Difference between revisions of "Tools"

From ForensicsWiki
Jump to: navigation, search
m
m (Windows-based Tools)
 
(290 intermediate revisions by 92 users not shown)
Line 1: Line 1:
 
This is an '''overview of available tools''' for forensic [[investigator]]s. Please click on the name of any tool for more details.
 
This is an '''overview of available tools''' for forensic [[investigator]]s. Please click on the name of any tool for more details.
  
= Disk Imaging Tools =
+
'''Note: This page has gotten too big and is being broken up. See:'''
  
== Hardware imagers ==
+
* [[:Category:Disk Imaging]]
 +
* [[Tools:Data Recovery]] (including file [[carving]])
 +
* [[Tools:File Analysis]]
 +
* [[Tools:Document Metadata Extraction]]
 +
* [[Tools:Memory Imaging]]
 +
* [[Tools:Memory Analysis]]
 +
* [[Tools:Network Forensics]]
 +
* [[Tools:Logfile Analysis]]
 +
* [[:Category:Anti-forensics tools]]
 +
* [[:Category:Secure deletion]]
  
=== Imaging Memory ===
+
= Disk Analysis Tools =
 +
== Hard Drive Firmware and Diagnostics Tools ==
 +
; [[PC-3000]] from [[ACE Lab]]
 +
: http://www.acelaboratory.com/catalog/
  
At [[CanSec West 05]], [[Michael Becher]], [[Maximillian Dornseif]], and [[Christian N. Klein]] discussed an [[exploit]] which uses [[DMA]] to read arbitrary memory locations of a [[firewire]]-enabled system. The [http://md.hudora.de/presentations/firewire/2005-firewire-cansecwest.pdf paper] lists more details. The exploit is run on an [http://ipodlinux.org/Main_Page iPod running Linux]. This can be used to grab screen contents.  
+
== Linux-based Tools ==
 +
; [[LINReS]] by [[NII Consulting Pvt. Ltd.]]
 +
: http://www.niiconsulting.com/innovation/linres.html
  
In theory, this could be used with the ... to send through an exploit code that would cause the system to dump the contents of its hard drive back to the [[iPod]].
+
; [[SMART]] by [[ASR Data]]
 +
: http://www.asrdata.com
  
== Unix-based imagers==
+
; [[Second Look: Linux Memory Forensics]] by [[Pikewerks Corporation]]
 +
: http://secondlookforensics.com/
  
; [[dd]]
+
== Macintosh-based Tools ==
: A program that converts and copies files, is one of the oldest [[Unix]] programs. I can copy data from any Unix "file" (including a [[raw partition]]) to any other Unix "file" (including a disk file or a raw partition). This is one of the oldest of the imaging tools, and produces [[raw image files]]. Extended into [[dcfldd]].
+
  
; [[dcfldd]]
+
; [[Macintosh Forensic Software]] by [[BlackBag Technologies, Inc.]]
: A version of [[dd]] created by the [[Digital Computer Forensics Laboratory]]. [[dcfldd]] is an enhanced version of [[GNU]] dd with features useful for forensics and security, such as calculating [[MD5]] or [[SHA-1]] [[hash]]es on the fly and faster disk wiping.
+
: http://www.blackbagtech.com/software_mfs.html
  
; [[dd_rescue]]
+
; [[MacForensicsLab]] by [[Subrosasoft]]
: http://www.garloff.de/kurt/linux/ddrescue/
+
: [http://www.subrosasoft.com/OSXSoftware/index.php?main_page=product_info&cPath=39&products_id=114 MacForensicLab-Subrosasoft]
: A tool similar to [[dd]], but unlike dd it will continue reading the next sector, if it stumbles over bad sectors it cannot read.
+
  
; GNU [[ddrescue]]
+
; [[Mac Marshal]] by [[ATC-NY]]
: http://www.gnu.org/software/ddrescue/ddrescue.html
+
: http://www.macmarshal.com/
  
; iLook [[IXimager]]
+
; [[Recon for MAC OS X]] by [[Sumuri, LLC]]
: The primary imaging tool for [[iLook]]. It is [[Linux]] based and produces compressed authenticatable [[image file]]s that may only be read in the iLook analysis tool.
+
: https://www.sumuri.com/products/recon/
  
; [[sdd]]
+
== Windows-based Tools ==
: Another [[dd]]-like tool. It is supposed to be faster in certain situations.
+
  
; [[aimage]]
+
; Arsenal Recon Weapons by [[Arsenal Recon]]
: Part of the [[AFF]] system, [[aimage]] can create either a raw file or an AFF file. It can optionally compress and calculate [[MD5]] or [[SHA-1]] hash residues while the data is being copied.
+
; https://ArsenalRecon.com/
 +
: Arsenal Recon offers unique and powerful tools to mount Windows disk images, reconstruct Windows Registries, and process Windows hibernation files.
  
; [[Blackbag]]
+
; Belkasoft Acquisition Tool by [[Belkasoft]]
: Specializes in [[Mac]] analysis, now a branch of the [[BSD]] family tree.
+
; https://belkasoft.com/bat
 +
: BAT is a free utility to acquire a wide range of data sources: hard drives, running computers RAM memory, modern smartphones, and various types of clouds. The output can be analyzed with both Belkasoft and third-party tools.
  
== Windows-based imagers ==
+
; Belkasoft Evidence Center by [[Belkasoft]]
 +
; https://belkasoft.com/ec
 +
: BEC allows an investigator to perform all investigation steps: acquisition (aquire hard and removable drives, image smartphones and download cloud data), extraction of evidence (searches and carves more than 700 formats of various files and applications data), analysis (hex viewer, SQLite viewer, social graph building with communities detection etc) and reporting.
  
