Difference between revisions of "Tools"

From ForensicsWiki
Jump to: navigation, search
(Forensics Live CDs: Farmer Dude.)
m (Windows-based Tools)
 
(280 intermediate revisions by 89 users not shown)
Line 1: Line 1:
 
This is an '''overview of available tools''' for forensic [[investigator]]s. Please click on the name of any tool for more details.
 
This is an '''overview of available tools''' for forensic [[investigator]]s. Please click on the name of any tool for more details.
  
= Disk Imaging Tools =
+
'''Note: This page has gotten too big and is being broken up. See:'''
  
<div style="margin-top:0.5em; border:2px solid #ff0000; padding:0.5em 0.5em 0.5em 0.5em; background-color:#dddddd; align:center;">
+
* [[:Category:Disk Imaging]]
'''Note:''' We're trying to use the same [[tool template]] for all devices. Please use this if possible.
+
* [[Tools:Data Recovery]] (including file [[carving]])
</div>
+
* [[Tools:File Analysis]]
 +
* [[Tools:Document Metadata Extraction]]
 +
* [[Tools:Memory Imaging]]
 +
* [[Tools:Memory Analysis]]
 +
* [[Tools:Network Forensics]]
 +
* [[Tools:Logfile Analysis]]
 +
* [[:Category:Anti-forensics tools]]
 +
* [[:Category:Secure deletion]]
  
 +
= Disk Analysis Tools =
 +
== Hard Drive Firmware and Diagnostics Tools ==
 +
; [[PC-3000]] from [[ACE Lab]]
 +
: http://www.acelaboratory.com/catalog/
  
== Hardware imagers ==
+
== Linux-based Tools ==
 +
; [[LINReS]] by [[NII Consulting Pvt. Ltd.]]
 +
: http://www.niiconsulting.com/innovation/linres.html
  
=== Imaging Memory ===
+
; [[SMART]] by [[ASR Data]]
 +
: http://www.asrdata.com
  
At [[CanSec West 05]], [[Michael Becher]], [[Maximillian Dornseif]], and [[Christian N. Klein]] discussed an [[exploit]] which uses [[DMA]] to read arbitrary memory locations of a [[firewire]]-enabled system. The [http://md.hudora.de/presentations/firewire/2005-firewire-cansecwest.pdf paper] lists more details. The exploit is run on an [http://ipodlinux.org/Main_Page iPod running Linux]. This can be used to grab screen contents.
+
; [[Second Look: Linux Memory Forensics]] by [[Pikewerks Corporation]]
 +
: http://secondlookforensics.com/
  
In theory, this could be used with the ... to send through an exploit code that would cause the system to dump the contents of its hard drive back to the [[iPod]].
+
== Macintosh-based Tools ==
  
== Unix-based imagers==
+
; [[Macintosh Forensic Software]] by [[BlackBag Technologies, Inc.]]
 +
: http://www.blackbagtech.com/software_mfs.html
  
; [[aimage]]
+
; [[MacForensicsLab]] by [[Subrosasoft]]
: Part of the [[AFF]] system, [[aimage]] can create either a raw file or an AFF file. It can optionally compress and calculate [[MD5]] or [[SHA-1]] hash residues while the data is being copied.
+
: [http://www.subrosasoft.com/OSXSoftware/index.php?main_page=product_info&cPath=39&products_id=114 MacForensicLab-Subrosasoft]
  
; [[Blackbag]]
+
; [[Mac Marshal]] by [[ATC-NY]]
: Specializes in [[Mac]] analysis, now a branch of the [[BSD]] family tree.
+
: http://www.macmarshal.com/
  
; [[dcfldd]]
+
; [[Recon for MAC OS X]] by [[Sumuri, LLC]]
: A version of [[dd]] created by the [[Digital Computer Forensics Laboratory]]. [[dcfldd]] is an enhanced version of [[GNU]] dd with features useful for forensics and security, such as calculating [[MD5]] or [[SHA-1]] [[hash]]es on the fly and faster disk wiping.
+
: https://www.sumuri.com/products/recon/
  
; [[dd]]
+
== Windows-based Tools ==
: A program that converts and copies files, is one of the oldest [[Unix]] programs. I can copy data from any Unix "file" (including a [[raw partition]]) to any other Unix "file" (including a disk file or a raw partition). This is one of the oldest of the imaging tools, and produces [[raw image files]]. Extended into [[dcfldd]].
+
  
; GNU [[ddrescue]]
+
; Arsenal Recon Weapons by [[Arsenal Recon]]
: http://www.gnu.org/software/ddrescue/ddrescue.html
+
; https://ArsenalRecon.com/
 +
: Arsenal Recon offers unique and powerful tools to mount Windows disk images, reconstruct Windows Registries, and process Windows hibernation files.
  
; [[dd_rescue]]
+
; Belkasoft Acquisition Tool by [[Belkasoft]]
: http://www.garloff.de/kurt/linux/ddrescue/
+
; https://belkasoft.com/bat
: A tool similar to [[dd]], but unlike dd it will continue reading the next sector, if it stumbles over bad sectors it cannot read.
+
: BAT is a free utility to acquire a wide range of data sources: hard drives, running computers RAM memory, modern smartphones, and various types of clouds. The output can be analyzed with both Belkasoft and third-party tools.
  
; iLook [[IXimager]]
+
; Belkasoft Evidence Center by [[Belkasoft]]
: The primary imaging tool for [[iLook]]. It is [[Linux]] based and produces compressed authenticatable [[image file]]s that may only be read in the iLook analysis tool.
+
; https://belkasoft.com/ec
 +
: BEC allows an investigator to perform all investigation steps: acquisition (aquire hard and removable drives, image smartphones and download cloud data), extraction of evidence (searches and carves more than 700 formats of various files and applications data), analysis (hex viewer, SQLite viewer, social graph building with communities detection etc) and reporting.  
  
