Computer Forensics

  • Netintercept
  • Forensics and Incident Response bootable Linux CDs
  • Computer Forensics Software
    • Statically Stripped Incident Response and Forensic Binaries
    • Free Forensic Tools from NTI (New Technologies Inc.), Free Law Enforcement Suite
    • Alphabetical List of Computer Forensics Products
    • Forensic Software Sources
    • ResponseKits First Aid Kits for Unix & Windows
    • EnCase Forensic Solutions
    • ListDLLs is able to show you the full path names of loaded modules
    • Handle is a utility that displays information about open handles for any process in the system.
    • PsList is utility that shows you a combination of the information obtainable individually with pmon and pstat. You can view process CPU and memory information, or thread statistics.
    • Procdmp.pl is a script the correlates the output of several commands that are usually run during incident response activities.
    • dd for Windows
    • cryptcat = netcat + encryption
    • Forensic Tools and Utilities
    • Recover is a utility which automates some steps as described in the Ext2fs-Undeletion howto in order to recover a lost file
    • e2undel is an interactive console tool that recovers the data of deleted files on an ext2 file system under Linux
    • mac-robber is a forensics and incident response program that collects Modified, Access, and Change (MAC) times from files.
    • mac_daddy MAC Time collector for forensic incident response. This toolset is a modified version of the two programs tree.pl and mactime from the Coroner’s Toolkit. This program is portable and can be run directly from a floppy or a cdrom with a perl interpreter.
    • The Coroner’s Toolkit TCT is a collection of programs by Dan Farmer and Wietse Venema for a post-mortem analysis of a UNIX system after break-in
    • Computer Forensics Software TCTUTILs is a collection of utilities that adds functionality to The Coroners Toolkit and the Autopsy Forensic Browser
    • The Autopsy Forensic Browser is a graphical interface to utilities found in The Coroners Toolkit (TCT) and TCTUTILs. It allows drive images to be analyzed at a file, block, and inode level. It also allows easy searches for strings in images.
    • New Versions: The @stake Sleuth Kit (TASK) and Autopsy Forensic Browser
    • pdd (Palm dd) is a Windows-based tool for for memory imaging and forensic acquisition of data from the Palm OS family of PDAs. pdd will preserve the crime scene by obtaining a bit-for-bit image or “snapshot” of the Palm device’s memory contents. Such data can be used by forensic investigators, incident response teams, and criminal and civil prosecutors.
    • foremost automatic file recovering
    • ILook Investigator a forensic analysis tool
    • Streak – the secure forensic imaging tool
    • md5deep is a cross-platform program to compute MD5 message digests on an arbitrary number of files with the following features: Recursive operation, Time estimation and Comparison mode
    • SectorSpy is a forensics analysis and text data recovery tool for computer hard drives and diskettes
    • Win32 First Responder’s Analyzer Tookit is a batch file developed on a SecurityFocus article highlighting the use of simple scripts on Windows32 platforms to perform basic security tasks. This script uses various Windows and 3rd Party tools to provide an effective forensic snapshot of your computer.
    • PenguinBackup formerly known as “The PalmPilot single-floppy backup system”
    • FTimes is a system baselining and evidence collection tool. The primary purpose of FTimes is to gather and/or develop information about specified directories and files in a manner conducive to intrusion analysis.
    • HashDig technology is a collection of utilities designed to help practitioners automate the process of resolving MD5 hashes.
    • IEHist dumps Internet Explorer history from index.dat files into delimited files suitable for import into other tools.
    • Data recovery tools
    • LADS – List Alternate DataStreams
    • ASR Data – Computer Forensic Tools (SMART)
    • PLAC (Portable Linux Auditing CD) is a business card sized bootable cdrom running linux. It has network auditing, disk recovery, and forensic analysis tools.
    • Forensic Acquisition Utilities
    • DCFL-DD – (an enhanced dd with MD5 hashing)
    • Fatback- undelete files from FAT filesystems
    • odessa “Open Digital Evidence Search and Seizure Architecture”
    • Disk Investigator. Who needs another one?
    • Perl Script to find Alternate Data Streams on NTFS
    • FileDisk is a virtual disk driver for Windows NT/2000/XP that uses one or more files to emulate physical disks. A console application is included that let you dynamically mount and unmount files. With FileDisk you can mount forensic dd-images read only for further analysis.
    • Evidor is a particularly easy and convenient way for any investigator to find and gather digital evidence on computer media.
    • WinHex is a universal hexadecimal editor, particularly helpful in the realm of computer forensics, data recovery, low-level data processing
    • Paraben’s E-Mail examiner supports many mailbox formats
    • NT registry filesystem for linux
    • PropertiesPlus can modify file attributes, file extensions, and the time stamps of single files, multiple files, or files contained within the folders and display the bytes allocated
    • Antiword for reading ascii content of world files
    • Metadata Assistant: Finding hidden data in word and excel files
    • Mount Image Pro is a tool for Computer Forensic investigations. It enables you to mount ENCASE®, Unix DD, or SMART forensic images as a drive letter on your file system.