; [[X-Ways Forensics]]  
+
; [[Blackthorn GPS Forensics]]
: Has some limited imaging capabilities. The output is [[raw format]].
+
: http://www.blackthorngps.com
  
; [[X-Ways Replica]]
+
; [[BringBack]] by [[Tech Assist, Inc.]]
: Performs [[hard disk]] [[cloning]] and imaging. The output is [[raw format]].
+
: http://www.toolsthatwork.com/bringback.htm
  
; [[Ghost]]
+
; [[CD/DVD Inspector]] by [[InfinaDyne]]
: FTK can read forensic, uncompressed [[Ghost image]]s.
+
; http://www.infinadyne.com/cddvd_inspector.html
 +
: This is the only forensic-qualified tool for examinination of optical media.  It has been around since 1999 and is in use by law enforcement, government and data recovery companies worldwide.
  
; [[FTK Imager by Access Data]]
+
; [[EMail Detective - Forensic Software Tool]] by [[Hot Pepper Technology, Inc]]
: Can image and convert many image formats. Including [[E0*]] and [[DD]]. Also a free tool.
+
; http://www.hotpepperinc.com/emd
  
; [[EnCase]]
+
; [[EnCase]] by [[Guidance Software]]
: Can image with out dongle plugged in. Only images to E0* file.
+
: http://www.guidancesoftware.com/
  
; [[DIBS]]
+
; Facebook Forensic Toolkit (FFT) by [[Afentis_forensics]]
: Can image and convert many file formats. Also builds mobile toolkit.
+
; http://www.facebookforensics.com
 +
: eDiscovery toolkit to identify and clone full profiles; including wall posts, private messages, uploaded photos/tags, group details, graphically illustrate friend links, and generate expert reports.  
  
; [[iLook]]
+
; [[Forensic Explorer]] ([[FEX]]) by [[GetData Forensics]]
: The [[IRS]]'s forensic tool.  Available free of charge to law enforcement agencies and certain government agencies.  iLook is a set of tools and utilities designed and built to forensic standards.  Primary imaging tool is a Linux-based custom boot that produces forensically authenticatable compressed output.  The imager is generated from a licensed copy of iLook. Version 8 is the currently distributed version of iLook. iLook is not available to the general public.
+
: http://www.forensicexplorer.com
  
; [[Paraben]]
+
; [[Forensic Toolkit]] ([[FTK]]) by [[AccessData]]
: A complete set of tools for [[Windows]] (and [[handheld]]) products.
+
: http://www.accessdata.com/products/ftk/
  
; [[ProDiscovery]]
+
; [[HBGary Responder Professional]] - Windows Physical Memory Forensic Platform
: Images and searches [[FAT12]], [[FAT16]], [[FAT32]] and all [[NTFS]] files.
+
:http://www.hbgary.com
  
; [[AccessData]]
+
; [[ILook]] by [[Xtremeforensics]]
: Their ultimate tool lets you "READ, ACQUIRE, DECRYPT, ANALYZE and REPORT (R.A.D.A.R.)."
+
: http://www.xtremeforensics.biz/
  
; [[ASR]]
+
; [[Internet Evidence Finder]] ([[IEF]]) by [[Magnet Forensics]]
: A tool for imaging and analyzing disks.
+
: http://www.magnetforensics.com/
  
; [[Wetstone]]  
+
; [[ISEEK]] by [[Xtremeforensics]]
: Gargoyle investigator scans for illicit data and [[steganographic image]]s.
+
: http://www.xtremeforensics.biz/
  
= Data Recovery Tools =
+
; [[Mercury Indexer]] by [[MicroForensics, Inc.]]
 +
: http://www.MicroForensics.com/
  
; [[Salvation Data]]
+
; [[Nuix Desktop]] by [[Nuix Pty Ltd]]
: http://www.salvationdata.com
+
: http://www.nuix.com
: Claims to have a program that can read the "[[bad blocks]]" of [[Maxtor]] drives with proprietary commands.
+
  
; [[RAID Reconstructor]]
+
; [[OnLineDFS]] by [[Cyber Security Technologies]]
: Runtime Software's [http://www.runtime.org/raid.htm RAID Reconstructor] will reconstruct [[RAID Level 0]] (Striping) and [[RAID Level 5]] drives. People who have used it, love it.
+
: http://www.cyberstc.com/
  
; [[ByteBack Data Recovery Investigative Suite v4.0]]
+
; [[OSForensics]] by [[PassMark Software Pty Ltd]]
: http://www.toolsthatwork.com
+
: http://www.osforensics.com/
: Now with UDMA, ATA & SATA support, memory management and greater ease and control of Partition and MBR manipulations, ByteBack continues to uphold it's viability as the computer forensics and recovery application of professionals.
+
  
; [[BringBack]]
+
; [[P2 Power Pack]] by [[Paraben]]
: http://www.toolsthatwork.com/
+
: https://www.paraben-forensics.com/catalog/product_info.php?cPath=25&products_id=187
: BringBack(tm) offers easy to use, inexpensive, and highly successful data recovery for Windows(tm) & Linux (ext2) operating systems and digital images stored on memory cards, etc.
+
  
= Disk Analysis Tools =
+
; [[Prodiscover]] by [[Techpathways]]
 +
: http://www.techpathways.com/ProDiscoverWindows.htm
  
== Linux-based Tools ==
+
; [[Proof Finder]] by [[Nuix Pty Ltd]]
 +
: http://www.prooffinder.com/
  
; [[SMART]], by [[ASR Data]]
+
; [[Safeback]] by [[NTI]] and [[Armor Forensics]]
: http://www.asrdata.com
+
: http://www.forensics-intl.com/safeback.html
  
== Windows-based Tools ==
+
; [[X-Ways Forensics]] by [[X-Ways AG]]
 +
: http://www.x-ways.net/forensics/index-m.html
  
; [[EnCase]], by [[Guidance Software]]
+
; [[DateDecoder]] by [[Live-Forensics]]
: http://www.guidancesoftware.com/
+
: http://www.live-forensics.com/dl/DateDecoder.zip
 +
: A command line tool that decodes most encoded time/date stamps found on a windows system, and outputs the time/date in a human readable format.
  
