Beruflich Dokumente
Kultur Dokumente
Today we are going to use some steganography tools, and a tool to detect the
use of steganography.
1. Copy the folder names Stg from our module folder on the shared drive.
This contains JPHide and Seek, Stegdetect and Stegbreak.
2. the shared drive in our module folder.
3. S-Tools is already in your forensic VM.
S-Tools
You will be using the s-tools steganography tool, located in C:\Win7_Software\stools in the forensic VM (there is a short cut on the desktop). Start with the
tutorial in Quick start.doc which is on the shared S: drive. Then try hiding files
yourself:
Extension activity
Identify and Download some steganography and steganalysis tools from the
Internet and try them out. (See this weeks lecture notes for some links). For
example:
SNOW
http://www.darkside.com.au/snow/