Part 1

Section 1

Research and explain your topic (pick one from below) as it relates to Unix File System:

    • Boot Blocks
    • Superblock
    • Cylinder Group
    • Inode/vnode
    • Hard Link
    • Symbolic Link/Symlink
  • Create a poster to explain to the class. Include diagrams and text as needed.

Section 2

  • Password cracking is used for both criminal acts and to investigate crimes
  • Password cracking is a challenge in cell phone forensics and computer forensics in general
    • Research your topic (pick one from below). Post on the blog to explain to the class how your methodology works.
      • Brute force
      • Dictionary Attacks
      • Syllable Attack
      • Rule-Based Attack
      • Hybrid Attack
      • Rainbow Attack

Part2

  • Research Linux and its role in forensics
  • On the worksheet provided:
    • Identify some of the Linux utilities and versions (hint – we used one in lab) that can be used for forensic purposes (give a brief description)
    • Develop a Pros and Cons list for using Linux.