During the 1980s, most digital forensic investigations consisted of 'live analysis', examining digital media directly using non-specialist tools. In the 1990s, several freeware and other proprietary tools (both hardware and software) were created to allow investigations to take place without modifying media. This first set of tools mainly focused on computer forensics, although in recent years similar tools have evolved for the field of mobile device forensics.[1] This list includes notable examples of digital forensic tools.
Cyber Forensics Software Reviews
Computer forensics software, an introduction Page: 2/2. Live response tools. There are a number of free utilities (i.e. Small, usually single-task oriented programs) available to the computer forensic investigator which are most commonly used during a 'live response' to an incident, a situation where an investigator has decided to examine a. Cyber Forensics Annual Social Media Open-Source Forensics Software Scholarship Computer forensics analysis is one of the most important developments in the legal field in recent decades. Computer forensics analysis is a vital tool in both criminal and civil cases and it has reshaped the ways in which cases are investigated and evidence is. In the area of cyber forensics, law enforcement has a significant challenge keeping up with technology advances. New technology—hardware and software—is released into the market at a very rapid pace and used in criminal activity almost immediately.
- 1Forensics-focused operating systems
Forensics-focused operating systems[edit]
Debian-based[edit]
- Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing, formerly known as BackTrack.[2]
- Parrot Security OS is a cloud-oriented GNU/Linux distribution based on Debian and designed to perform security and penetration tests, do forensic analysis, or act in anonymity. It uses the MATE Desktop Environment, Linux Kernel 4.6 or higher and it is available as a live lightweight installable ISO image for 32-bit, 64-bit and ARM processors with forensic options at boot, optimizations for programmers, and new custom pentesting tools.[citation needed]
Ubuntu-based[edit]
- CAINE Linux is an ubuntu-based live CD/DVD. CAINE stands for Computer Aided INvestigative Environment.
- DEFT Zero is another (L)ubuntu-based live cd, but focused on cloning machine. DEFT stands for Digital Evidence & Forensic Toolkit[3]
Gentoo-based[edit]
- Pentoo Penetration Testing Overlay and Livecd is a live CD and Live USB designed for penetration testing and security assessment. Based on Gentoo Linux, Pentoo is provided both as 32-bit and 64-bit installable live cd. Pentoo also is available as an overlay for an existing Gentoo installation. It features packet injection patched wifi drivers, GPGPU cracking software, and lots of tools for penetration testing and security assessment. The Pentoo kernel includes grsecurity and PAX hardening and extra patches – with binaries compiled from a hardened toolchain with the latest nightly versions of some tools available.[4]
Computer forensics[edit]
Name | Platform | License | Version | Description |
---|---|---|---|---|
Autopsy | Windows, macOS, Linux | GPL | 4.11 | A digital forensics platform and GUI to The Sleuth Kit |
AXIOM | Windows | proprietary | 3.1 | Full digital forensics suite created by Magnet Forensics. |
Belkasoft Evidence Center | Windows | proprietary | 9.5 | Digital forensics suite created by Belkasoft |
COFEE | Windows | proprietary | n/a | A suite of tools for Windows developed by Microsoft |
Digital Forensics Framework | Unix-like/Windows | GPL | 1.3 | Framework and user interfaces dedicated to Digital Forensics |
EPRB | Windows | proprietary | 1435 | Set of tools for encrypted systems & data decryption and password recovery |
EnCase | Windows | proprietary | 8.06.1 | Digital forensics suite created by Guidance Software |
Forensic Explorer | Windows | proprietary | 4.4.8.7926 | Digital forensics suite created by GetData |
FTK | Windows | proprietary | 6.0.1 | Multi-purpose tool, FTK is a court-cited digital investigations platform built for speed, stability and ease of use. |
Helix3 Pro | ? | proprietary | ? | Digital forensics suite created by e-fence |
