Across
- 4. a body of MD5 and SHA1 hash values computed from electronic files
- 5. adding a string to a password and then hashing it
- 7. containing hash values for every possible password
- 9. password cracker
- 11. merges a dictionary attack and a brute-force attack
- 12. builds a data set of hashes of sectors from the original file
- 16. windows disk partition utility
- 17. the end of a stored file to the end of that file cluster
Down
- 1. changing or manipulating a file to conceal information
- 2. a way to hide a partition
- 3. critical aspects of digital forensics
- 6. method of storing important cryptographic keys
- 8. any unsuspicious file
- 10. practice of hiding a secret message in something that is not secret
- 13. capturing keystrokes remotely
- 14. investigation expands beyond the original description
- 15. moves each digit in a set of bits left or right
