Notifications
Clear all
Topic starter
24/01/2011 6:42 pm
Hi guys,
does anyone know a weakness in the steg tool "contraband"? If not is the only solution to getting the hidden data back, a brute force approach. Is their any "tell tail" signs in the hex of where the password is stored or the exact location of the hidden data.
If brute force is the way to go - how forensically sound is that?
kind Regards,
Gav
24/01/2011 7:00 pm
If brute force is the way to go - how forensically sound is that?
If you're an experienced examiner working on a copy of the file, not the original, and you document your steps to the extent that another examiner could repeat your results, then it would probably be regarded as admissible evidence.