Part 1
Section 1
Research and explain your topic (pick one from below) as it relates to Unix File System:
-
- Boot Blocks
- Superblock
- Cylinder Group
- Inode/vnode
- Hard Link
- Symbolic Link/Symlink
- Create a poster to explain to the class. Include diagrams and text as needed.
Section 2
- Password cracking is used for both criminal acts and to investigate crimes
- Password cracking is a challenge in cell phone forensics and computer forensics in general
- Research your topic (pick one from below). Post on the blog to explain to the class how your methodology works.
- Brute force
- Dictionary Attacks
- Syllable Attack
- Rule-Based Attack
- Hybrid Attack
- Rainbow Attack
- Research your topic (pick one from below). Post on the blog to explain to the class how your methodology works.
Part2
- Research Linux and its role in forensics
- On the worksheet provided:
- Identify some of the Linux utilities and versions (hint – we used one in lab) that can be used for forensic purposes (give a brief description)
- Develop a Pros and Cons list for using Linux.