Across
- 2. password hack
- 4. protect evidence disks by preventing data being written
- 5. submitting many passwords with the hope of guessing one correctly
- 8. how passwords are usually stored
- 10. linux used by many security professionals
- 11. compiled a list of known file hashes for a variety of OSs
- 13. first task in digital forensics investigation
- 14. proves that two sets of data are identical
- 15. FF D8 hex value
- 17. password sometimes written to temporary file
Down
- 1. re-create the suspects drive
- 3. recovery task in a digital investigation that is the most challenging
- 6. for cracking password hashes
- 7. reconstruction of fragments of files that have been deleted
- 9. easiest forensics tool to use
- 12. a way to confirm that a tool is functioning as intended
- 16. third party encryption tool