Difference between revisions of "Tools"

From ForensicsWiki
Jump to: navigation, search
(Network Forensics Tools)
m
Line 173: Line 173:
 
; [[vinetto]]
 
; [[vinetto]]
 
: http://vinetto.sourceforge.net/
 
: http://vinetto.sourceforge.net/
: Examines Thumbs.db files.
+
: Examines [[Thumbs.db]] files.
  
 
= File Analysis Tools =
 
= File Analysis Tools =
Line 179: Line 179:
 
; [[strings]]
 
; [[strings]]
 
: Strings will print the strings of printable characters in files. It allows choosing different charactersets (ASCII, UNICODE). It is a quick way to browse through files/partitions/... in order to look for words, filenames, keywords etc.
 
: Strings will print the strings of printable characters in files. It allows choosing different charactersets (ASCII, UNICODE). It is a quick way to browse through files/partitions/... in order to look for words, filenames, keywords etc.
 
 
  
 
; [[file]]
 
; [[file]]
: The file command determines the file type of a given file, depending on its contents and not on e.g. its extension or filename.In order to do that, it uses a magic configuration file that identifies filetypes.
+
: The file command determines the file type of a given file, depending on its contents and not on e.g. its extension or filename. In order to do that, it uses a magic configuration file that identifies filetypes.
  
 
; [[ltrace]]
 
; [[ltrace]]
Line 197: Line 195:
  
 
; [[Tcpdump]]  
 
; [[Tcpdump]]  
; http://www.tcpdump.org
+
: http://www.tcpdump.org
  
 
; [[Sguil]]
 
; [[Sguil]]
; http://sguil.sourceforge.net/
+
: http://sguil.sourceforge.net/
  
; [[netflow/flowtools]]
+
; [[netflow]]/[[flowtools]]
; http://www.cisco.com/warp/public/732/Tech/nmp/netflow/index.shtml
+
: http://www.cisco.com/warp/public/732/Tech/nmp/netflow/index.shtml
; http://www.splintered.net/sw/flow-tools/
+
: http://www.splintered.net/sw/flow-tools/
  
 
= Anti-forensics Tools =
 
= Anti-forensics Tools =
Line 211: Line 209:
 
: ...
 
: ...
  
; [[Timestomp]] - A tool that allows one to modify all four NTFS timestamp (MACE) values
+
; [[Timestomp]]
; http://www.metasploit.com/projects/antiforensics/timestomp.exe  
+
: A tool that allows one to modify all four [[NTFS]] timestamp (MACE) values.
 +
: http://www.metasploit.com/projects/antiforensics/timestomp.exe  
  
; [[Slacker]] - A tool to hide files within the slack space of the NTFS file system
+
; [[Slacker]]
; http://www.metasploit.com/projects/antiforensics/slacker.exe  
+
: A tool to hide files within the [[slack space]] of the [[NTFS]] file system.
 +
: http://www.metasploit.com/projects/antiforensics/slacker.exe  
  
 
== Securely deleting data ==
 
== Securely deleting data ==
  
;[[CyberScrub Privacy Suite]]
+
; [[CyberScrub Privacy Suite]]
: This program securely erases selected data, wipes free space, powerful scheduling capabilities
+
: This program securely erases selected data, wipes free space, powerful scheduling capabilities.
 
: http://www.cyberscrub.com/products/privacysuite/index.php
 
: http://www.cyberscrub.com/products/privacysuite/index.php
  
;[[CyberScrub cyberCide]]
+
; [[CyberScrub cyberCide]]
: This program securely erases all data from drives or partitions
+
: This program securely erases all data from drives or partitions.
 
: http://www.cyberscrub.com/products/cybercide/index.php
 
: http://www.cyberscrub.com/products/cybercide/index.php
  
Line 243: Line 243:
 
: http://www.vmware.com/products/player/
 
: http://www.vmware.com/products/player/
 
: A free player for [[VMware]] [[virtual machine]]s that will allow them to "play" on either [[Windows]] or [[Linux]]-based systems.
 