; [[sdd]]
+
; [[Blackthorn GPS Forensics]]
: Another [[dd]]-like tool. It is supposed to be faster in certain situations.
+
: http://www.blackthorngps.com
  
; [[Adepto]]
+
; [[BringBack]] by [[Tech Assist, Inc.]]
: http://www.e-fense.com/helix/
+
: http://www.toolsthatwork.com/bringback.htm
  
== Windows-based imagers ==
+
; [[CD/DVD Inspector]] by [[InfinaDyne]]
 +
; http://www.infinadyne.com/cddvd_inspector.html
 +
: This is the only forensic-qualified tool for examinination of optical media.  It has been around since 1999 and is in use by law enforcement, government and data recovery companies worldwide.
  
; [[AccessData]]
+
; [[EMail Detective - Forensic Software Tool]] by [[Hot Pepper Technology, Inc]]
: Their ultimate tool lets you "READ, ACQUIRE, DECRYPT, ANALYZE and REPORT (R.A.D.A.R.)."
+
; http://www.hotpepperinc.com/emd
  
; [[ASR]]
+
; [[EnCase]] by [[Guidance Software]]
: A tool for [[imaging]] and analyzing disks.
+
: http://www.guidancesoftware.com/
  
; [[DIBS]]
+
; Facebook Forensic Toolkit (FFT) by [[Afentis_forensics]]
: Can image and convert many file formats. Also builds mobile toolkit.
+
; http://www.facebookforensics.com
 +
: eDiscovery toolkit to identify and clone full profiles; including wall posts, private messages, uploaded photos/tags, group details, graphically illustrate friend links, and generate expert reports.  
  
; [[EnCase]]
+
; [[Forensic Explorer]] ([[FEX]]) by [[GetData Forensics]]
: Can image with out dongle plugged in. Only images to E0* file.
+
: http://www.forensicexplorer.com
  
; [[FTK Imager]] by [[AccessData]]
+
; [[Forensic Toolkit]] ([[FTK]]) by [[AccessData]]
: Can image and convert many image formats. Including [[E0*]] and [[dd]]. Also a free tool.
+
: http://www.accessdata.com/products/ftk/
  
; [[Ghost]]
+
; [[HBGary Responder Professional]] - Windows Physical Memory Forensic Platform
: FTK can read forensic, uncompressed [[Ghost image]]s.
+
:http://www.hbgary.com
  
; [[iLook]]
+
; [[ILook]] by [[Xtremeforensics]]
: The [[IRS]]'s set of forensic tools and utilities. iLook V8 can image in Windows.
+
: http://www.xtremeforensics.biz/
  
; [[Paraben]]
+
; [[Internet Evidence Finder]] ([[IEF]]) by [[Magnet Forensics]]
: A complete set of tools for [[Windows]] (and [[handheld]]) products.
+
: http://www.magnetforensics.com/
  
; [[ProDiscovery]]
+
; [[ISEEK]] by [[Xtremeforensics]]
: Images and searches [[FAT12]], [[FAT16]], [[FAT32]] and all [[NTFS]] files.
+
: http://www.xtremeforensics.biz/
  
; [[Wetstone]]  
+
; [[Mercury Indexer]] by [[MicroForensics, Inc.]]
: Gargoyle investigator scans for illicit data and [[steganographic image]]s.
+
: http://www.MicroForensics.com/
  
; [[X-Ways Forensics]]  
+
; [[Nuix Desktop]] by [[Nuix Pty Ltd]]
: Has some limited imaging capabilities. The output is [[raw format]].
+
: http://www.nuix.com
  
; [[X-Ways Replica]]
+
; [[OnLineDFS]] by [[Cyber Security Technologies]]
: Performs [[hard disk]] [[cloning]] and imaging. The output is [[raw format]].
+
: http://www.cyberstc.com/
  
= Data Recovery Tools =
+
; [[OSForensics]] by [[PassMark Software Pty Ltd]]
 +
: http://www.osforensics.com/
  
; [[BringBack]]
+
; [[P2 Power Pack]] by [[Paraben]]
: http://www.toolsthatwork.com/
+
: https://www.paraben-forensics.com/catalog/product_info.php?cPath=25&products_id=187
: BringBack(tm) offers easy to use, inexpensive, and highly successful data recovery for Windows(tm) & Linux (ext2) operating systems and digital images stored on memory cards, etc.
+
  
; [[ByteBack Data Recovery Investigative Suite v4.0]]
+
; [[Prodiscover]] by [[Techpathways]]
: http://www.toolsthatwork.com
+
: http://www.techpathways.com/ProDiscoverWindows.htm
: Now with UDMA, ATA & SATA support, memory management and greater ease and control of Partition and MBR manipulations, ByteBack continues to uphold it's viability as the computer forensics and recovery application of professionals.
+
  
; [[RAID Reconstructor]]
+
; [[Proof Finder]] by [[Nuix Pty Ltd]]
: Runtime Software's [http://www.runtime.org/raid.htm RAID Reconstructor] will reconstruct [[RAID Level 0]] (Striping) and [[RAID Level 5]] drives. People who have used it, love it.
+
: http://www.prooffinder.com/
  
; [[Salvation Data]]
+
; [[Safeback]] by [[NTI]] and [[Armor Forensics]]
: http://www.salvationdata.com
+
: http://www.forensics-intl.com/safeback.html
: Claims to have a program that can read the "[[bad blocks]]" of [[Maxtor]] drives with proprietary commands.
+
  
= Disk Analysis Tools =
+
; [[X-Ways Forensics]] by [[X-Ways AG]]
 +
: http://www.x-ways.net/forensics/index-m.html
  
== Linux-based Tools ==
+
; [[DateDecoder]] by [[Live-Forensics]]
 +
: http://www.live-forensics.com/dl/DateDecoder.zip
 +
: A command line tool that decodes most encoded time/date stamps found on a windows system, and outputs the time/date in a human readable format.
  
