Cracking Passwords in Forensic Investigations - Scholarly ...
Cracking Passwords in Forensic Investigations - Scholarly ...
Cracking Passwords in Forensic Investigations - Scholarly ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
13) Craiger,<br />
Swauger, and<br />
Marberry,<br />
2005<br />
14) Mookhey,<br />
2004<br />
countermeasures.<br />
Discussed the use of<br />
forensics tools and<br />
techniques for locat<strong>in</strong>g<br />
encrypted <strong>in</strong>formation and<br />
also <strong>in</strong>formation hidden by<br />
steganography. Also<br />
covered the tools and<br />
techniques for crack<strong>in</strong>g<br />
passwords <strong>in</strong> digital<br />
forensics to recover<br />
obfuscated data.<br />
Presented a list of open-<br />
source tools used for<br />
security and vulnerability-<br />
check<strong>in</strong>g purposes, as well<br />
as their uses <strong>in</strong> forensics.<br />
Also reviewed password<br />
crack<strong>in</strong>g and recovery<br />
tools.<br />
29<br />
Useful <strong>in</strong>formation for<br />
crack<strong>in</strong>g passwords <strong>in</strong><br />
forensic <strong>in</strong>vestigations.<br />
Paper provides good<br />
research <strong>in</strong> order to provide<br />
for best-practice advice for<br />
forensic <strong>in</strong>vestigators.<br />
Useful for select<strong>in</strong>g the right<br />
tools for password crack<strong>in</strong>g,<br />
improv<strong>in</strong>g mechanisms, and<br />
provid<strong>in</strong>g comparisons with<br />
tools. Such <strong>in</strong>formation<br />
could be useful best-practice<br />
advice for forensic<br />
<strong>in</strong>vestigators.<br />
As shown <strong>in</strong> Table 2.4 (numbers 1 to 9), many researchers such as Th<strong>in</strong>g and<br />
Y<strong>in</strong>g, Graves, Dell‘Amico et al., Frykholm and Juels, Weir et al., Dandass,<br />
Oechsl<strong>in</strong>, Mentens et al., and Clayton and Bond have performed research that<br />
could potentially help provide cost benefits to forensic <strong>in</strong>vestigators. Also<br />
presented <strong>in</strong> Table 2.4 (numbers 10 to 14), researchers such as Potter, Berger et<br />
al. , Lee et al., Craiger et al., and Mookhey have performed research <strong>in</strong> the field of<br />
password crack<strong>in</strong>g to help provide best-practice advice to forensic <strong>in</strong>vestigators.<br />
2.6 KEY PROBLEMS AND ISSUES SUMMARY<br />
The above summary of previous research shows that many questions have been<br />
answered regard<strong>in</strong>g methods, techniques and software tools. The pr<strong>in</strong>cipal<br />
problem be<strong>in</strong>g <strong>in</strong>vestigated has been not the actual crack<strong>in</strong>g of a password (which