: A free player for [[VMware]] [[virtual machine]]s that will allow them to "play" on either [[Windows]] or [[Linux]]-based systems.
 
  
 
; [[VMware]] Server
 
; [[VMware]] Server
 
: http://www.vmware.com/products/server/
 
: http://www.vmware.com/products/server/
 
: The free server product, for setting up/configuring/running [[VMware]] [[virtual machine]].Important difference being that it can run 'headless', i.e. everything in background.
 
: The free server product, for setting up/configuring/running [[VMware]] [[virtual machine]].Important difference being that it can run 'headless', i.e. everything in background.
 
  
 
== Hex Editors ==
 
== Hex Editors ==

Revision as of 23:27, 29 March 2006

Disk Imaging Tools

Hardware imagers

Imaging Memory

At CanSec West 05, Michael Becher, Maximillian Dornseif, and Christian N. Klein discussed an exploit which uses DMA to read arbitrary memory locations of a firewire-enabled system. The paper lists more details. The exploit is run on an iPod running Linux. This can be used to grab screen contents.

In theory, this could be used with the ... to send through an exploit code that would cause the system to dump the contents of its hard drive back to the iPod.

Unix-based imagers

dd
A program that converts and copies files, is one of the oldest Unix programs. I can copy data from any Unix "file" (including a raw partition) to any other Unix "file" (including a disk file or a raw partition). This is one of the oldest of the imaging tools, and produces raw image files. Extended into dcfldd.
dcfldd
A version of dd created by the Digital Computer Forensics Laboratory. dcfldd is an enhanced version of GNU dd with features useful for forensics and security, such as calculating MD5 or SHA-1 hashes on the fly and faster disk wiping.
dd_rescue
http://www.garloff.de/kurt/linux/ddrescue/
A tool similar to dd, but unlike dd it will continue reading the next sector, if it stumbles over bad sectors it cannot read.
GNU ddrescue
http://www.gnu.org/software/ddrescue/ddrescue.html
sdd
Another dd-like tool. It is supposed to be faster in certain situations.
aimage
Part of the AFF system, aimage can create either a raw file or an AFF file. It can optionally compress and calculate MD5 or SHA-1 hash residues while the data is being copied.
Blackbag
Specializes in Mac analysis, now a branch of the BSD family tree.

Windows-based imagers

X-Ways Forensics
Has some limited imaging capabilities. The output is raw format.
X-Ways Replica
Performs hard disk cloning and imaging. The output is raw format.
Ghost
FTK can read forensic, uncompressed Ghost images.
FTK Imager by Access Data
Can image and convert many image formats. Including E0* and DD. Also a free tool.
EnCase
Can image with out dongle plugged in. Only images to E0* file.
DIBS
Can image and convert many file formats. Also builds mobile toolkit.
iLook
The IRS's forensic tool.
Paraben
A complete set of tools for Windows (and handheld) products.
ProDiscovery
Images and searches FAT12, FAT16, FAT32 and all NTFS files.
AccessData
Their ultimate tool lets you "READ, ACQUIRE, DECRYPT, ANALYZE and REPORT (R.A.D.A.R.)."
ASR
A tool for imaging and analyzing disks.
Wetstone
Gargoyle investigator scans for illicit data and steganographic images.

Data Recovery Tools

Salvation Data
http://www.salvationdata.com
Claims to have a program that can read the "bad blocks" of Maxtor drives with proprietary commands.
RAID Reconstructor
Runtime Software's RAID Reconstructor will reconstruct RAID Level 0 (Striping) and RAID Level 5 drives. People who have used it, love it.

