Question: A tech - savvy suspect attempted to hide the password of a file from the Police. To do this, the suspect used Based - 6
A techsavvy suspect attempted to hide the password of a file from the Police. To do this, the suspect used Based encoding, knowIdge of hashing, and file carving techniques.
Suppose that the suspect performed the following sequences of function on the password.
The suspect first creates a hash of the plaintext password.
The suspect then computes the base encoding of the hashed password saved the information in a txt file
Used the ISB method to hide the information txt inside an image.
Perform Hex scrambling using a manual replacement approach.
What is the right sequence to retrieve the plaintext password?
A Retrieve the hidden message from the image Compute hash lookup Compute Base decoding
B Perform file carving Retrieve the hidden message from the imageCompute Base decoding Compute hash lookup
C Compute hash lookup Perform file carving Compute Base decoding Retrieve the hidden message from the image D Retrieve the hidden message from the imageCompute Base encoding Perform file carvingCompute hash lookup
O E Perform file carvingCompute hash lookup Compute Base encoding Retrieve the hidden message from the image.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
