Lab Access for Digital Forensics, Investigation, and Response, Fourth Edition

Section 1: Hands on Demonstration

Part 1 Detect Steganography Software on a Drive Image

  • We will be checking if stegnography software has been installed on user’s/suspect’s drive image using a specialized hash database.
  • Specialized Hash Database - Contains MD5 hash values of popular steganography tools. It can help detect software even if name has been changed to hide software itself.
  1. Open E3

  2. Open Case E3 Menu

  3. Add Evidence File (Existing in this case) & Import Hash Database for comparing image hashes with hash database to check if the user has installed any stegnography applications to hide content.

    1. Import Hash Database 1.pdh from bottom left corner Hashes option. In this virtual machine, hashes were pre downloaded, you can download similar databases from NIST

      Hash Import

    2. Then Go to Analysis -> Sorted Files Search 1

      Hash Database

    3. Move Hash Database 1.pdh to Accepted databases

      Move Database

    4. Now Check Sorted Files(on left) -> Run Query

      Image

    5. Found One Entry -> Open using Show Links

      Show LInks

    6. Turns out this is renamed file of OpenPuff tool which means some data might be hidden by suspect here using this OpenPuff

      Open Puff

Part 2: Detect Hidden Data in Image Files

  1. Lets say we found a suspicious folder with multiple files - GIFs, txt, etc.

  2. First Export Folder to another location by Right Click -> Export Export Folder

  3. Use StegExpose to find which file has hidden data java -jar "C:\Program Files (x86)\StegExpose-master\StegExpose.jar" "C:\Users\Administrator\Documents\E3 Cases\Beverly Gates evidence\Sent"

    • Location of StegExpose: C:\Program Files (x86)\StegExpose-master\StegExpose.jar
    • Location of Folder: C:\Users\Administrator\Documents\E3 Cases\Beverly Gates evidence\Sent Steg Expo

These Labs are based on Digital Forensics, Investigation, and Response 4th Edition by Dr Chuck Easttom