; [[Forensic Toolkit]], by [[AccessData]]
+
; [[RecycleReader]] by [[Live-Forensics]]
: http://www.accessdata.com/products/ftk/
+
: http://www.live-forensics.com/dl/RecycleReader.zip
 +
: A command line tool that outputs the contents of the recycle bin on XP, Vista and 7.
  
; [[ILook Investigator]], by [[Elliot Spencer]] and [[U.S. Dept of Treasury, Internal Revenue Service - Criminal Investigation]] (IRS)
+
; [[Dstrings]] by [[Live-Forensics]]
: http://www.ilook-forensics.org/
+
: http://www.live-forensics.com/dl/Dstrings.zip
 +
: A command line tool that searches for strings in a given file.  It has the ability to compare the output of those strings against a dictionary to either exclude the dictionary terms in the output or only output files that match the dictionary.  It also has the ability to search for IP Addresses and URLs/Email Addresses.
  
; [[Safeback]] by NTI and Armor Forensics
+
; [[Unique]] by [[Live-Forensics]]
: http://www.forensics-intl.com/safeback.html
+
: http://www.live-forensics.com/dl/Unique.zip
 +
: A command line tool similar to the Unix uniq. Allows for unique string counts, as well as various sorting options.
  
; [[BringBack]] by Tech Assist, Inc.
+
; [[HashUtil]] by [[Live-Forensics]]
: http://www.toolsthatwork.com/bringback.htm
+
: http://www.live-forensics.com/dl/HashUtil.zip
 +
: HashUtil.exe will calculate MD5, SHA1, SHA256 and SHA512 hashes.  It has an option that will attempt to match the hash against the NIST/ISC MD5 hash databases.
 +
 
 +
; [http://www.windowsscope.com WindowsSCOPE Cyber Forensics]
 +
: Comprehensive Windows Memory Forensics and Cyber Analysis, Incident Response, and Education support.
 +
: Software and hardware based acquisition with [https://www.windowsscope.com/captureguard-physical-memory-acquisition-hardware-pcie-add-on/ CaptureGUARD PCIe] and [https://www.windowsscope.com/captureguard-physical-memory-acquisition-hardware-expresscard/ ExpressCard]
 +
: Hardware based acquisition of memory on a locked computer via [https://www.windowsscope.com/captureguard-gateway-access-to-locked-computers/ CaptureGUARD Gateway]
 +
 
 +
; [[MailXaminer]] by [[SysTools]]
 +
: http://www.mailxaminer.com/
 +
: Forensic & eDiscovery Tool to find digital email evidences from multiple email platform through its powerful Search mechanism.
 +
 
 +
; Twitter Forensic Toolkit (TFT) by [[Afentis_forensics]]
 +
; http://www.twitterforensics.com
 +
: eDiscovery toolkit to identify relevant Tweets, clone full profiles, download all tweets/media, data mine across comments, and generate expert reports.
 +
 
 +
; YouTube Forensic Toolkit (YFT) by [[Afentis_forensics]]
 +
; http://www.youtubeforensics.com
 +
: eDiscovery toolkit to identify relevant online media, download/convert videos, data mine across comments, and generate expert reports.
  
 
== Open Source Tools ==
 
== Open Source Tools ==
Line 121: Line 163:
 
; [[AFFLIB]]
 
; [[AFFLIB]]
 
: A library for working with [[disk image]]s. Currently AFFLIB supports raw, [[AFF]], [[AFD]], and [[EnCase]] file formats. Work to support segmented raw, [[iLook]], and other formats is ongoing.
 
: A library for working with [[disk image]]s. Currently AFFLIB supports raw, [[AFF]], [[AFD]], and [[EnCase]] file formats. Work to support segmented raw, [[iLook]], and other formats is ongoing.
 +
 +
; [[Autopsy]]
 +
: http://www.sleuthkit.org/autopsy/desc.php
 +
 +
; [[Bulk Extractor]]
 +
: https://github.com/simsong/bulk_extractor/wiki
 +
: Bulk Extractor provides digital media triage by extracting Features from digital media.
 +
 +
; [[Bulk Extractor Viewer]]
 +
: https://github.com/simsong/bulk_extractor/wiki/BEViewer
 +
: Bulk Extractor Viewer is a browser UI for viewing Feature data extracted using [[Bulk Extractor]].
 +
 +
; [[Digital Forensics Framework]] (DFF)
 +
: DFF is cross-platform and open-source, user and developers oriented. It provide many features and is very modular. Our goal is to provide a powerful framework to the forensic community, so people can use only one tool during the analysis. http://www.digital-forensic.org
  
 
; [[foremost]]
 
; [[foremost]]
 
: http://foremost.sf.net/
 
: http://foremost.sf.net/
 +
: [[Linux]] based file carving program
 +
 +
; [[FTimes]]
 +
: http://ftimes.sourceforge.net/FTimes/index.shtml
 +
: FTimes is a system baselining and evidence collection tool.
  
