Introduction to Computer Forensics
and Steganography
Lab Practice
You are computer forensics specialist and you were called to the crime
scene to examine the computer.
You believe that the person who used the computer encrypted the file
data.htm, that contains some important information about the
criminal
activities. This file was encrypted by Invisible Secrets tool and you
believe that the person used the password that is binary number that
corresponds to 22.
You believe also that as soon as you will be able to decrypt the
data.htm.isc file you will be able to get some information that
will help
you to determine the list of the criminal activities.
Lab Practice:
- The are two files posted on the course website: data.htm.isc and
pic.jpg
- First, save both files on desktop of your computer.
- Important: when you save the data.htm.isc file, make sure
that you
type in the full name of the file, including .isc, otherwise the file will
not be saved properly.
- Second, decrypt the file data.htm.isc using the password
that is
binary number that corresponds to 22. Use the calculator Scientific View
mode to convert number from binary to decimal and from decimal to binary.
- Read and follow instructions that are in the file data.htm (after
decryption you will be able to open the file and read it).
- The goal is to find a list of criminal activities that was hidden.