30.06.2013 Views

Cracking Passwords in Forensic Investigations - Scholarly ...

Cracking Passwords in Forensic Investigations - Scholarly ...

Cracking Passwords in Forensic Investigations - Scholarly ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1.0 BACKGROUND<br />

Chapter One<br />

INTRODUCTION<br />

The use of passwords for secur<strong>in</strong>g data is a common practice for computer users.<br />

<strong>Passwords</strong> are used as a security mechanism to protect the privacy and<br />

confidentiality of data on computers. <strong>Passwords</strong> are used for a variety of<br />

applications, for example for secur<strong>in</strong>g a person’s e-mail account, bank account,<br />

computer, or private data <strong>in</strong> files and spreadsheets. Password protection not only<br />

ensures authentication of the user access<strong>in</strong>g the data, but <strong>in</strong> many cases it also<br />

supports encryption for the entity that needs to be protected. Encryption ensures<br />

the privacy of data, such that only the legitimate user can have access to the<br />

<strong>in</strong>formation. Therefore, any illegitimate user who does not have the password is<br />

unable to have access to the encrypted <strong>in</strong>formation.<br />

<strong>Passwords</strong> have proved to be optimal for security. However, passwords<br />

can also be used by people with malicious <strong>in</strong>tent. A malicious person may use<br />

passwords and encryption to protect <strong>in</strong>crim<strong>in</strong>at<strong>in</strong>g <strong>in</strong>formation from the access of<br />

law enforcement agencies. If the law enforcement agencies or forensic<br />

<strong>in</strong>vestigators are not provided with the password, it may not be possible for them<br />

to ga<strong>in</strong> important evidence. Such a situation could hamper justice, as the<br />

malicious person may not be prosecuted <strong>in</strong> a court of law without credible<br />

evidence. Therefore, <strong>in</strong> such situations law enforcement agencies need to resort to<br />

various means of password recovery <strong>in</strong> order to ga<strong>in</strong> access to the encrypted<br />

<strong>in</strong>formation.<br />

One of the most common methods of overcom<strong>in</strong>g password protection is<br />

password crack<strong>in</strong>g (Casey, 2004). Password crack<strong>in</strong>g can be done us<strong>in</strong>g a variety<br />

of tools and techniques, the most common of which is to use automated software<br />

to try various possible guesses until the correct password is found. Other<br />

techniques <strong>in</strong>volve the use of brute-force crack<strong>in</strong>g methods, ra<strong>in</strong>bow tables, and<br />

also Markov cha<strong>in</strong>s (Marechal, 2008). Hence, <strong>in</strong> order to recover passwords, law<br />

enforcement agencies need to use a variety of password crack<strong>in</strong>g tools and<br />

techniques.<br />

1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!