• Joakim KävrestadEmail author


When working as a forensic examiner, it is not uncommon to encounter encrypted files, entire partitions or even devices that have been encrypted. When that is the case, the encrypted data must be decrypted in order for the forensic expert to be able to examine it. The intent of this chapter is to provide the reader with a practical overview of the steps commonly involved in the process of cracking encrypted data. While know-how and experience may be the most important skills in successful cracking, everyone needs a good tool for assistance. As such, this chapter also presents and discusses the AccessData tool Password Recovery ToolKit and the open-source alternative Hashcat that can both be used for the purpose of password cracking. Thus, this chapter provides the reader with a practical implementation of the theoretical knowledge that was presented in Chap.  5.


Cracking Decryption PRTK Hashcat 

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of InformaticsUniversity of SkövdeSkövdeSweden

Personalised recommendations