top of page

YCEP Day 3: Hiding and extracting information

  • Writer: Xavier Woon
    Xavier Woon
  • Jun 17, 2021
  • 1 min read

Updated: Aug 1, 2021

Notes:

- Forensics: how was the impact or damage determined

- Acquisition, analysis, documentation, presentation

- Forensic tool kit (FTK)

- Reconstructing the image: make sure there is no tampering, get a golden copy

- GUI: graphic user interface

- Encryption: make things secure and you can decrypt to get the file back

- Hashing: used for comparing but cannot get it back (defend against man in the middle attacks, compare to find any tampering)

- Slack space: put in secret information into files which others can’t see (an important form of evidence in the field of forensic investigation. Often, slack space can contain relevant information about a suspect that a prosecutor can use in a trial)

- HxD

- Multihasher

- Autopsy

- WireShark


Using autopsy to analyze images in forensics:

ree


Hiding and extracting hidden information(Steganography) from an image(jpeg):

ree


~17 June 2021

Comments


Post: Blog2_Post
  • Facebook
  • Instagram

©2021 by Xavier's Blog. Proudly created with Wix.com

bottom of page