Computer Forensics & Cyber Crime


 Cracking Passwords

While digitally processing the USB device obtained from an employee at the Triton Corporation, who was allegedly looking at child pornography, you find several password protected files and other files with headers that don’t match the extension. 

Compose a 2-3 page paper describing the procedures for retrieving the evidence with some of the forensic tools and hexadecimal editors. Explain how to identify the file headers and determine how their extensions are mismatched. Then discuss what techniques and tools you can use for recovering passwords from the protected files.

Please compose paper in APA style format and include 2-3 cited sources of information.

    • 3 years ago
    • 20

    Purchase the answer to view it

    • attachment