; [[SMART]], by [[ASR Data]]
+
; [[RecycleReader]] by [[Live-Forensics]]
: http://www.asrdata.com
+
: http://www.live-forensics.com/dl/RecycleReader.zip
 +
: A command line tool that outputs the contents of the recycle bin on XP, Vista and 7.
  
== Windows-based Tools ==
+
; [[Dstrings]] by [[Live-Forensics]]
 +
: http://www.live-forensics.com/dl/Dstrings.zip
 +
: A command line tool that searches for strings in a given file.  It has the ability to compare the output of those strings against a dictionary to either exclude the dictionary terms in the output or only output files that match the dictionary.  It also has the ability to search for IP Addresses and URLs/Email Addresses.
  
; [[BringBack]] by Tech Assist, Inc.
+
; [[Unique]] by [[Live-Forensics]]
: http://www.toolsthatwork.com/bringback.htm
+
: http://www.live-forensics.com/dl/Unique.zip
 +
: A command line tool similar to the Unix uniq. Allows for unique string counts, as well as various sorting options.
  
; [[EnCase]], by [[Guidance Software]]
+
; [[HashUtil]] by [[Live-Forensics]]
: http://www.guidancesoftware.com/
+
: http://www.live-forensics.com/dl/HashUtil.zip
 +
: HashUtil.exe will calculate MD5, SHA1, SHA256 and SHA512 hashes.  It has an option that will attempt to match the hash against the NIST/ISC MD5 hash databases.
  
; [[Forensic Toolkit]] ([[FTK]]), by [[AccessData]]
+
; [http://www.windowsscope.com WindowsSCOPE Cyber Forensics]
: http://www.accessdata.com/products/ftk/
+
: Comprehensive Windows Memory Forensics and Cyber Analysis, Incident Response, and Education support.
 +
: Software and hardware based acquisition with [https://www.windowsscope.com/captureguard-physical-memory-acquisition-hardware-pcie-add-on/ CaptureGUARD PCIe] and [https://www.windowsscope.com/captureguard-physical-memory-acquisition-hardware-expresscard/ ExpressCard]
 +
: Hardware based acquisition of memory on a locked computer via [https://www.windowsscope.com/captureguard-gateway-access-to-locked-computers/ CaptureGUARD Gateway]
  
; [[ILook Investigator]], by [[Elliot Spencer]] and [[U.S. Dept of Treasury, Internal Revenue Service - Criminal Investigation]] (IRS)
+
; [[MailXaminer]] by [[SysTools]]
: http://www.ilook-forensics.org/
+
: http://www.mailxaminer.com/
 +
: Forensic & eDiscovery Tool to find digital email evidences from multiple email platform through its powerful Search mechanism.
  
; [[Safeback]] by NTI and Armor Forensics
+
; Twitter Forensic Toolkit (TFT) by [[Afentis_forensics]]
: http://www.forensics-intl.com/safeback.html
+
; http://www.twitterforensics.com
 +
: eDiscovery toolkit to identify relevant Tweets, clone full profiles, download all tweets/media, data mine across comments, and generate expert reports.  
  
; [[X-Ways Forensics]] by X-Ways AG
+
; YouTube Forensic Toolkit (YFT) by [[Afentis_forensics]]
: http://www.x-ways.net/forensics/index-m.html
+
; http://www.youtubeforensics.com
 +
: eDiscovery toolkit to identify relevant online media, download/convert videos, data mine across comments, and generate expert reports.
  
 
== Open Source Tools ==
 
== Open Source Tools ==
Line 135: Line 166:
 
; [[Autopsy]]
 
; [[Autopsy]]
 
: http://www.sleuthkit.org/autopsy/desc.php
 
: http://www.sleuthkit.org/autopsy/desc.php
 +
 +
; [[Bulk Extractor]]
 +
: https://github.com/simsong/bulk_extractor/wiki
 +
: Bulk Extractor provides digital media triage by extracting Features from digital media.
 +
 +
; [[Bulk Extractor Viewer]]
 +
: https://github.com/simsong/bulk_extractor/wiki/BEViewer
 +
: Bulk Extractor Viewer is a browser UI for viewing Feature data extracted using [[Bulk Extractor]].
 +
 +
; [[Digital Forensics Framework]] (DFF)
 +
: DFF is cross-platform and open-source, user and developers oriented. It provide many features and is very modular. Our goal is to provide a powerful framework to the forensic community, so people can use only one tool during the analysis. http://www.digital-forensic.org
  
 
; [[foremost]]
 
; [[foremost]]
 
: http://foremost.sf.net/
 
: http://foremost.sf.net/
 +
: [[Linux]] based file carving program
 +
 +
; [[FTimes]]
 +
: http://ftimes.sourceforge.net/FTimes/index.shtml
 +
: FTimes is a system baselining and evidence collection tool.
  
 
; [[gfzip]]
 
; [[gfzip]]
Line 145: Line 192:
 
: http://www.stud.uni-hannover.de/user/76201/gpart/
 
: http://www.stud.uni-hannover.de/user/76201/gpart/
 
: Tries to ''guess the primary partition table of a PC-type hard disk in case the primary partition table in sector 0 is damaged, incorrect or deleted''.
 
: Tries to ''guess the primary partition table of a PC-type hard disk in case the primary partition table in sector 0 is damaged, incorrect or deleted''.
 +
 +
; [[Hachoir]]
 +
: A generic framework for binary file manipulation, it supports [[FAT12]], [[FAT16]], [[FAT32]], [[ext2|ext2/ext3]], Linux swap, MSDOS partition header, etc. Recognize file type. Able to find subfiles (hachoir-subfile).
 +
 +
; [[hashdb]]
 +
: http://github.com/simsong/hashdb/wiki
 +
: A tool for finding previously identified blocks of data in media such as disk images.
  
