HTCIA 2016 Conference Presentation


Thank you for participating in the HTCIA 2016 session:

Python Multi-Core Password/Key Cracking

As promised here is the zip file containing the presentation and associated source code.


Presentation Abstract

HTCIA 2016 Presentation, Python Multi-Core Password/Key Cracking

The ability to (with proper warrant or rights) crack passwords and the associated encrypted files has become a vital issue for DFIR and traditional forensic investigations. This presentation will demonstrate the use of multi-core processing capabilities built into the Python programming language along with specific methods to crack and recover passwords using brute force and dictionary methods.
All methods demonstrated are open source and participants of the lecture will be given access to the source code to experiment with, apply to investigations or expand upon.

1. Fundamental understanding of the Python Language multi-core processing capabilities.
2. Clear understanding on how to apply multi-core processing to the cracking of passwords and encryption
3. Take-away Python open source code that can be immediately applied
4. Key limitations and proper processes that need to be in place during cracking operations
5. Understand the distinction between dictionary and brute force methods and how to apply each

Related Book:

Python Forensics Book

Python Forensics Book

Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build new solutions.

Rapid development of new cybercrime investigation tools is an essential ingredient in virtually every case and environment. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile devices or cloud services, or you are collecting and processing evidence from a network, Python forensic implementations can fill in the gaps.

Drawing upon years of practical experience and using numerous examples and illustrative code samples, author Chet Hosmer discusses how to:

  • Develop new forensic solutions independent of large vendor software release schedules
  • Participate in an open-source workbench that facilitates direct involvement in the design and implementation of new methods that augment or replace existing tools
  • Advance your career by creating new solutions along with the construction of cutting-edge automation solutions to solve old problems
  • Provides hands-on tools, code samples, and detailed instruction and documentation that can be put to use immediately
  • Discusses how to create a Python forensics workbench
  • Covers effective forensic searching and indexing using Python
  • Shows how to use Python to examine mobile device operating systems: iOS, Android, and Windows 8
  • Presents complete coverage of how to use Python scripts for network investigation