Applied Learning Part 1: Detect Steganography Software on a Drive Image 5. Make a screen capture showing the search result and its description . Part 2: Detect Hidden Data in Image and Audio Files 4. Identify the image file with concealed data according to the StegExpose steganalysis tool. dB9olser.gif Page 4 of 8
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 7. Make a screen capture showing the WAV file sizes and hash values in E3 . Part 3: Extract Hidden Data from Image and Audio Files 9. Make a screen capture showing the contents of the hidden file extracted by S-Tools . Page 5 of 8
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 15. Make a screen capture showing the contents of the hidden file extracted by Xiao . 16. Describe the contents of the two hidden files. How might they be relevant to the current investigation? The initial concealed file displayed addresses and locations, while this file reveals contacts. Utilizing these files can serve to validate the residences or business affiliations of these contacts. Page 6 of 8
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 Section 3: Challenge and Analysis Part 1: Detect More Hidden Data Record the names of the files that contain concealed data. chicago.bmp chicago1.bmp Part 2: Extract More Hidden Data Make a screen capture showing the first file extracted by OpenStego . Page 7 of 8
Recognizing the Use of Steganography in Forensic Evidence (4e) Digital Forensics, Investigation, and Response, Fourth Edition - Lab 02 Make a screen capture showing the second file extracted by OpenStego . Powered by TCPDF (www.tcpdf.org) Page 8 of 8