 
; [[magicrescue]]
 
; [[magicrescue]]
 
: http://jbj.rapanden.dk/magicrescue/
 
: http://jbj.rapanden.dk/magicrescue/
 +
 +
; The [[Open Computer Forensics Architecture]]
 +
: http://ocfa.sourceforge.net/
  
 
; [[pyflag]]
 
; [[pyflag]]
: http://pyflag.sourceforge.net/
+
: http://code.google.com/p/pyflag/
 +
: Web-based, database-backed forensic and log analysis GUI written in Python.
  
 
; [[Scalpel]]
 
; [[Scalpel]]
 
: http://www.digitalforensicssolutions.com/Scalpel/
 
: http://www.digitalforensicssolutions.com/Scalpel/
 +
: [[Linux]] and [[Windows]] file carving program originally based on [[foremost]].
  
 
; [[scrounge-ntfs]]
 
; [[scrounge-ntfs]]
Line 164: Line 223:
 
: http://www.porcupine.org/forensics/tct.html
 
: http://www.porcupine.org/forensics/tct.html
  
; [[Zeitline]]
+
== [[NDA]] and [[scoped distribution]] tools ==
: http://projects.cerias.purdue.edu/forensics/timeline.php
+
: http://sourceforge.net/projects/zeitline/
+
  
= Forensics Live CDs =
+
= Enterprise Tools (Proactive Forensics)=
  
; [[FCCU Gnu/Linux Boot CD]]
+
; [[LiveWire Investigator 2008]] by [[WetStone Technologies]]
: Also a LiveCD built on top of [[Knoppix]] with a lot of tools with forensic purpose.
+
: http://www.wetstonetech.com/f/livewire2008.html
: It leaves the target devices unaltered (it does not use the swap partitions found on the devices) nor does it automount partitions.
+
  
; [[Helix]]
+
; [[P2 Enterprise Edition]] by [[Paraben]]
: A LiveCD built on top of [[Knoppix]].
+
: http://www.paraben-forensics.com/enterprise_forensics.html
: Also contains a Cygwin environment for use on a running Windows system (w/o rebooting).
+
  
; [[Knoppix STD]]
+
= Forensics Live CDs =
: A LiveCD built on top of [[Knoppix]].
+
; [[Kali Linux]]  
: http://s-t-d.org/
+
: [http://www.kali.org/ http://www.kali.org/]
  
; [[FARMER DUDE Live CD]]
+
; [[KNOPPIX]]  
: ???
+
: [http://www.knopper.net/knoppix/index-en.html http://www.knopper.net/knoppix/index-en.html]
: http://www.crazytrain.com/
+
  
= Metadata Extraction Tools =
+
; [[BackTrack Linux]]
 +
: [http://www.backtrack-linux.org/ http://www.backtrack-linux.org/]
  
; [[antiword]]
+
; [[Paladin Forensic Suite - Live Boot Ubuntu]] ([[Sumuri, LLC]])
: http://www.winfield.demon.nl/
+
: https://www.sumuri.com/products/paladin/
 +
: Simplifies various forensics tasks in a forensically sound manner via the PALADIN Toolbox.
  
; [[catdoc]]
+
See: [[:Category:Live CD|Forensics Live CDs]]
: http://www.45.free.net/~vitus/software/catdoc/
+
  
; [[jhead]]
+
= Personal Digital Device Tools=
: http://www.sentex.net/~mwandel/jhead/
+
: Displays or modifies [[Exif]] data in [[JPEG]] files.
+
  
; [[laola]]
+
== GPS Forensics ==
: http://user.cs.tu-berlin.de/~schwartz/pmh/index.html
+
  
; [[vinetto]]
+
; [[Blackthorn GPS Forensics]]
: http://vinetto.sourceforge.net/
+
; [[.XRY]]
: Examines [[Thumbs.db]] files.
+
  
; [[word2x]]
+
== PDA Forensics ==
: http://word2x.sourceforge.net/
+
; [[Cellebrite UFED]]
 +
; [[.XRY]]
 +
; [[Paraben PDA Seizure]]
 +
; [[Paraben PDA Seizure Toolbox]]
 +
; [[PDD]]
  
; [[wvWare]]
+
== Cell Phone Forensics ==
: http://wvware.sourceforge.net/
+
; [https://belkasoft.com/ec Belkasoft Evidence Center]
: Extracts metadata from various [[Microsoft]] Word files ([[doc]]). Can also convert doc files to other formats such as HTML or plain text.
+
; [[BitPIM]]
 +
; [[Cellebrite UFED]]
 +
; [[DataPilot Secure View]]
 +
; [[.XRY]]
 +
: http://www.msab.com/index
 +
; [[Fernico ZRT]]
 +
; [[ForensicMobile]]
 +
; [[LogiCube CellDEK]]
 +
; [[MOBILedit!]]
 +
; [[Oxygen Forensic Suite 2010]]
 +
: http://www.oxygen-forensic.com
 +
; [[Paraben's Device Seizure]] and [[Paraben's Device Seizure Toolbox]]
 +
: http://www.paraben-forensics.com/handheld_forensics.html
 +
; [[Serial Port Monitoring]]
 +
; [[TULP2G]]
  
; [[xpdf]]
+
== SIM Card Forensics ==
: http://www.foolabs.com/xpdf/
+
; [[Cellebrite UFED]]
: [[pdfinfo]] (part of the [[xpdf]] package) displays some metadata of [[PDF]] files.
+
; [[.XRY]]
 +
; [[ForensicSIM]]
 +
; [[Paraben's SIM Card Seizure]]
 +
: http://www.paraben-forensics.com/handheld_forensics.html
 +
; [[SIMCon]]
  