ISEEK[5] | Windows | proprietary | 1 | Hybrid-forensics tool running only in memory - designed for large networked environments |
IsoBuster | Windows | proprietary | 4.1 | Essential light weight tool to inspect any type data carrier, supporting a wide range of file systems, with advanced export functionality. |
Netherlands Forensic Institute / Xiraf[6] / HANSKEN[7] | n/a | proprietary | n/a | Computer-forensic online service. |
Open Computer Forensics Architecture | Linux | LGPL/GPL | 2.3.0 | Computer forensics framework for CF-Lab environment |
OSForensics[8][9] | Windows | proprietary | 3.3 | Multi-purpose forensic tool |
PTK Forensics | LAMP | proprietary | 2.0 | GUI for The Sleuth Kit |
Rocket Cloud | Windows | proprietary | 2.0 | Digital forensics acquisition and case management platform created by Digital DNA Group |
SafeBack[10] | N/a | proprietary | 3.0 | Digital media (evidence) acquisition and backup |
SANS Investigative Forensics Toolkit - SIFT | Ubuntu | 2.1 | Multi-purpose forensic operating system | |
SPEKTOR Forensic Intelligence[11] | Unix-like | proprietary | 6.x | Easy to use, comprehensive forensic tool used worldwide by LE/Military/Agencies/Corporates - includes Rapid Imaging and fully automated analysis. |
The Coroner's Toolkit | Unix-like | IBM Public License | 1.19 | A suite of programs for Unix analysis |
The Sleuth Kit | Unix-like/Windows | IPL, CPL, GPL | 4.1.2 | A library of tools for both Unix and Windows |
UltimateForensics | Windows | proprietary | 1.1 | Forensic software for image/video search and analysis by means of matching visual content |
Windows To Go | n/a | proprietary | n/a | Bootable operating system |
X-Ways Forensics | Windows | proprietary | 19.6 | Integrated computer forensics environment created by X-Ways |
Image and video forensics[edit]
Name | Platform | License | Version | Description |
---|---|---|---|---|
Corepro | Windows | proprietary | 1.0.6 | Software tool for Computer Reversed Projection (e.g. Height examinations |
Impress | Windows | proprietary | 7.3.8 | Software toolbox for the forensic enhancement of images and video |
Mandet | Windows | proprietary | 1.0.8.2 | Software toolbox for the forensic authentication of images and video |
ForensicVideo-FA | Windows | proprietary | 2.0.0 | Software for forensic analysis of video files formats |
Memory forensics[edit]
Digital Forensic Software
Memory forensics tools are used to acquire or analyze a computer's volatile memory (RAM). They are often used in incident response situations to preserve evidence in memory that would be lost when a system is shut down, and to quickly detect stealthy malware by directly examining the operating system and other running software in memory.
Name | Vendor or sponsor | Platform | License |
---|---|---|---|
Belkasoft Evidence Center[citation needed] | Belkasoft | Windows | proprietary |
Belkasoft Live RAM Capturer[citation needed] | Belkasoft | Windows | free |
Volatililty | Volatile Systems | Windows and Linux | free (GPL) |
WindowsSCOPE | BlueRISC | Windows | proprietary |
Mobile device forensics[edit]
Mobile forensics tools tend to consist of both a hardware and software component. Mobile phones come with a diverse range of connectors, the hardware devices support a number of different cables and perform the same role as a write blocker in computer devices.
Name | Platform | License | Version | Description |
---|---|---|---|---|
Belkasoft Evidence Center | Windows | proprietary | Software product which supports mobile and computer forensics | |
MicroSystemation XRY/XACT[12] | Windows | proprietary | Hardware/Software package, specializes in deleted data | |
Oxygen Forensics | windows | proprietary | Digital forensics suite focused on mobile devices |
Software forensics[edit]
Software forensics is the science of analyzing software source code or binary code to determine whether intellectual property infringement or theft occurred. It is the centerpiece of lawsuits, trials, and settlements when companies are in dispute over issues involving software patents, copyrights, and trade secrets. Software forensics tools can compare code to determine correlation, a measure that can be used to guide a software forensics expert.
