Question: In a previous lab, you learned how to use P2 Commanders Image Analyzer to automate image analysis to identify suspect files that may be useful

In a previous lab, you learned how to use P2 Commanders Image Analyzer to automate image analysis to identify suspect files that may be useful in a forensic investigation.

In this lab, you will use S-Tools, one of many free tools available online, and the Windows Photo Viewer to discover possible steganographic activity in image files that are part of an evidence drive copy. Using S-Tools, you will properly identify and extract embedded data in carrier image and document your findings:

  1. Describe a legitimate business need to leverage steganography.

2. What is the difference between steganography and cryptography?

3-What were the names and sizes of the two hidden text files that you uncovered using S-Tools on the StegoMessage.bmp image file?

  1. 4-What is the hidden message embedded in the Cipherkey.txt file?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!