; [[Metadata Assistant]]
+
== Preservation Tools ==
: http://www.payneconsulting.com/products/metadataent/
+
; [[Paraben StrongHold Bag]]
 +
; [[Paraben StrongHold Tent]]
  
= File Analysis Tools =
+
= Other Tools =
  
; [[file]]
+
; Chat Sniper
: The file command determines the file type of a given file, depending on its contents and not on e.g. its extension or filename. In order to do that, it uses a magic configuration file that identifies filetypes.
+
: http://www.alexbarnett.com/chatsniper.htm
 +
:  A forensic software tool designed to simplify the process of on-scene evidence acquisition and analysis of logs and data left by the use of AOL, MSN (Live), or Yahoo instant messenger.
  
; [[ldd]]
+
; Serial Port Analyzer
: ...
+
: http://www.eltima.com/how-to-analyze-serial-port-activity/
 +
: The tool to analyze serial port and  device activity.
  
; [[ltrace]]
+
; Computer Forensics Toolkit
: ...
+
: http://computer-forensics.privacyresources.org
 +
: This is a collection of resources, most of which are informational, designed specifically to guide the beginner, often in a procedural sense.
  
; [[strace]]
+
; Live View
: ...
+
: http://liveview.sourceforge.net/
 +
: Live View is a graphical forensics tool that creates a [[VMware]] [[virtual machine]] out of a dd disk image or physical disk.  
  
; [[strings]]
+
; Parallels VM
: Strings will print the strings of printable characters in files. It allows choosing different charactersets (ASCII, UNICODE). It is a quick way to browse through files/partitions/... in order to look for words, filenames, keywords etc.
+
: http://www.parallels.com/
 +
: http://en.wikipedia.org/wiki/Parallels_Workstation
  
= Network Forensics Tools =
+
; Serial and USB ports sharing
 +
: http://www.flexihub.com/serial-over-ethernet.html
 +
: Share and access serial and USB ports over Ethernet
  
; [[chkrootkit]]
+
; Microsoft Virtual PC
: ...
+
: http://www.microsoft.com/windows/products/winfamily/virtualpc/default.mspx
 +
: http://en.wikipedia.org/wiki/Virtual_PC
  
; [[cryptcat]]
+
; [[VMware]] Player
: ...
+
: http://www.vmware.com/products/player/
 +
: http://en.wikipedia.org/wiki/VMware#VMware_Workstation
 +
: A free player for [[VMware]] [[virtual machine]]s that will allow them to "play" on either [[Windows]] or [[Linux]]-based systems.
  
; [[netcat]]
+
; [[VMware]] Server
: ...
+
: http://www.vmware.com/products/server/
 +
: The free server product, for setting up/configuring/running [[VMware]] [[virtual machine]].Important difference being that it can run 'headless', i.e. everything in background.
  
; [[netflow]]/[[flowtools]]
+
; Webtracer
: http://www.cisco.com/warp/public/732/Tech/nmp/netflow/index.shtml
+
: http://www.forensictracer.com
: http://www.splintered.net/sw/flow-tools/
+
: Software for forensic analysis of internet resources (IP address, e-mail address, domain name, URL, e-mail headers, log files...)
  
; [[rkhunter]]
+
; Recon for MAC OS X
: ...
+
: https://www.sumuri.com/products/recon/
 +
: RECON for Mac OS X is simply the fastest way to conduct Mac Forensics, automates what an experienced examiner would need weeks to accomplish in minutes, now includes PALADIN 6 which comes with a full featured Forensic Suite, bootable forensic imager, a software write-blocker and so much more.
  
; [[Sguil]]
 
: http://sguil.sourceforge.net/
 
  
; [[Snort]]
+
== Hex Editors ==
: http://www.snort.org/
+
  
; [[Tcpdump]]  
+
; [[biew]]
: http://www.tcpdump.org
+
: http://biew.sourceforge.net/en/biew.html
  
; [[tcpextract]]
+
; [[bless]]
: http://tcpxtract.sourceforge.net/
+
: http://home.gna.org/bless/
  
; [[tcpflow]]
+
; [[Okteta]]
: http://www.circlemud.org/~jelson/software/tcpflow/
+
: KDE's new cross-platform hex editor with features such as signature-matching
 +
: http://utils.kde.org/projects/okteta/
  
= Anti-forensics Tools =
+
; [[hexdump]]
 
+
; [[Ontrack Data Eraser]]
+
 
: ...
 
: ...
  
; [[Slacker]]
+
; [[HexFiend]]
: A tool to hide files within the [[slack space]] of the [[NTFS]] file system.
+
: A hex editor for Apple OS X
: http://www.metasploit.com/projects/antiforensics/slacker.exe
+
: http://ridiculousfish.com/hexfiend/
  
; [[Timestomp]]
+
; [[Hex Workshop]]
: A tool that allows one to modify all four [[NTFS]] timestamp (MACE) values.
+
: A hex editor from [[BreakPoint Software, Inc.]]
: http://www.metasploit.com/projects/antiforensics/timestomp.exe
+
: http://www.bpsoft.com
  
== Securely deleting data ==
+
; [[khexedit]]
 +
: http://docs.kde.org/stable/en/kdeutils/khexedit/index.html
  
; [[CyberScrub cyberCide]]
+
; ReclaiMe Pro
: This program securely erases all data from drives or partitions.
+
: The built-in disk editor visualizes most known partition and filesystem objects: boot sectors, superblocks, partition headers in structured view. Low-level data editing for extra leverage.  
: http://www.cyberscrub.com/products/cybercide/index.php
+
: http://www.ReclaiMe-Pro.com
  
; [[CyberScrub Privacy Suite]]
+
; [[WinHex]]
: This program securely erases selected data, wipes free space, powerful scheduling capabilities.
+
: Computer forensics software, data recovery software, hex editor, and disk editor from [[X-Ways]].
: http://www.cyberscrub.com/products/privacysuite/index.php
+
: http://www.x-ways.net/winhex
  
; [[Darik's Boot and Nuke]] ([[DBAN]])
+
; [[wxHexEditor]]
: This is a bootable disk that securely wipes any hard disk it can detect.
+
: A Multi-OS supported, open sourced, hex and disk editor.
: http://dban.sourceforge.net/
+
: http://www.wxhexeditor.org
  
; [[shred]]
+
; [[xxd]]
: Part of GNU coreutils.
+
: ...
  
