30.06.2013 Views

Cracking Passwords in Forensic Investigations - Scholarly ...

Cracking Passwords in Forensic Investigations - Scholarly ...

Cracking Passwords in Forensic Investigations - Scholarly ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

13) Craiger,<br />

Swauger, and<br />

Marberry,<br />

2005<br />

14) Mookhey,<br />

2004<br />

countermeasures.<br />

Discussed the use of<br />

forensics tools and<br />

techniques for locat<strong>in</strong>g<br />

encrypted <strong>in</strong>formation and<br />

also <strong>in</strong>formation hidden by<br />

steganography. Also<br />

covered the tools and<br />

techniques for crack<strong>in</strong>g<br />

passwords <strong>in</strong> digital<br />

forensics to recover<br />

obfuscated data.<br />

Presented a list of open-<br />

source tools used for<br />

security and vulnerability-<br />

check<strong>in</strong>g purposes, as well<br />

as their uses <strong>in</strong> forensics.<br />

Also reviewed password<br />

crack<strong>in</strong>g and recovery<br />

tools.<br />

29<br />

Useful <strong>in</strong>formation for<br />

crack<strong>in</strong>g passwords <strong>in</strong><br />

forensic <strong>in</strong>vestigations.<br />

Paper provides good<br />

research <strong>in</strong> order to provide<br />

for best-practice advice for<br />

forensic <strong>in</strong>vestigators.<br />

Useful for select<strong>in</strong>g the right<br />

tools for password crack<strong>in</strong>g,<br />

improv<strong>in</strong>g mechanisms, and<br />

provid<strong>in</strong>g comparisons with<br />

tools. Such <strong>in</strong>formation<br />

could be useful best-practice<br />

advice for forensic<br />

<strong>in</strong>vestigators.<br />

As shown <strong>in</strong> Table 2.4 (numbers 1 to 9), many researchers such as Th<strong>in</strong>g and<br />

Y<strong>in</strong>g, Graves, Dell‘Amico et al., Frykholm and Juels, Weir et al., Dandass,<br />

Oechsl<strong>in</strong>, Mentens et al., and Clayton and Bond have performed research that<br />

could potentially help provide cost benefits to forensic <strong>in</strong>vestigators. Also<br />

presented <strong>in</strong> Table 2.4 (numbers 10 to 14), researchers such as Potter, Berger et<br />

al. , Lee et al., Craiger et al., and Mookhey have performed research <strong>in</strong> the field of<br />

password crack<strong>in</strong>g to help provide best-practice advice to forensic <strong>in</strong>vestigators.<br />

2.6 KEY PROBLEMS AND ISSUES SUMMARY<br />

The above summary of previous research shows that many questions have been<br />

answered regard<strong>in</strong>g methods, techniques and software tools. The pr<strong>in</strong>cipal<br />

problem be<strong>in</strong>g <strong>in</strong>vestigated has been not the actual crack<strong>in</strong>g of a password (which

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!