Disk Analysis Tools

Linux-based Tools

SMART, by ASR Data
http://www.asrdata.com

Windows-based Tools

EnCase, by Guidance Software
http://www.guidancesoftware.com/
Forensic Toolkit, by AccessData
http://www.accessdata.com/products/ftk/
ILook Investigator, by Elliot Spencer and Internal Revenue Service (IRS)
http://www.ilook-forensics.org/
Safeback by NTI and Armor Forensics
http://www.forensics-intl.com/safeback.html

Open Source Tools

AFFLIB
A library for working with disk images. Currently AFFLIB supports raw, AFF, AFD, and EnCase file formats. Work to support segmented raw, iLook, and other formats is ongoing.
foremost
http://foremost.sf.net/
gfzip
http://www.nongnu.org/gfzip/
magicrescue
http://jbj.rapanden.dk/magicrescue/
pyflag
http://pyflag.sourceforge.net/
Scalpel
http://www.digitalforensicssolutions.com/Scalpel/
scrounge-ntfs
http://memberwebs.com/nielsen/software/scrounge/
Sleuthkit
http://www.sleuthkit.org/
Autopsy
http://www.sleuthkit.org/autopsy/desc.php
Zeitline
http://projects.cerias.purdue.edu/forensics/timeline.php
http://sourceforge.net/projects/zeitline/
gpart
http://www.stud.uni-hannover.de/user/76201/gpart/
Tries to guess the primary partition table of a PC-type hard disk in case the primary partition table in sector 0 is damaged, incorrect or deleted.

Forensics Live CDs

Helix
A LiveCD built on top of Knoppix.
Also contains a Cygwin environment for use on a running Windows system (w/o rebooting).
FCCU Gnu/Linux Boot CD
Also a LiveCD built on top of Knoppix with a lot of tools with forensic purpose.
It leaves the target devices unaltered (it does not use the swap partitions found on the devices) nor does it automount partitions.

Metadata Extraction Tools

jhead
http://www.sentex.net/~mwandel/jhead/
Displays or modifies Exif data in JPEG files.
wvWare
http://wvware.sourceforge.net/
Extracts metadata from various Microsoft Word files (doc). Can also convert doc files to other formats such as HTML or plain text.
word2x
http://word2x.sourceforge.net/
catdoc
http://www.45.free.net/~vitus/software/catdoc/
laola
http://user.cs.tu-berlin.de/~schwartz/pmh/index.html
xpdf
http://www.foolabs.com/xpdf/
pdfinfo (part of the xpdf package) displays some metadata of PDF files.
vinetto
http://vinetto.sourceforge.net/
Examines Thumbs.db files.

File Analysis Tools

strings
Strings will print the strings of printable characters in files. It allows choosing different charactersets (ASCII, UNICODE). It is a quick way to browse through files/partitions/... in order to look for words, filenames, keywords etc.
file
The file command determines the file type of a given file, depending on its contents and not on e.g. its extension or filename. In order to do that, it uses a magic configuration file that identifies filetypes.
ltrace
...
strace
...

Network Forensics Tools

Snort
http://www.snort.org/
Tcpdump
http://www.tcpdump.org
Sguil
http://sguil.sourceforge.net/
netflow/flowtools
http://www.cisco.com/warp/public/732/Tech/nmp/netflow/index.shtml
http://www.splintered.net/sw/flow-tools/

Anti-forensics Tools

Ontrack Data Eraser
...
Timestomp
A tool that allows one to modify all four NTFS timestamp (MACE) values.
http://www.metasploit.com/projects/antiforensics/timestomp.exe
Slacker
A tool to hide files within the slack space of the NTFS file system.
http://www.metasploit.com/projects/antiforensics/slacker.exe

Securely deleting data

CyberScrub Privacy Suite
This program securely erases selected data, wipes free space, powerful scheduling capabilities.
http://www.cyberscrub.com/products/privacysuite/index.php
CyberScrub cyberCide
This program securely erases all data from drives or partitions.
http://www.cyberscrub.com/products/cybercide/index.php
shred
Part of GNU coreutils.
wipe
http://abaababa.ouvaton.org/wipe/

See also

Other Tools

VMware Player
http://www.vmware.com/products/player/
A free player for VMware virtual machines that will allow them to "play" on either Windows or Linux-based systems.
VMware Server
http://www.vmware.com/products/server/
The free server product, for setting up/configuring/running VMware virtual machine.Important difference being that it can run 'headless', i.e. everything in background.

Hex Editors

xxd
...
biew
http://biew.sourceforge.net/en/biew.html
khexedit
http://docs.kde.org/stable/en/kdeutils/khexedit/index.html