Jump to content

List of digital forensics tools: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
m Removed 'Windows to Go' as it isn't aimed at forensics. Added OSForensics and X-Ways back as they should have never been removed. Updated version numbers
Added 'Tracks Inspector' to forensics list
Line 40: Line 40:
|-
|-
| SafeBack<ref name="mohay" /> || N/a || proprietary || 3.0 || Digital media (evidence) acquisition and backup
| SafeBack<ref name="mohay" /> || N/a || proprietary || 3.0 || Digital media (evidence) acquisition and backup
|-
| [[Tracks Inspector]] || [[Unix-like]] || proprietary || 1.6.1 || Computer forensics for non-technincal investigators <ref>http://www.tracksinspector.com/</ref>
|-
|-
| [[Wireshark]] || cross-platform || freeware || 1.10.6 || Open-source packet capture/analyzer, backend library used is [win]pcap.
| [[Wireshark]] || cross-platform || freeware || 1.10.6 || Open-source packet capture/analyzer, backend library used is [win]pcap.

Revision as of 12:25, 15 April 2014

During the 1980s, most digital forensic investigations consisted of "live analysis", examining digital media directly using non-specialist tools. In the 1990s, several freeware and other proprietary tools (both hardware and software) were created to allow investigations to take place without modifying media. This first set of tools mainly focused on computer forensics, although in recent years similar tools have evolved for the field of mobile device forensics.[1]

Computer forensics

Name Platform License Version Description
SANS Investigative Forensics Toolkit - SIFT Ubuntu 2.1 Multi-purpose forensic operating system
CAINE Linux free/open source 5.0 Gnu/Linux computer forensics live distro.
Registry Recon Windows proprietary 2.0.0.0530 Forensics tool that rebuilds Windows registries from anywhere on a hard drive and parses them for deep analysis.
EnCase Windows proprietary 7.09 Multi-purpose forensic tool
EPRB Windows proprietary 1435 Set of tools for encrypted systems & data decryption and password recovery
Digital Forensics Framework Unix-like/Windows GPL 1.3 Framework and user interfaces dedicated to Digital Forensics
FTK Windows proprietary 5.3 Multi-purpose tool, commonly used to index acquired media. [2]
PTK Forensics LAMP proprietary 2.0 GUI for The Sleuth Kit
The Coroner's Toolkit Unix-like IBM Public License 1.19 A suite of programs for Unix analysis
COFEE Windows proprietary n/a A suite of tools for Windows developed by Microsoft, only available to law enforcement
The Sleuth Kit Unix-like/Windows IPL, CPL, GPL 4.1.2 A library of tools for both Unix and Windows
Categoriser 4 Pictures[3] Windows freeware 4.0.2 Image categorisation tool develop, available to law enforcement
Open Computer Forensics Architecture Linux LGPL/GPL 2.3.0 Computer forensics framework for CF-Lab environment
SafeBack[4] N/a proprietary 3.0 Digital media (evidence) acquisition and backup
Tracks Inspector Unix-like proprietary 1.6.1 Computer forensics for non-technincal investigators [5]
Wireshark cross-platform freeware 1.10.6 Open-source packet capture/analyzer, backend library used is [win]pcap.
Nuix / Proof Finder Windows proprietary 5.0.4 Forensic analysis & fraud prevention software. Full text search, extracts emails, credit card numbers, IP addresses, URLs. Skin tone analysis. Support for ingesting Windows, Mac OS, Linux and mobile device data.
Netherlands Forensic Institute / Xiraf[6] n/a proprietary n/a Computer-forensic online service. [7]
OSForensics Windows proprietary 2.2 General purpose forensic tool for E-mail, Files, Images & browsers.
X-Ways Forensics Windows proprietary 17.6 General purpose forensic tool based on WinHex hex editor.

Memory forensics

Memory forensics tools are used to acquire and/or analyze a computer's volatile memory (RAM). They are often used in incident response situations to preserve evidence in memory that would be lost when a system is shutdown, and to quickly detect stealthy malware by directly examining the operating system and other running software in memory.

Name Vendor/Sponsor Platform License
WindowsSCOPE BlueRISC Windows proprietary
Volatililty Volatile Systems Windows & Linux Free (GPL)

Mobile device forensics

Mobile forensics tools tend to consist of both a hardware and software component. Mobile phones come with a diverse range of connectors, the hardware devices support a number of different cables and perform the same role as a write blocker in computer devices.

Name Platform License Version Description
Cellebrite Mobile Forensics[8] Windows proprietary Universal Forensics Extraction Device - Hardware and Software
Secure View Mobile Forenscis Software[8] Windows proprietary Hardware/Software package
Radio Tactics Aceso[8] Windows proprietary "All-in-one" unit with a touch screen
Paraben Device Seizure[8] Windows proprietary Hardware/Software package
MicroSystemation XRY/XACT[8] Windows proprietary Hardware/Software package, specialises in deleted data
Oxygen Forensic Suite (former Oxygen Phone Manager[8]) Windows proprietary Smart forensics for smartphones
Elcomsoft iOS Forensic Toolkit (EIFT) Windows, Mac proprietary Acquires bit-precise images of Apple iOS devices in real time
Elcomsoft Phone Password Breaker (EPPB) Windows proprietary Enables forensic access to password-protected backups for smartphones and portable devices based on RIM BlackBerry and Apple iOS platforms,
MOBILedit! Forensic[8] Windows proprietary Hardware-Connection kit/Software package

Other

Name Platform License Version Description
HashKeeper Windows free n/a Database application for storing file hash signatures
Evidence Eliminator Windows proprietary 6.03 Anti-forensics software, claims to delete files securely
DECAF Windows free n/a Tool which automatically executes a set of user defined actions on detecting Microsoft's COFEE tool

References

  1. ^ Casey, Eoghan (2004). Digital Evidence and Computer Crime, Second Edition. Elsevier. ISBN 0-12-163104-4.
  2. ^ http://www.accessdata.com/support/product-downloads/ftk-download-page
  3. ^ Sanderson, P (December 2006). "Mass image classification". Digital Investigations. 3 (4): 190–195. doi:10.1016/j.diin.2006.10.010. {{cite journal}}: |access-date= requires |url= (help)
  4. ^ Mohay, George M. (2003). Computer and intrusion forensics. Artechhouse. p. 395. ISBN 1-58053-369-8.
  5. ^ http://www.tracksinspector.com/
  6. ^ Bhoedjang, R; et al. (February 2012). "Engineering an online computer forensic service". Digital Investigations. 9 (2): 96–108. doi:10.1016/j.diin.2012.10.001. {{cite journal}}: Explicit use of et al. in: |last= (help)
  7. ^ http://www.forensicinstitute.nl/products_and_services/forensic_products/xiraf/
  8. ^ a b c d e f g Mislan, Richard (2010). "Creating laboratories for undergraduate courses in mobile phone forensics". Proceedings of the 2010 ACM conference on Information technology education. ACM: 111–116. Retrieved 29 November 2010. Among the most popular tools are products named MicroSystemation GSM .XRY and .XACT, Cellebrite UFED, Susteen Secure View2, Paraben Device Seizure, Radio Tactics Aceso, Oxygen Phone Manager, and Compelson MobilEdit Forensic