Date of Graduation
Bachelor of Science
Computer Science and Computer Engineering
Panda, Brajendra N
Thompson, Craig W.
Committee Member/Third Reader
Thompson, Dale R.
For various reasons, circumstances might arise in which an investigator, enlisting the help of a system administrator, needs access to an instance of MySQL that is password protected by an individual system user. If this password is unknown and the user is uncooperative or unavailable, alternative means must be utilized to gain access to the data stored within the program. Two main approaches will be explored, each with its pros and cons. In one case, the password can be bypassed entirely, granting the investigator unfettered access to the program data. The second method allows a narrower look at only some of the data. Either method will give the investigator, at least to some extent, the opportunity to overcome the problem of a missing or uncooperative system user.
Lawrence, A. C. (2013). Forensic Investigation of MySQL Database Management System. Computer Science and Computer Engineering Undergraduate Honors Theses Retrieved from https://scholarworks.uark.edu/csceuht/8