 
; [[gfzip]]
 
; [[gfzip]]
 
: http://www.nongnu.org/gfzip/
 
: http://www.nongnu.org/gfzip/
 +
 +
; [[gpart]]
 +
: http://www.stud.uni-hannover.de/user/76201/gpart/
 +
: Tries to ''guess the primary partition table of a PC-type hard disk in case the primary partition table in sector 0 is damaged, incorrect or deleted''.
 +
 +
; [[Hachoir]]
 +
: A generic framework for binary file manipulation, it supports [[FAT12]], [[FAT16]], [[FAT32]], [[ext2|ext2/ext3]], Linux swap, MSDOS partition header, etc. Recognize file type. Able to find subfiles (hachoir-subfile).
 +
 +
; [[hashdb]]
 +
: http://github.com/simsong/hashdb/wiki
 +
: A tool for finding previously identified blocks of data in media such as disk images.
  
 
; [[magicrescue]]
 
; [[magicrescue]]
 
: http://jbj.rapanden.dk/magicrescue/
 
: http://jbj.rapanden.dk/magicrescue/
 +
 +
; The [[Open Computer Forensics Architecture]]
 +
: http://ocfa.sourceforge.net/
  
 
; [[pyflag]]
 
; [[pyflag]]
: http://pyflag.sourceforge.net/
+
: http://code.google.com/p/pyflag/
 +
: Web-based, database-backed forensic and log analysis GUI written in Python.
  
 
; [[Scalpel]]
 
; [[Scalpel]]
 
: http://www.digitalforensicssolutions.com/Scalpel/
 
: http://www.digitalforensicssolutions.com/Scalpel/
 +
: [[Linux]] and [[Windows]] file carving program originally based on [[foremost]].
  
 
; [[scrounge-ntfs]]
 
; [[scrounge-ntfs]]
Line 143: Line 220:
 
: http://www.sleuthkit.org/
 
: http://www.sleuthkit.org/
  
; [[Autopsy]]
+
; [[The Coroner's Toolkit]] ([[TCT]])
: http://www.sleuthkit.org/autopsy/desc.php
+
: http://www.porcupine.org/forensics/tct.html
  
; [[Zeitline]]
+
== [[NDA]] and [[scoped distribution]] tools ==
: http://projects.cerias.purdue.edu/forensics/timeline.php
+
: http://sourceforge.net/projects/zeitline/
+
  
; [[gpart]]
+
= Enterprise Tools (Proactive Forensics)=
: http://www.stud.uni-hannover.de/user/76201/gpart/
+
: Tries to ''guess the primary partition table of a PC-type hard disk in case the primary partition table in sector 0 is damaged, incorrect or deleted''.
+
  
= Forensics Live CDs =
+
; [[LiveWire Investigator 2008]] by [[WetStone Technologies]]
 +
: http://www.wetstonetech.com/f/livewire2008.html
  
; [[Helix]]
+
; [[P2 Enterprise Edition]] by [[Paraben]]
: A LiveCD built on top of [[Knoppix]].
+
: http://www.paraben-forensics.com/enterprise_forensics.html
: Also contains a Cygwin environment for use on a running Windows system (w/o rebooting).
+
  
; [[FCCU Gnu/Linux Boot CD]]
+
= Forensics Live CDs =
: Also a LiveCD built on top of [[Knoppix]] with a lot of tools with forensic purpose.
+
; [[Kali Linux]]  
: It leaves the target devices unaltered (it does not use the swap partitions found on the devices) nor does it automount partitions.
+
: [http://www.kali.org/ http://www.kali.org/]
  
= Metadata Extraction Tools =
+
; [[KNOPPIX]]
 +
: [http://www.knopper.net/knoppix/index-en.html http://www.knopper.net/knoppix/index-en.html]
  
; [[jhead]]
+
; [[BackTrack Linux]]  
: http://www.sentex.net/~mwandel/jhead/
+
: [http://www.backtrack-linux.org/ http://www.backtrack-linux.org/]
: Displays or modifies [[Exif]] data in [[JPEG]] files.
+
  
; [[wvWare]]
+
; [[Paladin Forensic Suite - Live Boot Ubuntu]] ([[Sumuri, LLC]])
: http://wvware.sourceforge.net/
+
: https://www.sumuri.com/products/paladin/
: Extracts metadata from various [[Microsoft]] Word files ([[doc]]). Can also convert doc files to other formats such as HTML or plain text.
+
: Simplifies various forensics tasks in a forensically sound manner via the PALADIN Toolbox.
  
; [[word2x]]
+
See: [[:Category:Live CD|Forensics Live CDs]]
: http://word2x.sourceforge.net/
+
  
; [[catdoc]]
+
= Personal Digital Device Tools=
: http://www.45.free.net/~vitus/software/catdoc/
+
  
; [[antiword]]
+
== GPS Forensics ==
: http://www.winfield.demon.nl/
+
  
; [[laola]]
+
; [[Blackthorn GPS Forensics]]
: http://user.cs.tu-berlin.de/~schwartz/pmh/index.html
+
; [[.XRY]]
  
; [[xpdf]]
+
== PDA Forensics ==
: http://www.foolabs.com/xpdf/
+
; [[Cellebrite UFED]]
: [[pdfinfo]] (part of the [[xpdf]] package) displays some metadata of [[PDF]] files.
+
; [[.XRY]]
 +
; [[Paraben PDA Seizure]]
 +
; [[Paraben PDA Seizure Toolbox]]
 +
; [[PDD]]
  
; [[vinetto]]
+
== Cell Phone Forensics ==
: http://vinetto.sourceforge.net/
+
; [https://belkasoft.com/ec Belkasoft Evidence Center]
: Examines [[Thumbs.db]] files.
+
; [[BitPIM]]
 +
; [[Cellebrite UFED]]
 +
; [[DataPilot Secure View]]
 +
; [[.XRY]]
 +
: http://www.msab.com/index
 +
; [[Fernico ZRT]]
 +
; [[ForensicMobile]]
 +
; [[LogiCube CellDEK]]
 +
; [[MOBILedit!]]
 +
; [[Oxygen Forensic Suite 2010]]
 +
: http://www.oxygen-forensic.com
 +
; [[Paraben's Device Seizure]] and [[Paraben's Device Seizure Toolbox]]
 +
: http://www.paraben-forensics.com/handheld_forensics.html
 +
; [[Serial Port Monitoring]]
 +
; [[TULP2G]]
  
