Presentation is loading. Please wait.

Presentation is loading. Please wait.

Passwords, Encryption Forensic Tools

Similar presentations


Presentation on theme: "Passwords, Encryption Forensic Tools"— Presentation transcript:

1 Passwords, Encryption Forensic Tools
Forensics4 Passwords, Encryption Forensic Tools

2 Access Control How to Obtain Password Ask for the password
Find password near computer Use social engineering Use personal data to guess password Crack password Use word list Use modified words - hybrid attack Use brute force Use different Operating System to access data

3 Encryption Advantages Disadvantages
Encrypted data can’t be easily read Strong encryption may require years of work to decrypt without the key Disadvantages Encrypted files draw attention to their value If you loose the key, you loose the data For large files, strong encryption may take significant time to decrypt Encryption/Decryption covered in previous course

4 Types of Encryption Substitution Cipher Private Key Public Key
Oldest method Easy to crack Private Key Both sender and receiver use the same key Problem with getting key to receiver Public Key Sender uses receivers public key to encrypt Receiver uses his private key to decrypt There are methods to assure that the message originated from the stated sender and receiver identity is verified

5 Steganography Hide data in picture/sound file by modifying LSB’s of data Free demo program at: steganography-software.html To improve security combine steganography with encryption First encrypt the message, then apply steganography

6 Forensic Software Commercial forensic software is very expensive due to limited market Free forensic software dd – comes with UNIX OS – makes bit level copies dd for Windows Get dd-06beta.zip Unzip to a folder Use dd –list to find how to refer to hard drive Use dd if=<input device> of=<output file> to make copy Use dd if=/device/zero of=<output device> to zero a drive

7 Free Forensic Software
Forensic Tool Kit Imager from -downloads#.UctFozvVCSo Click on FTK IMAGER to download the application Can make forensic copy of entire disk or analyze contents The Sleuth Kit from Click on Download to get the application A collection of command line tools

8 Free Forensic Software
The SANS Investigative Forensic Toolkit (SIFT) A collection of forensic tools that runs as a Vmware Virtual Machine Available at forensics.sans.org/community/downloads Microsoft System Internals available at us/sysinternals/bb aspx Command line tool collection for Windows

9 Forensic Hardware Write Blocker - prevents writes to original hard disk Connects between forensic computer and original hard drive Can also be used between disk copy and forensic computer to assure that the copy is not modified


Download ppt "Passwords, Encryption Forensic Tools"

Similar presentations


Ads by Google