Other[edit]
Name | Platform | License | Version | Description |
---|---|---|---|---|
DECAF | Windows | free | n/a | Tool which automatically executes a set of user defined actions on detecting Microsoft's COFEE tool |
Evidence Eliminator | Windows | proprietary | 6.03 | Anti-forensics software, claims to delete files securely |
HashKeeper | Windows | free | n/a | Database application for storing file hash signatures |
MailXaminer | Windows | Perpetual | 4.9.0 | Specialized Email Forensics Tool |
References[edit]
- ^Casey, Eoghan (2004). Digital Evidence and Computer Crime, Second Edition. Elsevier. ISBN0-12-163104-4.
- ^'Kali Linux Has Been Released!'. 12 March 2013. Archived from the original on 9 May 2013. Retrieved 18 March 2013.
- ^DEFT Zero
- ^'Pentoo 2015 – Security-Focused Livecd based on Gentoo'. Archived from the original on 1 July 2018. Retrieved 1 July 2018.
- ^Adams, R., Mann, G., & Hobbs, V. (2017). ISEEK, a tool for high speed, concurrent, distributed forensic data acquisition. Paper presented in Valli, C. (Ed.).The Proceedings of 15th Australian Digital Forensics Conference 5–6 December 2017, Edith Cowan University, Perth, Australia DOI 10.4225/75/5a838d3b1d27f[1]
- ^Bhoedjang, R; et al. (February 2012). 'Engineering an online computer forensic service'. Digital Investigations. 9 (2): 96–108. doi:10.1016/j.diin.2012.10.001.
- ^Huijbregts, J (2015). 'Nieuwe forensische zoekmachine van NFI is 48 keer zo snel als voorganger'. Tweakers. Retrieved 11 September 2018.
Named after the famous elephant Hansken, because of their tremendous memory
- ^Nelson, Bill; Phillips, Amelia; Steuart, Christopher (2015). Guide to Computer Forensics and Investigations. Cengage Learning. pp. 363, 141, 439, 421, 223, 554, 260, 168, 225, 362. ISBN978-1-285-06003-3.
- ^'OSForensics - Digital investigation for a new era by PassMark Software®'. osforensics.com.
- ^Mohay, George M. (2003). Computer and intrusion forensics. Artechhouse. p. 395. ISBN1-58053-369-8.
- ^Dell Corporation (2012-07-13). 'SPEKTOR Mobile Digital Forensics Intelligence Solution'(PDF).
- ^Mislan, Richard (2010). 'Creating laboratories for undergraduate courses in mobile phone forensics'. Proceedings of the 2010 ACM conference on Information technology education. ACM: 111–116. Retrieved 29 November 2010.
Among the most popular tools are products named MicroSystemation GSM .XRY and .XACT, Cellebrite UFED, Susteen Secure View2, Paraben Device Seizure, Radio Tactics Aceso, Oxygen Phone Manager, and Compelson MobilEdit Forensic
See also[edit]
Retrieved from 'https://en.wikipedia.org/w/index.php?title=List_of_digital_forensics_tools&oldid=918866488'
Forensic Software – Get Your Cyber Crimes and Digital Investigations Solved Quickly
Related:
Investigating a case of cyber crime is not an easy thing to do. The more complicated the case, the more difficult and time-consuming it will be. If you work with the law enforcement, you might need to streamline every case of cyber crimes that you take, so that you can solve it more easily.
No more complicated steps in your digital investigations. With forensic software, you can get your case of cyber crimes solved as efficiently as possible. It helps to bring you through various stages in your investigations, with the highest court approval rate.
EnCase Forensic
EnCase Forensic has become the global standard in digital investigations, providing the highest power, efficiency, and results. It walks you through the various stages of your investigations in logical steps: triage, collect, process, search, analyze, and report.
NetAnalysis
NetAnalysis is a forensic software that walks you through the investigation, analysis, and presentation of forensic evidence in operating system and mobile device usage. It features web browser forensics, filtering and searching, cache export and page rebuilding, and reporting.
DFF (Digital Forensics Framework)
DFF is the software used in digital investigations, which provides digital forensic analysis, investigation and threat detection. It offers various features, including evidence preservation, multimedia analysis, fast data reduction and triage, memory analysis, and user activity analysis.
