Using both resources provided by my professors as well as information I can find on the internet, I will construct a list of various methods that I want to explore. These could include, but are not limited to, slackspace hiding, NTFS Alternative Data streams, and stegonography.
Completed this project and documented my findings in a research document. You can find this under the "Data Hiding" folder in the Anti-Forensics topic within my git structure.
Using both resources provided by my professors as well as information I can find on the internet, I will construct a list of various methods that I want to explore. These could include, but are not limited to, slackspace hiding, NTFS Alternative Data streams, and stegonography.