Acquiring Windows Operating System Credentials Through Bitlocker: A Digital Forensic Approach

ABSTRACT of Acquiring Windows Operating System Credentials Through Bitlocker: A Digital Forensic Approach

BitLocker encrypts every piece of information kept on a computer’s hard drive or solid-state drive, rendering it inaccessible to anyone who doesn’t have the right password or decryption key. The main aim of the study was to acquire the Windows operating system credentials through the utilization of BitLocker encryption. The primary objective was to explore various methods and tools, specifically bitlocker2john and Hashcat, to extract BitLocker encryption keys during the digital forensic acquisition process. It was necessary studying the encryption algorithms utilized in BitLocker, the encryption settings, the group policy settings, and the different tools that can be used for the retrieval of the decryption credentials. Using imaging, hash extraction, and password attacks, the analysis successfully recovered BitLocker encryption keys by applying hash values, salt, and encryption algorithms. The study concluded that the findings have important implications for digital forensic investigations and data security.

Keywords: Encryption, Decryption, Recovery keys, encryption algorithm operating system, BitLocker.

“Thoughtfully researched and eloquently penned by Manasa K

LinkedIn profile: https://www.linkedin.com/in/manasa-k-gowda-359aaa183

A Digital Forensic Approach-1
Autopsy In Cyber Forensics
A Digital Forensic Approach-2
A Digital Forensic Approach-3
A Digital Forensic Approach-4
A Digital Forensic Approach-5
A Digital Forensic Approach-6
A Digital Forensic Approach-7
A Digital Forensic Approach-8
A Digital Forensic Approach-9
How To Become A Cyber Forensic Expert?
A Digital Forensic Approach-10
A Digital Forensic Approach-11
A Digital Forensic Approach-12

Read More: Cyber Forensics

A Digital Forensic Approach-13
A Digital Forensic Approach-14
A Digital Forensic Approach-15
A Digital Forensic Approach-16
A Digital Forensic Approach-17
A Digital Forensic Approach-18
A Digital Forensic Approach-19
A Digital Forensic Approach-20
A Digital Forensic Approach-21
A Digital Forensic Approach-22
A Digital Forensic Approach-23
A Digital Forensic Approach-24
A Digital Forensic Approach-25
A Digital Forensic Approach-26
A Digital Forensic Approach-27
A Digital Forensic Approach-28
A Digital Forensic Approach-29
A Digital Forensic Approach-30
A Digital Forensic Approach-31
A Digital Forensic Approach-32
A Digital Forensic Approach-33
A Digital Forensic Approach-34
A Digital Forensic Approach-35
A Digital Forensic Approach-36
A Digital Forensic Approach-37
A Digital Forensic Approach-38
A Digital Forensic Approach-39
A Digital Forensic Approach-40
A Digital Forensic Approach-41
A Digital Forensic Approach-42
A Digital Forensic Approach-43
A Digital Forensic Approach-44
A Digital Forensic Approach-45
A Digital Forensic Approach-46
A Digital Forensic Approach-47
A Digital Forensic Approach-48
A Digital Forensic Approach-49
A Digital Forensic Approach-50
A Digital Forensic Approach-51
A Digital Forensic Approach-52
A Digital Forensic Approach-53
A Digital Forensic Approach-54
A Digital Forensic Approach-55
A Digital Forensic Approach-56
A Digital Forensic Approach-57
A Digital Forensic Approach-58
A Digital Forensic Approach-59
A Digital Forensic Approach-60
A Digital Forensic Approach-61
A Digital Forensic Approach-62
A Digital Forensic Approach-63
A Digital Forensic Approach-64
A Digital Forensic Approach-65
A Digital Forensic Approach-66
A Digital Forensic Approach-67
A Digital Forensic Approach-68
A Digital Forensic Approach-69
A Digital Forensic Approach-70
A Digital Forensic Approach-72
A Digital Forensic Approach-73
A Digital Forensic Approach-74

Note: “Respectfully, refrain from duplicating this content as all rights belong to the esteemed author and the blog site.”

error: Content is protected !!

Discover more from Forensic's blog

Subscribe now to keep reading and get access to the full archive.

Continue reading