Cracking Passwords in Forensic Investigations - Scholarly ...
Cracking Passwords in Forensic Investigations - Scholarly ...
Cracking Passwords in Forensic Investigations - Scholarly ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
1.0 BACKGROUND<br />
Chapter One<br />
INTRODUCTION<br />
The use of passwords for secur<strong>in</strong>g data is a common practice for computer users.<br />
<strong>Passwords</strong> are used as a security mechanism to protect the privacy and<br />
confidentiality of data on computers. <strong>Passwords</strong> are used for a variety of<br />
applications, for example for secur<strong>in</strong>g a person’s e-mail account, bank account,<br />
computer, or private data <strong>in</strong> files and spreadsheets. Password protection not only<br />
ensures authentication of the user access<strong>in</strong>g the data, but <strong>in</strong> many cases it also<br />
supports encryption for the entity that needs to be protected. Encryption ensures<br />
the privacy of data, such that only the legitimate user can have access to the<br />
<strong>in</strong>formation. Therefore, any illegitimate user who does not have the password is<br />
unable to have access to the encrypted <strong>in</strong>formation.<br />
<strong>Passwords</strong> have proved to be optimal for security. However, passwords<br />
can also be used by people with malicious <strong>in</strong>tent. A malicious person may use<br />
passwords and encryption to protect <strong>in</strong>crim<strong>in</strong>at<strong>in</strong>g <strong>in</strong>formation from the access of<br />
law enforcement agencies. If the law enforcement agencies or forensic<br />
<strong>in</strong>vestigators are not provided with the password, it may not be possible for them<br />
to ga<strong>in</strong> important evidence. Such a situation could hamper justice, as the<br />
malicious person may not be prosecuted <strong>in</strong> a court of law without credible<br />
evidence. Therefore, <strong>in</strong> such situations law enforcement agencies need to resort to<br />
various means of password recovery <strong>in</strong> order to ga<strong>in</strong> access to the encrypted<br />
<strong>in</strong>formation.<br />
One of the most common methods of overcom<strong>in</strong>g password protection is<br />
password crack<strong>in</strong>g (Casey, 2004). Password crack<strong>in</strong>g can be done us<strong>in</strong>g a variety<br />
of tools and techniques, the most common of which is to use automated software<br />
to try various possible guesses until the correct password is found. Other<br />
techniques <strong>in</strong>volve the use of brute-force crack<strong>in</strong>g methods, ra<strong>in</strong>bow tables, and<br />
also Markov cha<strong>in</strong>s (Marechal, 2008). Hence, <strong>in</strong> order to recover passwords, law<br />
enforcement agencies need to use a variety of password crack<strong>in</strong>g tools and<br />
techniques.<br />
1