Please enable JavaScript.
Coggle requires JavaScript to display documents.
Illegal possession of images - Coggle Diagram
Illegal possession of images
Tools
Stegdetect
use for hiding photos
Stegcrack
Use for Crack passwords
Sleuth Kit
steghide/stegseek
Use the same steg tool to recover the photos
wireshark
Steg Toolkit
Commands
Display
To show
Fcrackzip
Crack encrypted files
Whois
To get information of an owner
Wine
Run window application on window
bless
Binary editor
Jphide
Allow to hide file
mmls
Show partition
Stegseekexe
Extract hidden data
fsstat
Display details of a file system
Stegbreak
Uncover hidden data
curl
Transferring data from to a server
Stegdetect
Detect stegnographic content in an image
chmod
Modifies file permission
ExifTool
Reading, writing and manipulation files
rm
Remove file recursively
Photorec
File data recovery software
sherd
Delete a file completely from hard disk
FTP
File transfer Protocol
mkdir
Create a directory
HTTP
Hypertext transfer protocol
Steps
HTTP request protocol
HTTP response protocol
Three-way handshake
TCP Close connection
Observe HTTP traffic
Observe HTTP with embedded images
Capture HTTP traffic
Captured HTTP Traffic overview
Analyze the second HTTP get request/response
Traffic contains an image
Extract the image from traffic
Forensic evidence
File Recovering
Recover Images from DD
Get DD Image
Steganography
recover the photos
Crack passwords
Detect hiding photos
Traffic Log Analysis
FTP
Traffic Log Analysis
Investigate Email traffics
HTTP