Introduction to Computer Forensics and Steganography

Lab Practice

You are computer forensics specialist and you were called to the crime scene to examine the computer.

You believe that the person who used the computer encrypted the file data.htm, that contains some important information about the criminal activities. This file was encrypted by Invisible Secrets tool and you believe that the person used the password that is binary number that corresponds to 22. You believe also that as soon as you will be able to decrypt the data.htm.isc file you will be able to get some information that will help you to determine the list of the criminal activities. Lab Practice:

  1. The are two files posted on the course website: data.htm.isc and pic.jpg
  2. First, save both files on desktop of your computer.
  3. Second, decrypt the file data.htm.isc using the password that is binary number that corresponds to 22. Use the calculator Scientific View mode to convert number from binary to decimal and from decimal to binary.
  4. Read and follow instructions that are in the file data.htm (after decryption you will be able to open the file and read it).
  5. The goal is to find a list of criminal activities that was hidden.