30.06.2013 Views

Cracking Passwords in Forensic Investigations - Scholarly ...

Cracking Passwords in Forensic Investigations - Scholarly ...

Cracking Passwords in Forensic Investigations - Scholarly ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>in</strong> the fields. The various fields <strong>in</strong> Modular Crypt Format and their purposes are<br />

shown <strong>in</strong> table 2.1.<br />

Table 2.1: The Modular Crypt Format (Garf<strong>in</strong>kel, Spafford, & Schwartz, 2003, p.<br />

88)<br />

Field Purpose Notes<br />

#1 Specifies encryption 1 specifies MD5, 2 specifies<br />

algorithm<br />

Blowfish.<br />

#2 Salt Limited to 16 characters.<br />

#3 Encrypted password hash Hash value without salt.<br />

2.1.3 Password Recovery Options<br />

In forensic <strong>in</strong>vestigations, <strong>in</strong>vestigators may come across many items of <strong>in</strong>terest<br />

which may be password protected. Therefore, <strong>in</strong>vestigators need to overcome<br />

password protection to ga<strong>in</strong> <strong>in</strong>formation of evidentiary value. Many types of items<br />

may be password-protected, and many different methods can be used for<br />

obta<strong>in</strong><strong>in</strong>g the password. The method to be used depends on the circumstance. For<br />

example, if a law enforcement agency has onl<strong>in</strong>e access to the crim<strong>in</strong>al‘s<br />

computer, they may make use of a key logger to obta<strong>in</strong> the relevant password.<br />

Likewise, if the law enforcement agency has seized the computer, the password<br />

can be cracked by us<strong>in</strong>g various password crack<strong>in</strong>g techniques. Thus, different<br />

password-protected items require different methods for password recovery. Some<br />

of the types of password-protected items along with their potential methods for<br />

recovery are discussed <strong>in</strong> this section.<br />

The various options for password recovery are as follows:<br />

i) Jump<strong>in</strong>g/pull<strong>in</strong>g the battery: Computers may conta<strong>in</strong> CMOS or<br />

BIOS passwords at startup. If so, recover<strong>in</strong>g the CMOS password<br />

is necessary <strong>in</strong> order to boot the computer. Many methods may be<br />

used to bypass the CMOS password lock or recover the password.<br />

These methods <strong>in</strong>clude, but are not limited to: remov<strong>in</strong>g the<br />

CMOS battery, manipulat<strong>in</strong>g the BIOS jumper sett<strong>in</strong>gs, short-<br />

circuit<strong>in</strong>g the chip, <strong>in</strong>terrogat<strong>in</strong>g the suspect, or try<strong>in</strong>g out the<br />

default BIOS passwords (Britz, 2009, p. 331).<br />

ii) <strong>Crack<strong>in</strong>g</strong>: Some documents, software and compressed files may<br />

conta<strong>in</strong> passwords. These passwords also serve the purpose of<br />

11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!