Introduction to Computer Forensics
Lab Practice - Preparation for Lab Assignment
You are computer forensics specialist and you were called to the crime
scene to examine the computer.
You believe that the person who used the computer encrypted the file
data.htm, that contains some important information about the
criminal
activities. This file was encrypted by Invisible Secrets tool and you
believe that the person used the password that is binary number that
corresponds to 22.
You believe also that as soon as you will be able to decrypt the
data.htm.isc file you will be able to get some information that
will help
you to determine the list of the criminal activities.
Lab Practice:
- I attached two files to the e-mail: data.htm.isc and pic.jpg
- First, save both files on desktop of your computer.
- Important: when you save the data.htm.isc file, make sure
that you
type in the full name of the file, including .isc, otherwise the file will
not be saved properly.
- Second, decrypt the file data.htm.isc using the password
that is
binary number that corresponds to 22.
- Read and follow instructions that are in the file data.htm (after
decryption you will be able to open the file and read it).
- The goal is to find a list of criminal activities that was hidden.