; [[wipe]]
+
; [[HexReader]]
: http://abaababa.ouvaton.org/wipe/
+
: [[Live-Forensics]] software that reads windows files at specified offset and length and outputs results to the console.
 +
: http://www.live-forensics.com/dl/HexReader.zip
  
== See also ==
+
= Telephone Scanners/War Dialers =
  
* [[Anti-forensic techniques]]
+
;PhoneSweep
* [[Database Encryption]].
+
:http://www.sandstorm.net/products/phonesweep/
 +
:PhoneSweep is a commercial grade multi-line wardialer used by many security auditors to run telephone line scans in their organizations. PhoneSweep Gold is the distributed-access add-on for PhoneSweep, for organizations that need to run scans remotely.
  
= Other Tools =
+
;TeleSweep
 +
:http://www.securelogix.com/modemscanner/
 +
:SecureLogix is currently offering no-cost downloads of our award-winning TeleSweep Secure® modem-vulnerability scanner. This free modem scanning software can be used to dial a batch of corporate phone numbers and report on the number of modems connected to these corporate lines. *** Registration is required for obtaining a license key *** Still free however.
  
; [[VMware]] Player
+
;WarVox
: http://www.vmware.com/products/player/
+
:https://github.com/rapid7/warvox
: A free player for [[VMware]] [[virtual machine]]s that will allow them to "play" on either [[Windows]] or [[Linux]]-based systems.
+
:WarVOX is a free, open-source VOIP-based war dialing tool for exploring, classifying, and auditing phone systems.
  
; [[VMware]] Server
+
;Additional Software Names and Links (Jackpot!)
: http://www.vmware.com/products/server/
+
:http://www.wyae.de/software/paw/
: The free server product, for setting up/configuring/running [[VMware]] [[virtual machine]].Important difference being that it can run 'headless', i.e. everything in background.
+
 
+
== Hex Editors ==
+
 
+
; [[biew]]
+
: http://biew.sourceforge.net/en/biew.html
+
 
+
; [[hexdump]]
+
: ...
+
 
+
; [[khexedit]]
+
: http://docs.kde.org/stable/en/kdeutils/khexedit/index.html
+
 
+
; [[xxd]]
+
: ...
+

Latest revision as of 02:04, 1 March 2018

This is an overview of available tools for forensic investigators. Please click on the name of any tool for more details.

Note: This page has gotten too big and is being broken up. See:

Disk Analysis Tools

Hard Drive Firmware and Diagnostics Tools

PC-3000 from ACE Lab
http://www.acelaboratory.com/catalog/

Linux-based Tools

LINReS by NII Consulting Pvt. Ltd.
http://www.niiconsulting.com/innovation/linres.html
SMART by ASR Data
http://www.asrdata.com
Second Look: Linux Memory Forensics by Pikewerks Corporation
http://secondlookforensics.com/

Macintosh-based Tools

Macintosh Forensic Software by BlackBag Technologies, Inc.
http://www.blackbagtech.com/software_mfs.html
MacForensicsLab by Subrosasoft
MacForensicLab-Subrosasoft
Mac Marshal by ATC-NY
http://www.macmarshal.com/
Recon for MAC OS X by Sumuri, LLC
https://www.sumuri.com/products/recon/