= File Analysis Tools =
+
== SIM Card Forensics ==
 +
; [[Cellebrite UFED]]
 +
; [[.XRY]]
 +
; [[ForensicSIM]]
 +
; [[Paraben's SIM Card Seizure]]
 +
: http://www.paraben-forensics.com/handheld_forensics.html
 +
; [[SIMCon]]
  
; [[strings]]
+
== Preservation Tools ==
: Strings will print the strings of printable characters in files. It allows choosing different charactersets (ASCII, UNICODE). It is a quick way to browse through files/partitions/... in order to look for words, filenames, keywords etc.
+
; [[Paraben StrongHold Bag]]
 +
; [[Paraben StrongHold Tent]]
  
; [[file]]
+
= Other Tools =
: The file command determines the file type of a given file, depending on its contents and not on e.g. its extension or filename. In order to do that, it uses a magic configuration file that identifies filetypes.
+
  
; [[ltrace]]
+
; Chat Sniper
: ...
+
: http://www.alexbarnett.com/chatsniper.htm
 +
:  A forensic software tool designed to simplify the process of on-scene evidence acquisition and analysis of logs and data left by the use of AOL, MSN (Live), or Yahoo instant messenger.
  
; [[strace]]
+
; Serial Port Analyzer
: ...
+
: http://www.eltima.com/how-to-analyze-serial-port-activity/
 +
: The tool to analyze serial port and  device activity.
  
= Network Forensics Tools =
+
; Computer Forensics Toolkit
 +
: http://computer-forensics.privacyresources.org
 +
: This is a collection of resources, most of which are informational, designed specifically to guide the beginner, often in a procedural sense.
  
; [[Snort]]
+
; Live View
: http://www.snort.org/
+
: http://liveview.sourceforge.net/
 +
: Live View is a graphical forensics tool that creates a [[VMware]] [[virtual machine]] out of a dd disk image or physical disk.
  
; [[Tcpdump]]
+
; Parallels VM
: http://www.tcpdump.org
+
: http://www.parallels.com/
 +
: http://en.wikipedia.org/wiki/Parallels_Workstation
  
; [[Sguil]]
+
; Serial and USB ports sharing
: http://sguil.sourceforge.net/
+
: http://www.flexihub.com/serial-over-ethernet.html
 +
: Share and access serial and USB ports over Ethernet
  
; [[netflow]]/[[flowtools]]
+
; Microsoft Virtual PC
: http://www.cisco.com/warp/public/732/Tech/nmp/netflow/index.shtml
+
: http://www.microsoft.com/windows/products/winfamily/virtualpc/default.mspx
: http://www.splintered.net/sw/flow-tools/
+
: http://en.wikipedia.org/wiki/Virtual_PC
  
= Anti-forensics Tools =
+
; [[VMware]] Player
 +
: http://www.vmware.com/products/player/
 +
: http://en.wikipedia.org/wiki/VMware#VMware_Workstation
 +
: A free player for [[VMware]] [[virtual machine]]s that will allow them to "play" on either [[Windows]] or [[Linux]]-based systems.
  
; [[Ontrack Data Eraser]]
+
; [[VMware]] Server
: ...
+
: http://www.vmware.com/products/server/
 +
: The free server product, for setting up/configuring/running [[VMware]] [[virtual machine]].Important difference being that it can run 'headless', i.e. everything in background.
  
; [[Timestomp]]
+
; Webtracer
: A tool that allows one to modify all four [[NTFS]] timestamp (MACE) values.
+
: http://www.forensictracer.com
: http://www.metasploit.com/projects/antiforensics/timestomp.exe
+
: Software for forensic analysis of internet resources (IP address, e-mail address, domain name, URL, e-mail headers, log files...)
  
; [[Slacker]]
+
; Recon for MAC OS X
: A tool to hide files within the [[slack space]] of the [[NTFS]] file system.
+
: https://www.sumuri.com/products/recon/
: http://www.metasploit.com/projects/antiforensics/slacker.exe
+
: RECON for Mac OS X is simply the fastest way to conduct Mac Forensics, automates what an experienced examiner would need weeks to accomplish in minutes, now includes PALADIN 6 which comes with a full featured Forensic Suite, bootable forensic imager, a software write-blocker and so much more.
  
== Securely deleting data ==
 
  
; [[CyberScrub Privacy Suite]]
+
== Hex Editors ==
: This program securely erases selected data, wipes free space, powerful scheduling capabilities.
+
: http://www.cyberscrub.com/products/privacysuite/index.php
+
  
; [[CyberScrub cyberCide]]
+
; [[biew]]
: This program securely erases all data from drives or partitions.
+
: http://biew.sourceforge.net/en/biew.html
: http://www.cyberscrub.com/products/cybercide/index.php
+
  
; [[shred]]
+
; [[bless]]
: Part of GNU coreutils.
+
: http://home.gna.org/bless/
  
; [[wipe]]
+
; [[Okteta]]
: http://abaababa.ouvaton.org/wipe/
+
: KDE's new cross-platform hex editor with features such as signature-matching
 +
: http://utils.kde.org/projects/okteta/
  
== See also ==
+
; [[hexdump]]
 +
: ...
  
