This material could have been included in Module 3, but I placed it in the Linux module to better balance the content across the course. During data recovery, we may encounter files that are password-protected. In such cases, we can employ methods to determine the password or utilize applications designed to recover or remove the password. It is crucial to attempt these methods, as no data should be left unexamined in a forensic investigation.
A password on the BIOS can prevent a system from booting up. Some methods can be employed to by-pass this security feature:
Manufactures backup password
Remove the battery on the mainboard and wait 20-30 minutes
Determine if the mainboard has jumpers/dipswitches that can be used to clear the BIOS
Several years ago, BIOS became less common due to UEFI.
Below is a list of various utilities that can assist in removing or recovering passwords, potentially allowing access to essential data during a forensic investigation. Only the tools are referenced here, as testing and practice require a password-protected file. If you wish to practice using any of these tools, I recommend creating your own password-protected file. K
Some of these tools run on Windows, and some run on Linux. If the file type is rare, you might have to research to find a method that works successfully. Also, you should test and retest until you are 100% certain the methodology used to remove or recover the password works successfully.