Question: Lab Assignment for Module 3 In these lab assignments, we will focus on analyzing key applications and social networks used as part of a cyber

Lab Assignment for Module 3 In these lab assignments, we will focus on analyzing key applications and social networks used as part of a cyber crime. There are three lab assignments this week. Upload a report of your findings to the online file dropbox in Canvas. See further instructions below. Lab Assignments

1: Using OSForensics or Autopsy, search C08carve.dd for graphics files that were manipulated to appear like other file types.

2: Using the Mobilefish steganography tool (Links to an external site.)Links to an external site., search for hidden messages in the graphics files that reveal some information about the overall crime (see 'Images' folder) Password is: "digiforensics".

3: Using a mail client of your choice, analyze the emails provided to identify information related to the crime (HINT: Emails in MBOX format).

Instructions

As always, you may seek help by posting a request on the Learning Community discussion board. However, you must ultimately perform the work on your own and you must submit your own work. Please submit your assignment as a PDF.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!