Windows-based Tools

Arsenal Recon Weapons by Arsenal Recon
https://ArsenalRecon.com/
Arsenal Recon offers unique and powerful tools to mount Windows disk images, reconstruct Windows Registries, and process Windows hibernation files.
Belkasoft Acquisition Tool by Belkasoft
https://belkasoft.com/bat
BAT is a free utility to acquire a wide range of data sources: hard drives, running computers RAM memory, modern smartphones, and various types of clouds. The output can be analyzed with both Belkasoft and third-party tools.
Belkasoft Evidence Center by Belkasoft
https://belkasoft.com/ec
BEC allows an investigator to perform all investigation steps: acquisition (aquire hard and removable drives, image smartphones and download cloud data), extraction of evidence (searches and carves more than 700 formats of various files and applications data), analysis (hex viewer, SQLite viewer, social graph building with communities detection etc) and reporting.
Blackthorn GPS Forensics
http://www.blackthorngps.com
BringBack by Tech Assist, Inc.
http://www.toolsthatwork.com/bringback.htm
CD/DVD Inspector by InfinaDyne
http://www.infinadyne.com/cddvd_inspector.html
This is the only forensic-qualified tool for examinination of optical media. It has been around since 1999 and is in use by law enforcement, government and data recovery companies worldwide.
EMail Detective - Forensic Software Tool by Hot Pepper Technology, Inc
http://www.hotpepperinc.com/emd
EnCase by Guidance Software
http://www.guidancesoftware.com/
Facebook Forensic Toolkit (FFT) by Afentis_forensics
http://www.facebookforensics.com
eDiscovery toolkit to identify and clone full profiles; including wall posts, private messages, uploaded photos/tags, group details, graphically illustrate friend links, and generate expert reports.
Forensic Explorer (FEX) by GetData Forensics
http://www.forensicexplorer.com
Forensic Toolkit (FTK) by AccessData
http://www.accessdata.com/products/ftk/
HBGary Responder Professional - Windows Physical Memory Forensic Platform
http://www.hbgary.com
ILook by Xtremeforensics
http://www.xtremeforensics.biz/
Internet Evidence Finder (IEF) by Magnet Forensics
http://www.magnetforensics.com/
ISEEK by Xtremeforensics
http://www.xtremeforensics.biz/
Mercury Indexer by MicroForensics, Inc.
http://www.MicroForensics.com/
Nuix Desktop by Nuix Pty Ltd
http://www.nuix.com
OnLineDFS by Cyber Security Technologies
http://www.cyberstc.com/
OSForensics by PassMark Software Pty Ltd
http://www.osforensics.com/
P2 Power Pack by Paraben
https://www.paraben-forensics.com/catalog/product_info.php?cPath=25&products_id=187
Prodiscover by Techpathways
http://www.techpathways.com/ProDiscoverWindows.htm
Proof Finder by Nuix Pty Ltd
http://www.prooffinder.com/
Safeback by NTI and Armor Forensics
http://www.forensics-intl.com/safeback.html
X-Ways Forensics by X-Ways AG
http://www.x-ways.net/forensics/index-m.html
DateDecoder by Live-Forensics
http://www.live-forensics.com/dl/DateDecoder.zip
A command line tool that decodes most encoded time/date stamps found on a windows system, and outputs the time/date in a human readable format.
RecycleReader by Live-Forensics
http://www.live-forensics.com/dl/RecycleReader.zip
A command line tool that outputs the contents of the recycle bin on XP, Vista and 7.
Dstrings by Live-Forensics
http://www.live-forensics.com/dl/Dstrings.zip
A command line tool that searches for strings in a given file. It has the ability to compare the output of those strings against a dictionary to either exclude the dictionary terms in the output or only output files that match the dictionary. It also has the ability to search for IP Addresses and URLs/Email Addresses.
Unique by Live-Forensics
http://www.live-forensics.com/dl/Unique.zip
A command line tool similar to the Unix uniq. Allows for unique string counts, as well as various sorting options.
HashUtil by Live-Forensics
http://www.live-forensics.com/dl/HashUtil.zip
HashUtil.exe will calculate MD5, SHA1, SHA256 and SHA512 hashes. It has an option that will attempt to match the hash against the NIST/ISC MD5 hash databases.
WindowsSCOPE Cyber Forensics
Comprehensive Windows Memory Forensics and Cyber Analysis, Incident Response, and Education support.
Software and hardware based acquisition with CaptureGUARD PCIe and ExpressCard
Hardware based acquisition of memory on a locked computer via CaptureGUARD Gateway
MailXaminer by SysTools
http://www.mailxaminer.com/
Forensic & eDiscovery Tool to find digital email evidences from multiple email platform through its powerful Search mechanism.
Twitter Forensic Toolkit (TFT) by Afentis_forensics
http://www.twitterforensics.com
eDiscovery toolkit to identify relevant Tweets, clone full profiles, download all tweets/media, data mine across comments, and generate expert reports.
YouTube Forensic Toolkit (YFT) by Afentis_forensics
http://www.youtubeforensics.com
eDiscovery toolkit to identify relevant online media, download/convert videos, data mine across comments, and generate expert reports.

Open Source Tools

AFFLIB
A library for working with disk images. Currently AFFLIB supports raw, AFF, AFD, and EnCase file formats. Work to support segmented raw, iLook, and other formats is ongoing.
Autopsy
http://www.sleuthkit.org/autopsy/desc.php
Bulk Extractor
https://github.com/simsong/bulk_extractor/wiki
Bulk Extractor provides digital media triage by extracting Features from digital media.
Bulk Extractor Viewer
https://github.com/simsong/bulk_extractor/wiki/BEViewer
Bulk Extractor Viewer is a browser UI for viewing Feature data extracted using Bulk Extractor.
Digital Forensics Framework (DFF)
DFF is cross-platform and open-source, user and developers oriented. It provide many features and is very modular. Our goal is to provide a powerful framework to the forensic community, so people can use only one tool during the analysis. http://www.digital-forensic.org
foremost
http://foremost.sf.net/
Linux based file carving program
FTimes
http://ftimes.sourceforge.net/FTimes/index.shtml
FTimes is a system baselining and evidence collection tool.
gfzip
http://www.nongnu.org/gfzip/
gpart
http://www.stud.uni-hannover.de/user/76201/gpart/
Tries to guess the primary partition table of a PC-type hard disk in case the primary partition table in sector 0 is damaged, incorrect or deleted.
Hachoir
A generic framework for binary file manipulation, it supports FAT12, FAT16, FAT32, ext2/ext3, Linux swap, MSDOS partition header, etc. Recognize file type. Able to find subfiles (hachoir-subfile).
hashdb
http://github.com/simsong/hashdb/wiki
A tool for finding previously identified blocks of data in media such as disk images.
magicrescue
http://jbj.rapanden.dk/magicrescue/
The Open Computer Forensics Architecture
http://ocfa.sourceforge.net/
pyflag
http://code.google.com/p/pyflag/
Web-based, database-backed forensic and log analysis GUI written in Python.
Scalpel
http://www.digitalforensicssolutions.com/Scalpel/
Linux and Windows file carving program originally based on foremost.
scrounge-ntfs
http://memberwebs.com/nielsen/software/scrounge/
Sleuthkit
http://www.sleuthkit.org/
The Coroner's Toolkit (TCT)
http://www.porcupine.org/forensics/tct.html

NDA and scoped distribution tools

Enterprise Tools (Proactive Forensics)

LiveWire Investigator 2008 by WetStone Technologies
http://www.wetstonetech.com/f/livewire2008.html
P2 Enterprise Edition by Paraben
http://www.paraben-forensics.com/enterprise_forensics.html

Forensics Live CDs

Kali Linux
http://www.kali.org/
KNOPPIX
http://www.knopper.net/knoppix/index-en.html
BackTrack Linux
http://www.backtrack-linux.org/
Paladin Forensic Suite - Live Boot Ubuntu (Sumuri, LLC)
https://www.sumuri.com/products/paladin/
Simplifies various forensics tasks in a forensically sound manner via the PALADIN Toolbox.

