300 likes | 885 Views
ITIS 4250 Computer Forensics. Chapter 7 Current Computer Forensics Tools. Digital Intelligence UltraKit. www.digitalintelligence.com. Digital Intelligence F.R.E.D. (F orensic R ecovery of E vidence D evice). www.digitalintelligence.com. Digital Intelligence F.R.E.D.D.I.E
E N D
ITIS 4250Computer Forensics Chapter 7 Current Computer Forensics Tools
Digital Intelligence UltraKit www.digitalintelligence.com
Digital Intelligence F.R.E.D. (Forensic Recovery of Evidence Device) www.digitalintelligence.com
Digital Intelligence F.R.E.D.D.I.E Forensic Recovery of Evidence Device (Diminutive Interrogation Equipment)
Digital Intelligence F.R.E.D.D.I.E Forensic Recovery of Evidence Device (Diminutive Interrogation Equipment)
Tasks Performed by Computer Forensics Tools • Acquisition • Validation and discrimination • Extraction • Reconstruction • Reporting Guide to Computer Forensics and Investigations, 2e
Acquisition • Physical data copy • Hardware: Image MaSSter Solo 2 Guide to Computer Forensics and Investigations, 2e
Tasks Performed by Computer Forensics Tools • Acquisition • Validation and discrimination • Extraction • Reconstruction • Reporting Guide to Computer Forensics and Investigations, 2e
Extraction • Recovering data • Data viewing • Keyword searching • Decompressing • Carving • Decrypting • Bookmarking Guide to Computer Forensics and Investigations, 2e
Tasks Performed by Computer Forensics Tools • Acquisition • Validation and discrimination • Extraction • Reconstruction • Reporting Guide to Computer Forensics and Investigations, 2e
Tasks Performed by Computer Forensics Tools • Acquisition • Validation and discrimination • Extraction • Reconstruction • Reporting Guide to Computer Forensics and Investigations, 2e
UNIX/Linux Command-line Forensic Tools • Examples: • SMART • Helix • Autopsy • SleuthKit • Knoppix-STD • The Coroner’s Toolkit (TCT) Guide to Computer Forensics and Investigations, 2e
Using NIST Tools • www.nsrl.nist.gov • www.cftt.nist.gov Guide to Computer Forensics and Investigations, 2e
Validation Protocols • Verify results • Might be asked on the stand, “How did you verify your results?” • Need at least two tools • Well tested • Documented Guide to Computer Forensics and Investigations, 2e