List of digital forensics tools

Last updated

During the 1980s, most digital forensic investigations consisted of "live analysis", examining digital media directly using non-specialist tools. In the 1990s, several freeware and other proprietary tools (both hardware and software) were created to allow investigations to take place without modifying media. This first set of tools mainly focused on computer forensics, although in recent years similar tools have evolved for the field of mobile device forensics. [1] This list includes notable examples of digital forensic tools.

Contents

Forensics-focused operating systems

Debian-based

Ubuntu-based

Gentoo-based

Computer forensics

Name Platform LicenseVersionDescription
Autopsy Windows, macOS , Linux Apache 2.04.21.0A digital forensics platform and GUI to The Sleuth Kit
Belkasoft Evidence Center X Windowsproprietary2.6Multi-purpose tool for computer, mobile, memory and cloud forensics
Bulk_Extractor Windows, MacOS and LinuxMIT2.1.1Extracts email addresses, URLs, and a variety of binary objects from unstructured data using recursive re-analysis.
COFEE Windowsproprietaryn/aA suite of tools for Windows developed by Microsoft
Digital Forensics Framework Unix-like/Windows GPL 1.3Framework and user interfaces dedicated to digital forensics
Elcomsoft Premium Forensic Bundle Windows, macOSproprietary1435Set of tools for encrypted systems & data decryption and password recovery
EnCase Windowsproprietary21.1 CEDigital forensics suite created by Guidance Software
FTK Windowsproprietary8.0Multi-purpose tool, FTK is a court-cited digital investigations platform built for speed, stability and ease of use.
IsoBuster Windowsproprietary5.3Essential light weight tool to inspect any type data carrier, supporting a wide range of file systems, with advanced export functionality.
Netherlands Forensic Institute / Xiraf [4] / HANSKEN [5] n/aproprietaryn/aComputer-forensic online service.
Open Computer Forensics Architecture Linux LGPL/GPL 2.3.0Computer forensics framework for CF-Lab environment
PTK Forensics LAMP proprietary2.0GUI for The Sleuth Kit
The Coroner's Toolkit Unix-like IBM Public License 1.19A suite of programs for Unix analysis
The Sleuth Kit Unix-like/Windows IPL, CPL, GPL 4.12.0A library of tools for both Unix and Windows
Windows To Go n/aproprietaryn/aBootable operating system

Memory forensics

Memory forensics tools are used to acquire or analyze a computer's volatile memory (RAM). They are often used in incident response situations to preserve evidence in memory that would be lost when a system is shut down, and to quickly detect stealthy malware by directly examining the operating system and other running software in memory.

NameVendor or sponsor Platform License
Volatility Volatile SystemsWindows and Linuxfree (GPL)
WindowsSCOPE BlueRISCWindowsproprietary

Mobile device forensics

Mobile forensics tools tend to consist of both a hardware and software component. Mobile phones come with a diverse range of connectors, the hardware devices support a number of different cables and perform the same role as a write blocker in computer devices.

Name Platform LicenseVersionDescription
Cellebrite UFED WindowsproprietaryHardware/software package, specializes in mobile forensic extraction
MicroSystemation XRY/XACT [6] WindowsproprietaryHardware/software package, specializes in deleted data

Software forensics

Software forensics is the science of analyzing software source code or binary code to determine whether intellectual property infringement or theft occurred. It is the centerpiece of lawsuits, trials, and settlements when companies are in dispute over issues involving software patents, copyrights, and trade secrets. Software forensics tools can compare code to determine correlation, a measure that can be used to guide a software forensics expert.

Other

Name Platform LicenseVersionDescription
DECAF Windowsfreen/aTool which automatically executes a set of user defined actions on detecting Microsoft's COFEE tool
Evidence Eliminator Windowsproprietary6.03Anti-forensics software, claims to delete files securely
HashKeeper Windowsfreen/aDatabase application for storing file hash signatures

References

  1. Casey, Eoghan (2004). Digital Evidence and Computer Crime, Second Edition. Elsevier. ISBN   0-12-163104-4.
  2. "Kali Linux Has Been Released!". 12 March 2013. Archived from the original on 9 May 2013. Retrieved 18 March 2013.
  3. "Pentoo 2015 – Security-Focused Livecd based on Gentoo". Archived from the original on 1 July 2018. Retrieved 1 July 2018.
  4. Bhoedjang, R; et al. (February 2012). "Engineering an online computer forensic service". Digital Investigations. 9 (2): 96–108. doi:10.1016/j.diin.2012.10.001.
  5. Huijbregts, J (2015). "Nieuwe forensische zoekmachine van NFI is 48 keer zo snel als voorganger". Tweakers. Retrieved 11 September 2018. Named after the famous elephant Hansken, because of their tremendous memory
  6. Mislan, Richard (2010). "Creating laboratories for undergraduate courses in mobile phone forensics". Proceedings of the 2010 ACM conference on Information technology education. ACM. pp. 111–116. doi:10.1145/1867651.1867680. ISBN   9781450303439. S2CID   15030269 . Retrieved 29 November 2010. Among the most popular tools are products named MicroSystemation GSM .XRY and .XACT, Cellebrite UFED, Susteen Secure View2, Paraben Device Seizure, Radio Tactics Aceso, Oxygen Phone Manager, and Compelson MobilEdit Forensic

See also