* [[Anti-forensic techniques]]
+
; [[HexFiend]]
* [[Database Encryption]].
+
: A hex editor for Apple OS X
 +
: http://ridiculousfish.com/hexfiend/
  
= Other Tools =
+
; [[Hex Workshop]]
 +
: A hex editor from [[BreakPoint Software, Inc.]]
 +
: http://www.bpsoft.com
  
; [[VMware]] Player
+
; [[khexedit]]
: http://www.vmware.com/products/player/
+
: http://docs.kde.org/stable/en/kdeutils/khexedit/index.html
: A free player for [[VMware]] [[virtual machine]]s that will allow them to "play" on either [[Windows]] or [[Linux]]-based systems.
+
  
; [[VMware]] Server
+
; ReclaiMe Pro
: http://www.vmware.com/products/server/
+
: The built-in disk editor visualizes most known partition and filesystem objects: boot sectors, superblocks, partition headers in structured view. Low-level data editing for extra leverage.  
: The free server product, for setting up/configuring/running [[VMware]] [[virtual machine]].Important difference being that it can run 'headless', i.e. everything in background.
+
: http://www.ReclaiMe-Pro.com
  
== Hex Editors ==
+
; [[WinHex]]
 +
: Computer forensics software, data recovery software, hex editor, and disk editor from [[X-Ways]].
 +
: http://www.x-ways.net/winhex
 +
 
 +
; [[wxHexEditor]]
 +
: A Multi-OS supported, open sourced, hex and disk editor.
 +
: http://www.wxhexeditor.org
  
 
; [[xxd]]
 
; [[xxd]]
 
: ...
 
: ...
  
; [[biew]]
+
; [[HexReader]]
: http://biew.sourceforge.net/en/biew.html
+
: [[Live-Forensics]] software that reads windows files at specified offset and length and outputs results to the console.
 +
: http://www.live-forensics.com/dl/HexReader.zip
 +
 
 +
= Telephone Scanners/War Dialers =
  
; [[khexedit]]
+
;PhoneSweep
: http://docs.kde.org/stable/en/kdeutils/khexedit/index.html
+
:http://www.sandstorm.net/products/phonesweep/
 +
:PhoneSweep is a commercial grade multi-line wardialer used by many security auditors to run telephone line scans in their organizations. PhoneSweep Gold is the distributed-access add-on for PhoneSweep, for organizations that need to run scans remotely.
 +
 
 +
;TeleSweep
 +
:http://www.securelogix.com/modemscanner/
 +
:SecureLogix is currently offering no-cost downloads of our award-winning TeleSweep Secure® modem-vulnerability scanner. This free modem scanning software can be used to dial a batch of corporate phone numbers and report on the number of modems connected to these corporate lines. *** Registration is required for obtaining a license key *** Still free however.
 +
 
 +
;WarVox
 +
:https://github.com/rapid7/warvox
 +
:WarVOX is a free, open-source VOIP-based war dialing tool for exploring, classifying, and auditing phone systems.
 +
 
 +
;Additional Software Names and Links (Jackpot!)
 +
:http://www.wyae.de/software/paw/

Latest revision as of 02:04, 1 March 2018

This is an overview of available tools for forensic investigators. Please click on the name of any tool for more details.

Note: This page has gotten too big and is being broken up. See:

Disk Analysis Tools

Hard Drive Firmware and Diagnostics Tools

PC-3000 from ACE Lab
http://www.acelaboratory.com/catalog/

Linux-based Tools

LINReS by NII Consulting Pvt. Ltd.
http://www.niiconsulting.com/innovation/linres.html
SMART by ASR Data
http://www.asrdata.com
Second Look: Linux Memory Forensics by Pikewerks Corporation
http://secondlookforensics.com/

Macintosh-based Tools

Macintosh Forensic Software by BlackBag Technologies, Inc.
http://www.blackbagtech.com/software_mfs.html
MacForensicsLab by Subrosasoft
MacForensicLab-Subrosasoft
Mac Marshal by ATC-NY
http://www.macmarshal.com/
Recon for MAC OS X by Sumuri, LLC
https://www.sumuri.com/products/recon/