    • Like dd, dd_rescue does copy data from one file or block device to another.
    • AIR – Automated Image and Restore
    • chaosreader can trace TCP or UDP sessions and fetch application data from tcpdump or snoop logs
    • cryogenic freezes the process state of a running system
    • faust (File AUdit Security Toolkit) is a perl script that helps to bash scripts and elf binaries
    • FLAG Forensic and Log Analysis GUI
    • FileSystem Investigator (fstools) is a platform independent file system viewer and data extraction tool written in Java
    • PDASeizure is a comprehensive tool that allows PDA (PocketPC, PalmOS and Blackberry!) data to be acquired, viewed, and reported.
    • File Date Time Extractor
    • MailNavigator allows to read multiple Mailbox file formats
    • Protected Storage Explorer is a freeware utility which allows you to view the protected storage in Windows 2000, Windows XP and Windows 2003 in an ‘explorer style’ fashion.
    • CD/DVD Inspector is for forensic analysis, recovery and reporting for forensic and law enforcement use.
    • accuhash for calculating checksumms
    • rda (Remote Data Acquisition utility) is a command line Linux tool to remotely acquire data (like disk cloning or disk/partition imaging) and verify the transfer using md5 and/or crc32 checksums
    • .dat-viewer for analyzing Kazaa Traces
    • DataLifter contains 10 tools to assist with Computer Forensics, Information Auditing, Information Security and Data Recovery.
    • Sterilize sterilizes the media to be used for working / examination copies.
    • TestDisk: Tool to check and undelete partition
    • X-Ways Forensics. Must have tool if you rely on windows
    • Ext2IFS mounting ext2 and ext3 volumes under windows r/w
    • pmdump.exe is a tool that dumps memory for a specified process to a file (as opposed to tools like memdump and dd which dump all of the RAM at once). It is useful for analysing things that might store hidden information in memory (for example, Bots, Trojan horses or VPN clients, email clients, and instant-messaging applications).
    • UndeleteSMS if you have to undelete Short Text Messages (SMS) from SIM cards
    • Web Historian assists users in reviewing websites (URLs) that are stored in the history files of the most commonly used browsers.
    • misc Computer Forensics Software for Criminal Investigators and Consumers from Robware.com
    • CDRoller is a powerful toolset for CD/DVD data recovery.
    • SilentRunners checks a windows system for trojans and other malicous software
    • Paraben Forensics cell phone and SIM card investigation toolbox
    • Windows Forensics and Incident Recovery: The First Responder Utility (FRU)
    • Windows Forensic Toolchest (WFT)
    • tcpxtract is a tool for extracting files from network traffic based on file signatures.
    • Mount Image Pro is a tool for Computer Forensics investigations. It enables the mounting of EnCase, Unix DD or SMART forensic images as a drive letter on your Windows.
    • Scalpel is a fast file carver that reads a database of header and footer definitions and extracts matching files from a set of image files or raw device files.
    • Unmask is a demonstration of how to fingerprint users based only on their emails or IRC postings.
    • ptfinder.pl from Andreas Schuster is a Perl script that parses through a dump of Windows physical memory searching for the different structures
    • Memory forensics tools from trapkit.de: Process Dumper allows you to make a dump of a running process and Memory Parser can be used to analyse process dumps made with pd.
    • Live View is a graphical forensics tool that creates a VMware virtual machine out of a raw (dd-style) disk image or physical disk.
    • MacForensicsLab is a complete suite of forensics and analysis tools.
    • TULP2G is a free program helps to examine cell phones and SIM cards.
    • Volatools enables one to analyze memory dumps in raw (or dd) format for performing digital investigations on volatile memory images.
    • Forensic software for MS Exchange from Innovative Technology Concepts, Inc.
    • Vinetto is a forensics tool to examine Thumbs.db files.
    • During a forensic examination, you may need to decode a date or verify the date provided to you by forensic software. This tool decode the various date/time values found embedded within binary and other file types.
    • F-Response helps you to access remote hard drives.
    • Xplico extracts from an internet traffic capture the applications data (standard protocols, VOIP and IPv6).
  • The Honeynet Project To learn the tools, tactics, and motives of the blackhat community, and share those lessons learned.
  • Intrusion Detection Systems

    some IDS tools

  • Windows NT Intruder Detection Checklist from CERT/CC
  • Intrusion Detection Level Analysis of Nmap and Queso Article in LinuxSecurity/SecurityFocus
  • Dshield.org Distributed Intrusion Detection System
  • doshelp.com Intrusion & attack reporting center
  • Virtual Burglar Alarm – Intrusion Detection Systems
  • 50 Ways to Defeat Your Intrusion Detection System
  • IDSWakeup is a false positive alarm generator for network based IDS
  • Honeyd is a small daemon that creates virtual hosts on a network
  • The “Know Your Enemy” Series from the honeynet project: I II III
  • Justifying the Expense of IDS
  • Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics
  • Honeypots: Tracking Hackers
  • line

    p5rn7vb
    Bookmark and Share

    Tags:

    Last Update: Thursday, 22 May 2008 16:23 | 94,453 Views