Chapter 9

1234567891011121314151617
Across
  1. 4. a body of MD5 and SHA1 hash values computed from electronic files
  2. 5. adding a string to a password and then hashing it
  3. 7. containing hash values for every possible password
  4. 9. password cracker
  5. 11. merges a dictionary attack and a brute-force attack
  6. 12. builds a data set of hashes of sectors from the original file
  7. 16. windows disk partition utility
  8. 17. the end of a stored file to the end of that file cluster
Down
  1. 1. changing or manipulating a file to conceal information
  2. 2. a way to hide a partition
  3. 3. critical aspects of digital forensics
  4. 6. method of storing important cryptographic keys
  5. 8. any unsuspicious file
  6. 10. practice of hiding a secret message in something that is not secret
  7. 13. capturing keystrokes remotely
  8. 14. investigation expands beyond the original description
  9. 15. moves each digit in a set of bits left or right