The goal of steganography and image file forensics is to find images with steganographic content and detect hidden content within digital images (image files) in a forensically sound manner. Investigators need to be familiar with the name of the common steganographic software and related terminology, and with websites about steganography.

Objective

The objective of this lab is to find steganographic content, and extract information from the image file using steganalysis and image file forensics tools. The tasks include:
  • Using steganographic methods to find images with steganographic content
  • Detecting the program used to hide the message
  • Detecting the location of the hidden content
  • Analyzing image file headers
  • Reconstructing the damaged file headers
  • Identifying image file fragments
  • Identifying image file formats
  • Recovering photo evidence from the raw file
Steganography and Image File Forensics

Scenario

Johnson, a forensic investigator, has been working for the Federal Bureau of Investigation (FBI). He was called to investigate a cybercrime scene and during the investigation process, he found raw data containing various image files. As an expert forensic investigator, he analyzes all images to extract the evidence. He extracts hidden data from the images using steganalysis tools. He also analyzes image file headers, reconstructs the damaged file headers, and identifies image file fragments to find the evidence.

Steganography and Image File Forensics

Computer Forensics Exercises / Steganography and Image File Forensics contains the following Exercises:

  • Analyzing Images for Hidden Messages Using Stegdetect
  • Analyzing Image File Headers Using Hex Workshop
  • Identifying Image File Format Using IrfanView
  • Recovering Photo Evidence from a Raw File Using Adroit Photo Forensics 2011

The Virtual Private Cloud for this Lab set utilizes:


Computer Forensics Exercises are available as part of the following subscription:

CEHproductimage
Each subscription provides 6 months access to 34 Different Exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise. The Computer Forensics Exercises are designed to give the user an ultimate hands-on experience. Each exercise category above has it’s own Virtual Private Cloud that comes preconfigured with Vulnerable websites, Victim Machines, and the environment is LOADED with tools, we even provide investigation files, hard disk clones and targets. Included in your network share are all the supporting tools required to practice in the Cyber Range / Lab environment.

Lab exercises are included for:

  • Computer Forensics Investigation Process
  • Computer Forensics Lab
  • Understanding Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Partitions
  • Forensics Investigation Using AccessData FTK
  • Forensics Investigation Using EnCase
  • Steganography and Image File Forensics
  • Application Password Crackers
  • Log Capturing and Event Correlation
  • Network Forensics, Investigating Logs and Investigating Network Traffic
  • Investigating Wireless Attacks
  • Tracking & Investigating Email Crimes
  • Mobile Forensics
  • Investigative Reports
Price: $199
Add to Cart
View Cart