Get personalized study reminders at intervals optimized for better retention. Track your progress on this set by creating a folder Or add to an existing folder open source tools, best value for as many features as possible Range from single-purpose components to complete computer systems and servers Types: 1.) Acquisition Making a copy of the orignal drive Subfunctions of Acquisition -physical data copy Physical data copyexact duplicate of drive Logical data copysome parts deleted, partition file (means some parts are missing) Raw Data Formatyou can view everything, no restrictions, can view with any hexadecimal editor Vendor-specific properietaryHas restrictions, creating smaller segmented files is typically a feature in propiertary Remote acquistion -Remote acquistion of files is common in larger organizations Validationconfirming a tool is functioning as intended Verficationproves that 2 dats of data are identical by calculating hash values Filteringrelated process to the verfication process which involved sorting and searching through investigation files to seperate good and suspicious data Subfunctions of Validation and Verfication -Hashing Extraction -Recovery task in a digital investigation Subfunctions of Extraction -Data viewing keyword searchspeeds up analysis Encrypt files and systems are a problem. True or falseTrue Password recovery -many password recovery tools have a feature for generating potential password lists Reconstruction -Re-create a suspect drive to show what happened during a crime scence or incident Methods of Reconstruction -disk-to-image Disk-to-image simpliest and most commone method used Reportingto preform forensic disks analysis and examination you need to create a report Subfunctions of Reporting -book marking or tagging Other consideration for tools -flexability Command-line forensic lines
-the first tools that analyzed and extracted data from a floppy disk and hard-disks were MS-Dos tools for IBM PC file systems Linux Forensic Tools - Linux and replaced Unix SMART -designed to be installed on numerous Linux versions Helix 3 -one of easiest suites to begin with Kali Linux -aka Backtrack Autopsy and Sleuthkit -Sleuthkit is a forensic tool GUI forensic tools
-can simplify digital forensic investigations Digital Forensic Hardware Tools -technology changes rapidly write-blocker -prevents data writes to a hard disk software-enabled blocker typically run in shell mode (windows CLI) Hardware optionsIdeal for GUI tools, act as bridge between suspect drive and work station Using Validation Protocols -always verify your results by performing the same tasks
with other simial forensic tools Computer forensics Examination Protocol -Preform the investigation with a GUI tool Digital forensics tool upgrade protocol test Computer forensics tool testsing (CFTT) -manages research on comp forensic tools Please allow access to your computer’s microphone to use Voice Recording. We can’t access your microphone!Click the icon above to update your browser permissions above and try againExample: Reload the page to try again!Reload Press Cmd-0 to reset your zoomPress Ctrl-0 to reset your zoomIt looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.Please upgrade Flash or install Chrometo use Voice Recording.For more help, see our troubleshooting page. Your microphone is mutedFor help fixing this issue, see this FAQ. |