Windows-based Tools

Arsenal Recon Weapons by Arsenal Recon
https://ArsenalRecon.com/
Arsenal Recon offers unique and powerful tools to mount Windows disk images, reconstruct Windows Registries, and process Windows hibernation files.
Belkasoft Acquisition Tool by Belkasoft
https://belkasoft.com/bat
BAT is a free utility to acquire a wide range of data sources: hard drives, running computers RAM memory, modern smartphones, and various types of clouds. The output can be analyzed with both Belkasoft and third-party tools.
Belkasoft Evidence Center by Belkasoft
https://belkasoft.com/ec
BEC allows an investigator to perform all investigation steps: acquisition (aquire hard and removable drives, image smartphones and download cloud data), extraction of evidence (searches and carves more than 700 formats of various files and applications data), analysis (hex viewer, SQLite viewer, social graph building with communities detection etc) and reporting.
Blackthorn GPS Forensics
http://www.blackthorngps.com
BringBack by Tech Assist, Inc.
http://www.toolsthatwork.com/bringback.htm
CD/DVD Inspector by InfinaDyne
http://www.infinadyne.com/cddvd_inspector.html
This is the only forensic-qualified tool for examinination of optical media. It has been around since 1999 and is in use by law enforcement, government and data recovery companies worldwide.
EMail Detective - Forensic Software Tool by Hot Pepper Technology, Inc
http://www.hotpepperinc.com/emd
EnCase by Guidance Software
http://www.guidancesoftware.com/
Facebook Forensic Toolkit (FFT) by Afentis_forensics
http://www.facebookforensics.com
eDiscovery toolkit to identify and clone full profiles; including wall posts, private messages, uploaded photos/tags, group details, graphically illustrate friend links, and generate expert reports.
Forensic Explorer (FEX) by GetData Forensics
http://www.forensicexplorer.com
Forensic Toolkit (FTK) by AccessData
http://www.accessdata.com/products/ftk/
HBGary Responder Professional - Windows Physical Memory Forensic Platform
http://www.hbgary.com
ILook by Xtremeforensics
http://www.xtremeforensics.biz/
Internet Evidence Finder (IEF) by Magnet Forensics
http://www.magnetforensics.com/
ISEEK by Xtremeforensics
http://www.xtremeforensics.biz/
Mercury Indexer by MicroForensics, Inc.
http://www.MicroForensics.com/
Nuix Desktop by Nuix Pty Ltd
http://www.nuix.com
OnLineDFS by Cyber Security Technologies
http://www.cyberstc.com/
OSForensics by PassMark Software Pty Ltd
http://www.osforensics.com/
P2 Power Pack by Paraben
https://www.paraben-forensics.com/catalog/product_info.php?cPath=25&products_id=187
Prodiscover by Techpathways
http://www.techpathways.com/ProDiscoverWindows.htm
Proof Finder by Nuix Pty Ltd
http://www.prooffinder.com/
Safeback by NTI and Armor Forensics
http://www.forensics-intl.com/safeback.html
X-Ways Forensics by X-Ways AG
http://www.x-ways.net/forensics/index-m.html
DateDecoder by Live-Forensics
http://www.live-forensics.com/dl/DateDecoder.zip
A command line tool that decodes most encoded time/date stamps found on a windows system, and outputs the time/date in a human readable format.
RecycleReader by Live-Forensics
http://www.live-forensics.com/dl/RecycleReader.zip
A command line tool that outputs the contents of the recycle bin on XP, Vista and 7.
Dstrings by Live-Forensics
http://www.live-forensics.com/dl/Dstrings.zip
A command line tool that searches for strings in a given file. It has the ability to compare the output of those strings against a dictionary to either exclude the dictionary terms in the output or only output files that match the dictionary. It also has the ability to search for IP Addresses and URLs/Email Addresses.
Unique by Live-Forensics
http://www.live-forensics.com/dl/Unique.zip
A command line tool similar to the Unix uniq. Allows for unique string counts, as well as various sorting options.
HashUtil by Live-Forensics
http://www.live-forensics.com/dl/HashUtil.zip
HashUtil.exe will calculate MD5, SHA1, SHA256 and SHA512 hashes. It has an option that will attempt to match the hash against the NIST/ISC MD5 hash databases.
WindowsSCOPE Cyber Forensics
Comprehensive Windows Memory Forensics and Cyber Analysis, Incident Response, and Education support.
Software and hardware based acquisition with CaptureGUARD PCIe and ExpressCard
Hardware based acquisition of memory on a locked computer via CaptureGUARD Gateway
MailXaminer by SysTools
http://www.mailxaminer.com/
Forensic & eDiscovery Tool to find digital email evidences from multiple email platform through its powerful Search mechanism.
Twitter Forensic Toolkit (TFT) by Afentis_forensics
http://www.twitterforensics.com
eDiscovery toolkit to identify relevant Tweets, clone full profiles, download all tweets/media, data mine across comments, and generate expert reports.
YouTube Forensic Toolkit (YFT) by Afentis_forensics
http://www.youtubeforensics.com
eDiscovery toolkit to identify relevant online media, download/convert videos, data mine across comments, and generate expert reports.

Open Source Tools

AFFLIB
A library for working with disk images. Currently AFFLIB supports raw, AFF, AFD, and EnCase file formats. Work to support segmented raw, iLook, and other formats is ongoing.
Autopsy
http://www.sleuthkit.org/autopsy/desc.php
Bulk Extractor
https://github.com/simsong/bulk_extractor/wiki
Bulk Extractor provides digital media triage by extracting Features from digital media.
Bulk Extractor Viewer
https://github.com/simsong/bulk_extractor/wiki/BEViewer
Bulk Extractor Viewer is a browser UI for viewing Feature data extracted using Bulk Extractor.
Digital Forensics Framework (DFF)
DFF is cross-platform and open-source, user and developers oriented. It provide many features and is very modular. Our goal is to provide a powerful framework to the forensic community, so people can use only one tool during the analysis. http://www.digital-forensic.org
foremost
http://foremost.sf.net/
Linux based file carving program
FTimes
http://ftimes.sourceforge.net/FTimes/index.shtml
FTimes is a system baselining and evidence collection tool.
gfzip
http://www.nongnu.org/gfzip/
gpart
http://www.stud.uni-hannover.de/user/76201/gpart/
Tries to guess the primary partition table of a PC-type hard disk in case the primary partition table in sector 0 is damaged, incorrect or deleted.
Hachoir
A generic framework for binary file manipulation, it supports FAT12, FAT16, FAT32, ext2/ext3, Linux swap, MSDOS partition header, etc. Recognize file type. Able to find subfiles (hachoir-subfile).
hashdb
http://github.com/simsong/hashdb/wiki
A tool for finding previously identified blocks of data in media such as disk images.
magicrescue
http://jbj.rapanden.dk/magicrescue/
The Open Computer Forensics Architecture
http://ocfa.sourceforge.net/
pyflag
http://code.google.com/p/pyflag/
Web-based, database-backed forensic and log analysis GUI written in Python.
Scalpel
http://www.digitalforensicssolutions.com/Scalpel/
Linux and Windows file carving program originally based on foremost.
scrounge-ntfs
http://memberwebs.com/nielsen/software/scrounge/
Sleuthkit
http://www.sleuthkit.org/
The Coroner's Toolkit (TCT)
http://www.porcupine.org/forensics/tct.html

NDA and scoped distribution tools

Enterprise Tools (Proactive Forensics)

LiveWire Investigator 2008 by WetStone Technologies
http://www.wetstonetech.com/f/livewire2008.html
P2 Enterprise Edition by Paraben
http://www.paraben-forensics.com/enterprise_forensics.html

Forensics Live CDs

Kali Linux
http://www.kali.org/
KNOPPIX
http://www.knopper.net/knoppix/index-en.html
BackTrack Linux
http://www.backtrack-linux.org/
Paladin Forensic Suite - Live Boot Ubuntu (Sumuri, LLC)
https://www.sumuri.com/products/paladin/
Simplifies various forensics tasks in a forensically sound manner via the PALADIN Toolbox.

