List of digital forensics tools

From Wikipedia, the free encyclopedia

During the 1980s, most digital forensic investigations consisted of "live analysis", examining digital media directly using non-specialist tools. In the 1990s, several freeware and other proprietary tools (both hardware and software) were created to allow investigations to take place without modifying media. This first set of tools mainly focused on computer forensics, although in recent years similar tools have evolved for the field of mobile device forensics.[1] This list includes notable examples of digital forensic tools.

Forensics-focused operating systems

Debian-based

  • Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing, formerly known as BackTrack.[2]
  • Parrot Security OS is a cloud-oriented Linux distribution based on Debian and designed to perform security and penetration tests, do forensic analysis, or act in anonymity. It uses the MATE Desktop Environment, Linux Kernel 4.6 or higher and it is available as a live lightweight installable ISO image for 32-bit, 64-bit and ARM processors with forensic options at boot, optimizations for programmers, and new custom pentesting tools.[citation needed]

Ubuntu-based

  • CAINE Linux is an ubuntu-based live CD/DVD. CAINE stands for Computer Aided INvestigative Environment.
  • PALADIN Linux is an ubuntu-based live CD/DVD. PALADIN is a non-persistent Xubuntu-based OS that comes preinstalled with a Toolkit of different forensic tools and applications.

Gentoo-based

  • Pentoo
  • Penetration Testing Overlay and Livecd is a live CD and Live USB designed for penetration testing and security assessment. Based on Gentoo Linux, Pentoo is provided both as 32-bit and 64-bit installable live CD. Pentoo also is available as an overlay for an existing Gentoo installation. It features packet injection patched Wi-Fi drivers, GPGPU cracking software, and many tools for penetration testing and security assessment. The Pentoo kernel includes grsecurity and PAX hardening and extra patches – with binaries compiled from a hardened toolchain with the latest nightly versions of some tools available.[3]

Computer forensics

More information Name, Platform ...
Name Platform License Version Description
AutopsyWindows, macOS, LinuxApache 2.04.21.0A digital forensics platform and GUI to The Sleuth Kit
Belkasoft Evidence Center X Windows proprietary 2.7 Multi-purpose tool for computer, mobile, memory and cloud forensics
Bulk_ExtractorWindows, MacOS and LinuxMIT2.1.1Extracts email addresses, URLs, and a variety of binary objects from unstructured data using recursive re-analysis.
COFEEWindowsproprietaryn/aA suite of tools for Windows developed by Microsoft
Digital Forensics FrameworkUnix-like/WindowsGPL1.3Framework and user interfaces dedicated to digital forensics
Elcomsoft Premium Forensic BundleWindows, macOSproprietary1435Set of tools for encrypted systems & data decryption and password recovery
EnCaseWindowsproprietary21.1 CEDigital forensics suite created by Guidance Software
FTKWindowsproprietary8.0Multi-purpose tool, FTK is a court-cited digital investigations platform built for speed, stability and ease of use.
IsoBusterWindowsproprietary5.3Essential light weight tool to inspect any type data carrier, supporting a wide range of file systems, with advanced export functionality.
Netherlands Forensic Institute / Xiraf[4] / HANSKEN[5]n/aproprietaryn/aComputer-forensic online service.
Open Computer Forensics ArchitectureLinuxLGPL/GPL2.3.0Computer forensics framework for CF-Lab environment
PTK ForensicsLAMPproprietary2.0GUI for The Sleuth Kit
The Coroner's ToolkitUnix-likeIBM Public License1.19A suite of programs for Unix analysis
The Sleuth KitUnix-like/WindowsIPL, CPL, GPL4.12.0A library of tools for both Unix and Windows
Windows To Gon/aproprietaryn/aBootable operating system
Close

Memory forensics

Memory forensics tools are used to acquire or analyze a computer's volatile memory (RAM). They are often used in incident response situations to preserve evidence in memory that would be lost when a system is shut down, and to quickly detect stealthy malware by directly examining the operating system and other running software in memory.

More information Name, Vendor or sponsor ...
Name Vendor or sponsor Platform License
VolatilityVolatile SystemsWindows and Linuxfree (GPL)
WindowsSCOPEBlueRISCWindowsproprietary
Close

Mobile device forensics

Mobile forensics tools tend to consist of both a hardware and software component. Mobile phones come with a diverse range of connectors, the hardware devices support a number of different cables and perform the same role as a write blocker in computer devices.

More information Name, Platform ...
Name Platform License Version Description
Cellebrite UFEDWindowsproprietaryHardware/software package, specializes in mobile forensic extraction
MicroSystemation XRY/XACT[6]WindowsproprietaryHardware/software package, specializes in deleted data
Close

Software forensics

Software forensics is the science of analyzing software source code or binary code to determine whether intellectual property infringement or theft occurred. It is the centerpiece of lawsuits, trials, and settlements when companies are in dispute over issues involving software patents, copyrights, and trade secrets. Software forensics tools can compare code to determine correlation, a measure that can be used to guide a software forensics expert.

Other

More information Name, Platform ...
Name Platform License Version Description
DECAFWindowsfreen/aTool which automatically executes a set of user defined actions on detecting Microsoft's COFEE tool
Evidence EliminatorWindowsproprietary6.03Anti-forensics software, claims to delete files securely
HashKeeperWindowsfreen/aDatabase application for storing file hash signatures
Close

References

See also

Loading related searches...

Wikiwand - on

Seamless Wikipedia browsing. On steroids.