Hidden data has been around for a long time, from Julius Ceasar’s cipher to modern data cryptography. Some of the techniques to hide data are simple; some are extremely sophisticated. With the proliferation of sophisticated tools for law enforcements to examine digital contents, so have anti-forensics tools and techniques for people wishing to hide their tracks and throw investigators off their trails. We will examine a very simple technique to hide data – delete the file types, and using tools to easily discover the real files.
You are given a hard drive to analyze and the following files have no extensions. Download the zip file below and try to find the extensions of the files. The answers are below.
|Answers.txt(1.21 KB)||marcbudofsky, Mar 17 2013, 9:42 PM|
|Files.zip(3.41 MB)||marcbudofsky, Mar 17 2013, 9:42 PM|
File System Forensics Analysis by Brian Carrier, Addison Wesley Professional
You must Sign-In to post a comment.