See: Forensics Live CDs

Personal Digital Device Tools

GPS Forensics

Blackthorn GPS Forensics
.XRY

PDA Forensics

Cellebrite UFED
.XRY
Paraben PDA Seizure
Paraben PDA Seizure Toolbox
PDD

Cell Phone Forensics

Belkasoft Evidence Center
BitPIM
Cellebrite UFED
DataPilot Secure View
.XRY
http://www.msab.com/index
Fernico ZRT
ForensicMobile
LogiCube CellDEK
MOBILedit!
Oxygen Forensic Suite 2010
http://www.oxygen-forensic.com
Paraben's Device Seizure and Paraben's Device Seizure Toolbox
http://www.paraben-forensics.com/handheld_forensics.html
Serial Port Monitoring
TULP2G

SIM Card Forensics

Cellebrite UFED
.XRY
ForensicSIM
Paraben's SIM Card Seizure
http://www.paraben-forensics.com/handheld_forensics.html
SIMCon

Preservation Tools

Paraben StrongHold Bag
Paraben StrongHold Tent

Other Tools

Chat Sniper
http://www.alexbarnett.com/chatsniper.htm
A forensic software tool designed to simplify the process of on-scene evidence acquisition and analysis of logs and data left by the use of AOL, MSN (Live), or Yahoo instant messenger.
Serial Port Analyzer
http://www.eltima.com/how-to-analyze-serial-port-activity/
The tool to analyze serial port and device activity.
Computer Forensics Toolkit
http://computer-forensics.privacyresources.org
This is a collection of resources, most of which are informational, designed specifically to guide the beginner, often in a procedural sense.
Live View
http://liveview.sourceforge.net/
Live View is a graphical forensics tool that creates a VMware virtual machine out of a dd disk image or physical disk.
Parallels VM
http://www.parallels.com/
http://en.wikipedia.org/wiki/Parallels_Workstation
Serial and USB ports sharing
http://www.flexihub.com/serial-over-ethernet.html
Share and access serial and USB ports over Ethernet
Microsoft Virtual PC
http://www.microsoft.com/windows/products/winfamily/virtualpc/default.mspx
http://en.wikipedia.org/wiki/Virtual_PC
VMware Player
http://www.vmware.com/products/player/
http://en.wikipedia.org/wiki/VMware#VMware_Workstation
A free player for VMware virtual machines that will allow them to "play" on either Windows or Linux-based systems.
VMware Server
http://www.vmware.com/products/server/
The free server product, for setting up/configuring/running VMware virtual machine.Important difference being that it can run 'headless', i.e. everything in background.
Webtracer
http://www.forensictracer.com
Software for forensic analysis of internet resources (IP address, e-mail address, domain name, URL, e-mail headers, log files...)
Recon for MAC OS X
https://www.sumuri.com/products/recon/
RECON for Mac OS X is simply the fastest way to conduct Mac Forensics, automates what an experienced examiner would need weeks to accomplish in minutes, now includes PALADIN 6 which comes with a full featured Forensic Suite, bootable forensic imager, a software write-blocker and so much more.


Hex Editors

biew
http://biew.sourceforge.net/en/biew.html
bless
http://home.gna.org/bless/
Okteta
KDE's new cross-platform hex editor with features such as signature-matching
http://utils.kde.org/projects/okteta/
hexdump
...
HexFiend
A hex editor for Apple OS X
http://ridiculousfish.com/hexfiend/
Hex Workshop
A hex editor from BreakPoint Software, Inc.
http://www.bpsoft.com
khexedit
http://docs.kde.org/stable/en/kdeutils/khexedit/index.html
ReclaiMe Pro
The built-in disk editor visualizes most known partition and filesystem objects: boot sectors, superblocks, partition headers in structured view. Low-level data editing for extra leverage.
http://www.ReclaiMe-Pro.com
WinHex
Computer forensics software, data recovery software, hex editor, and disk editor from X-Ways.
http://www.x-ways.net/winhex
wxHexEditor
A Multi-OS supported, open sourced, hex and disk editor.
http://www.wxhexeditor.org
xxd
...
HexReader
Live-Forensics software that reads windows files at specified offset and length and outputs results to the console.
http://www.live-forensics.com/dl/HexReader.zip

Telephone Scanners/War Dialers

PhoneSweep
http://www.sandstorm.net/products/phonesweep/
PhoneSweep is a commercial grade multi-line wardialer used by many security auditors to run telephone line scans in their organizations. PhoneSweep Gold is the distributed-access add-on for PhoneSweep, for organizations that need to run scans remotely.
TeleSweep
http://www.securelogix.com/modemscanner/
SecureLogix is currently offering no-cost downloads of our award-winning TeleSweep Secure® modem-vulnerability scanner. This free modem scanning software can be used to dial a batch of corporate phone numbers and report on the number of modems connected to these corporate lines. *** Registration is required for obtaining a license key *** Still free however.
WarVox
https://github.com/rapid7/warvox
WarVOX is a free, open-source VOIP-based war dialing tool for exploring, classifying, and auditing phone systems.
Additional Software Names and Links (Jackpot!)
http://www.wyae.de/software/paw/