Commonly used algorithms are AES-256 and ZipCrypto. When zip files are password protected, their contents are encrypted. Whilst some circumstantial evidence had been obtained, gaining access to these containers would prove key. It would therefore be unlikely that commonly available wordlists would be effective. Some passwords that were retrievable from the systems showed the use of Japanese words written in the Latin alphabet. Compounding this problem was that the user was an interpreter and therefore was conversational in several foreign languages. There were 1,017 unique password protected zip files for which the passwords were not known. Their contents were therefore of interest to the investigation. ![]() ![]() During the analysis a large number of unique zip files were located which were password protected and the suspect was refusing to cooperate with the investigation. Subsequently a large quantity of digital equipment was seized and sent to the digital forensics laboratory for analysis. An individual attended an NHS walk-in centre in order to speak to a physician and they divulged a criminal offence which was reported to the police.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |