Question: A tech - savvy suspect attempted to hide the password of a file from the Police. To do this, the suspect used Based - 6

A tech-savvy suspect attempted to hide the password of a file from the Police. To do this, the suspect used Based-64 encoding, knowIdge of hashing, and file carving techniques.
Suppose that the suspect performed the following sequences of function on the password.
The suspect first creates a hash of the plaintext password.
The suspect then computes the base-64 encoding of the hashed password (saved the information in a txt file).
Used the ISB method to hide the information ( txt) inside an image.
Perform Hex scrambling using a manual replacement approach.
What is the right sequence to retrieve the plaintext password?
A. Retrieve the hidden message from the image- Compute hash lookup - Compute Base-64 decoding
B. Perform file carving + Retrieve the hidden message from the image-Compute Base-64 decoding Compute hash lookup
C. Compute hash lookup - Perform file carving Compute Base-64 decoding > Retrieve the hidden message from the image D. Retrieve the hidden message from the image-Compute Base-64 encoding + Perform file carving->Compute hash lookup
O E. Perform file carving->Compute hash lookup Compute Base-64 encoding > Retrieve the hidden message from the image.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!