Fundamentals of Digital Forensics by Joakim Kävrestad

Fundamentals of Digital Forensics by Joakim Kävrestad

Author:Joakim Kävrestad
Language: eng
Format: epub, pdf
ISBN: 9783319963198
Publisher: Springer International Publishing


The next step is to create the attack profile. PRTK allows you to run different mutation and combination algorithms on your dictionary. It can also include different brute force attacks and combinations of dictionary and brute force attacks. These settings are done by creating an attack profile. By selecting profiles from the edit menu, you open the profile manager, presented in Fig. 10.4. A profile is basically a set of algorithms, called rules, which are applied to one or more dictionaries. As you can see in Fig. 8.​2, there are some precreated profiles available. However, to get good and efficient attacks, you should create your own profiles. You can create a new profile from nothing (New) or create a new profile by modifying one of the existing (New from selected). Settings for your new profiles are configured in the profile configuration tool shown in Fig. 10.5. All dictionaries that you ever imported into PRTK are listed to the left. There are also some default dictionaries in different languages. Select the dictionaries that should be used in your profile. Then hit the order tab to select the order in which the dictionaries should be applied. The available rules are listed to the right. Simply check the rules you want to use and notice that the order they appear in is the order that they will run in. I want to mention the highlighted rule. This is the rule that tests every entry in every dictionary. There are other rules that test the word in the dictionary as uppercase or lowercase only. Also notice that the rules are marked BAS or ADV. BAS is for basic, and those rules are less time-consuming than ADV rules. The first number in the BAS and ADV marking also indicates the complex of a rule. As such, ADV-2-1 is more complex than ADV-1-2 and thus, more time-consuming. When your profile is completed select OK to save it.

Fig. 10.4Profile manager



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.