Identify some of the Linux utilities and versions

part 1

    • section 1 Research and explain your topic (pick one from below) as it relates to Unix File System:
      • Boot Blocks
      • Superblock
      • Cylinder Group
      • Inode/vnode
      • Hard Link
      • Symbolic Link/Symlink
    • Create a poster to explain to the class. Include diagrams and text as needed.
    • section 2
    • Password cracking is used for both criminal acts and to investigate crimes
    • Password cracking is a challenge in cell phone forensics and computer forensics in general
      • Research your topic (pick one from below). Post on the blog to explain to the class how your methodology works.
        • Brute force
        • Dictionary Attacks
        • Syllable Attack
        • Rule-Based Attack
        • Hybrid Attack
        • Rainbow Attack

 

part2

  • Research Linux and its role in forensics
  • On the worksheet provided:
    • Identify some of the Linux utilities and versions (hint – we used one in lab) that can be used for forensic purposes (give a brief description)
    • Develop a Pros and Cons list for using Linux