Research Linux and its role in forensics. Identify some of the Linux utilities and versions that can be used for forensic purposes (give a brief description).

Cyber Security

part 1

section 1 Research and explain your topic (pick one from below) as it relates to Unix File System:

Boot Blocks

Superblock

Cylinder Group

Inode/vnode

Hard Link

Symbolic Link/Symlink

Create a poster to explain to the class. Include diagrams and text as needed.

section 2

Password cracking is used for both criminal acts and to investigate crimes

Password cracking is a challenge in cell phone forensics and computer forensics in general

Research your topic (pick one from below). Post on the blog to explain to the class how your methodology works.

Brute force

Dictionary Attacks

Syllable Attack

Rule-Based Attack

Hybrid Attack

Rainbow Attack

part2

Research Linux and its role in forensics

On the worksheet provided:

Identify some of the Linux utilities and versions that can be used for forensic purposes (give a brief description)

Develop a Pros and Cons list for using Linux

Research Linux and its role in forensics. Identify some of the Linux utilities and versions that can be used for forensic purposes (give a brief description).
Scroll to top