Magnet Axiom
Magnet Axiom provides a complete digital investigation platform that helps you simplify your analysis and explore your digital evidence more deeply. It leads you to a simple investigation process, which includes evidence acquiring, evidence analysis, and single stage evidence processing.
Helix3 Enterprise
Helix3 Enterprise provides a cyber security solution that helps you to investigate malicious activities within your network. It features quick implementation, review employee internet usage, capture screenshots and key logging, and e-discovery across the entire network.
BlackLight
BlackLight is a forensic software used to analyze your computer volumes and mobile devices. It offers various features, including actionable intel, memory analysis, file filter view, media analysis, communication analysis, and reporting.
X-Ways Forensics
X-Ways Forensics provides an integrated computer forensic software used for computer forensic examiners. There are various features available, including disk cloning and imaging, complete access to disk, automatic partition identification, and superimposition of sectors.
SANS Digital Forensics
SANS Digital Forensics is a forensic software designed to provide any organizations the digital forensics needed for various types of cyber crimes. Aside from providing digital forensic software, it also provides courses to let the organizations deal with cyber crimes in the right way.
Other Forensic Software for Different Platforms
This Forensic software is available on almost all platforms. However, since the software needs a high-end device to perform well, it is better to use the desktop version of the software, since it usually offers more functionalities.
NirSoft
My pc camera drivers download. NirSoft is a Windows digital forensic investigation software that offers the ability to extract important data from your drives, with support for external drives. It provides tools to investigate your IE history, IE cache, IE cookies, IE pass, search data, information from other browsers, and live contacts.
BlackBag
![Cyber forensics software Cyber forensics software](https://image.slidesharecdn.com/computerforensics-130511062535-phpapp02/95/computer-forensics-55-638.jpg?cb=1403851263)
BlackBag provides an advanced data retrieval technology that helps you to seek, reveal, and preserve the truth. It is available for Windows and Mac OS. It also provides training about handling cyber crimes, which helps users to use the software more proficiently.
MOBILedit Forensic
MOBILedit Forensic provides the most comprehensive digital investigation tool for Android devices. It offers various features, including support for almost all phones, extract important application data, bypass the passcode, and bypass the PIN code.
Autopsy
Autopsy is a digital forensic software for Linux, with graphical user interface. It allows you to analyze computers and smartphones to reveal traces of digital evidence for cyber crime cases. Plugins are available for this software, which can bring new features to the software.
Belkasoft Evidence Center – Best Forensic Software of 2016
Belkasoft Evidence Center provides an all-in-one forensic solution for digital investigations, which can be used to deal with online and offline crimes. It features all-in-one forensic tool, simple and powerful system, advance low level expertise, as well as clean and concise reports. This software has been used by various law enforcements worldwide.
What is Forensic Software?
Forensic software is a type of software that deals with digital forensic investigations for both online and offline crimes. This software is usually used by law enforcements and governments who want to investigate various crimes involving digital devices, such as computers and smartphones. The software works by examining the target device and provides comprehensive analysis that will reveal suspicious activities within the device. It provides streamlined investigation steps, with concise reports that can be submitted to the court with a high approval rate. Sometimes, this software can also be used to prevent cyber crimes within a network, by detecting suspicious activities as it happens.
How to Install Forensic Software?
Forensic software needs to be installed on a compatible device. Since the software usually demands high performance computers or devices, you need to make sure that your device meets the requirements of the software. Once you do that, you can download the installation file from the official website of the respective software, and run the installation process on your compatible device.
Investigating a cyber crime can take a lot of time, especially when it comes to complex instances of cyber attacks. Regular crimes that involve the use of digital devices can also be very difficult to solve, especially if the device cannot be accessed in any way. This is where forensic software becomes necessary. It helps you with the investigation of various crimes that involve digital devices, with a streamlined investigation process. You don’t need to make your investigation more complex when you use this software. Instead, the software helps you through the logical investigation steps that allow you to solve the case more quickly and easily. Not only that, the results of your investigation are presented in customized reports, allowing you to submit the reports to the court as an evidence, with a high level of court acceptance.