See: Forensics Live CDs

Personal Digital Device Tools

GPS Forensics

Blackthorn GPS Forensics
.XRY

PDA Forensics

Cellebrite UFED
.XRY
Paraben PDA Seizure
Paraben PDA Seizure Toolbox
PDD

Cell Phone Forensics

Belkasoft Evidence Center
BitPIM
Cellebrite UFED
DataPilot Secure View
.XRY
http://www.msab.com/index
Fernico ZRT
ForensicMobile
LogiCube CellDEK
MOBILedit!
Oxygen Forensic Suite 2010
http://www.oxygen-forensic.com
Paraben's Device Seizure and Paraben's Device Seizure Toolbox
http://www.paraben-forensics.com/handheld_forensics.html
Serial Port Monitoring
TULP2G

SIM Card Forensics

Cellebrite UFED
.XRY
ForensicSIM
Paraben's SIM Card Seizure
http://www.paraben-forensics.com/handheld_forensics.html
SIMCon

Preservation Tools

Paraben StrongHold Bag
Paraben StrongHold Tent

Other Tools

Chat Sniper
http://www.alexbarnett.com/chatsniper.htm
A forensic software tool designed to simplify the process of on-scene evidence acquisition and analysis of logs and data left by the use of AOL, MSN (Live), or Yahoo instant messenger.
Serial Port Analyzer
http://www.eltima.com/how-to-analyze-serial-port-activity/
The tool to analyze serial port and device activity.
Computer Forensics Toolkit
http://computer-forensics.privacyresources.org
This is a collection of resources, most of which are informational, designed specifically to guide the beginner, often in a procedural sense.
Live View
http://liveview.sourceforge.net/
Live View is a graphical forensics tool that creates a VMware virtual machine out of a dd disk image or physical disk.
Parallels VM
http://www.parallels.com/
http://en.wikipedia.org/wiki/Parallels_Workstation
Serial and USB ports sharing
http://www.flexihub.com/serial-over-ethernet.html
Share and access serial and USB ports over Ethernet
Microsoft Virtual PC
http://www.microsoft.com/windows/products/winfamily/virtualpc/default.mspx
http://en.wikipedia.org/wiki/Virtual_PC
VMware Player
http://www.vmware.com/products/player/
http://en.wikipedia.org/wiki/VMware#VMware_Workstation
A free player for VMware virtual machines that will allow them to "play" on either Windows or Linux-based systems.
VMware Server
http://www.vmware.com/products/server/
The free server product, for setting up/configuring/running VMware virtual machine.Important difference being that it can run 'headless', i.e. everything in background.
Webtracer
http://www.forensictracer.com
Software for forensic analysis of internet resources (IP address, e-mail address, domain name, URL, e-mail headers, log files...)
Recon for MAC OS X
https://www.sumuri.com/products/recon/
RECON for Mac OS X is simply the fastest way to conduct Mac Forensics, automates what an experienced examiner would need weeks to accomplish in minutes, now includes PALADIN 6 which comes with a full featured Forensic Suite, bootable forensic imager, a software write-blocker and so much more.


Hex Editors

biew
http://biew.sourceforge.net/en/biew.html
bless
http://home.gna.org/bless/
Okteta
KDE's new cross-platform hex editor with features such as signature-matching
http://utils.kde.org/projects/okteta/
hexdump
...
HexFiend
A hex editor for Apple OS X
http://ridiculousfish.com/hexfiend/
Hex Workshop
A hex editor from BreakPoint Software, Inc.
http://www.bpsoft.com
khexedit
http://docs.kde.org/stable/en/kdeutils/khexedit/index.html
ReclaiMe Pro
The built-in disk editor visualizes most known partition and filesystem objects: boot sectors, superblocks, partition headers in structured view. Low-level data editing for extra leverage.
http://www.ReclaiMe-Pro.com
WinHex
Computer forensics software, data recovery software, hex editor, and disk editor from X-Ways.
http://www.x-ways.net/winhex
wxHexEditor
A Multi-OS supported, open sourced, hex and disk editor.
http://www.wxhexeditor.org
xxd
...
HexReader
Live-Forensics software that reads windows files at specified offset and length and outputs results to the console.
http://www.live-forensics.com/dl/HexReader.zip

Telephone Scanners/War Dialers

PhoneSweep
http://www.sandstorm.net/products/phonesweep/
PhoneSweep is a commercial grade multi-line wardialer used by many security auditors to run telephone line scans in their organizations. PhoneSweep Gold is the distributed-access add-on for PhoneSweep, for organizations that need to run scans remotely.
TeleSweep
http://www.securelogix.com/modemscanner/
SecureLogix is currently offering no-cost downloads of our award-winning TeleSweep Secure® modem-vulnerability scanner. This free modem scanning software can be used to dial a batch of corporate phone numbers and report on the number of modems connected to these corporate lines. *** Registration is required for obtaining a license key *** Still free however.
WarVox
https://github.com/rapid7/warvox
WarVOX is a free, open-source VOIP-based war dialing tool for exploring, classifying, and auditing phone systems.
Additional Software Names and Links (Jackpot!)
http://www.wyae.de/software/paw/