30.06.2013 Views

Cracking Passwords in Forensic Investigations - Scholarly ...

Cracking Passwords in Forensic Investigations - Scholarly ...

Cracking Passwords in Forensic Investigations - Scholarly ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

sets used, method of attack, how compromised the passwords are, and also the<br />

length of passwords (Potter, 2009). An example of L0phtCrack 6‘s report is<br />

shown <strong>in</strong> Figure 2.4.<br />

Figure 2.4: An example of report<strong>in</strong>g <strong>in</strong> L0phtCrack 6 (Potter, 2009, p.17)<br />

2.3.3 Password Recovery Toolkit & Distributed Network Attack<br />

Password Recovery Toolkit (PRTK) and Distributed Network Attack (DNA) are<br />

commercially available password-recovery software packages released by<br />

AccessData Corp. The target audience for PRTK and DNA are law enforcement<br />

agencies, corporate security, and IT professionals. PRTK is also targeted at<br />

<strong>in</strong>dividual users such as adm<strong>in</strong>istrators who wish to recover lost passwords. PRTK<br />

and DNA are the most powerful and versatile password-recovery programs<br />

available on the market. PRTK supports a wide variety of file types and<br />

encryption standards; DNA has the same features as PRTK, but supports<br />

harness<strong>in</strong>g the power of several computers for crack<strong>in</strong>g passwords (Casey, 2004;<br />

AccessData Corp., 2010).<br />

PRTK and DNA support a wide variety of password crack<strong>in</strong>g attacks.<br />

Adapted from the Distributed Network Attack and Password Recovery Toolkit<br />

user guide by AccessData Corp. (2010), the various attacks these packages<br />

support are:<br />

19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!