PTK Forensics. Dario Forte, Founder and Ceo DFLabs. The Sleuth Kit and Open Source Digital Forensics Conference
|
|
|
- Ralph Carter
- 9 years ago
- Views:
Transcription
1 PTK Forensics Dario Forte, Founder and Ceo DFLabs The Sleuth Kit and Open Source Digital Forensics Conference
2 What PTK is about PTK forensics is a computer forensic framework based on command line tools in the SleuthKit to which many new software modules were added. Its mission is: Making open source forensic tools more usable and merging the opensource/free/and commercial tools in an effective way Thanks to this approach, users can investigate a system much easier, without spending a big budget Born as a free interface in order to improve the features already present in Autopsy Forensic Browser (the former TSK interface), PTK Forensic is now much more. Thus, in addition to providing the features present in the 'Autopsy Forensic Browser' it now implements numerous new essential forensic features. PTK forensics is more than just a new graphic and highly professional interface based on Ajax and other advanced technologies; it offers many features such as analysis, search and management of complex digital investigation cases. PTK Forensics is available in two versions: PTK Forensics free basic edition PTK Forensics full version. Page 2
3 PTK History The first PTK Forensics version was released in May 2008 (and presented at the DoD Cybercrime Conference in Jan 08). Thanks to Sourceforge.net and the continuous interest in this project, we have already registered downloads not to mention external mirrors. Access to the official website is increasing constantly (more than visits so far). We presented the project at the DoD, DHS, Europol, interpol, NATO and it had a huge success. Page 3
4 PTK Forensics: reference Given the success registered, the project was included in the SIFT (Sans Investigative Forensic Toolkit) at its second major release. Malware Forensics: Investigating and Analyzing Malicious Code, By Cameron H. Malin, Eoghan Casey, James M. Aquilina SIFT Workstation 2.0: SANS Investigative Forensic Toolkit, By Russ McRee Page 4
5 Where we Are: Free Vs Full Strategy: having a free version for basic purposes and full version with many enhancements and features. Method: having 5 types of advanced features in the Full version rather than the free version. The full version is continuously updated, so when a new one is added, the oldest one is added to the free version, excepting the new indexing engine. Results: the full version will finance the development of the free version Free version users will have their software up to date. The community will hopefully work on the free version, improving what has been shifted down from the full one. Page 5
6 PTK Forensics comparison Features PTK Forensics Free PTK Forensics Full Dedicated Technical Support - X Evidence management X X User management X X Evidence integrity control X X Indexing type base advanced Indexing timeline X X Indexing MD5, SHA1 X X Filetype indexing X X Indexing keyword search X X Job advanced management - X Filter management based on file type or timestamp Recursive visualization X X Hex value interpreter - X Tabular timeline X X X X Page 6
7 PTK Forensics comparison Features PTK Forensics Free PTK Forensics Full Gallery section X X Image details section X X Data unit section X X Bookmark management X X Report section X (with limitation) X Datacarving section (zero-storage) - X Adding header and footer custom - X Hashset section (know good/bad) - X Plug-in section - X Graphical timeline X X Filter management based on macb time Keyword search section X X Regular expression search X X Pre-indexing Folder optimization - X X X Page 7
8 Although it is FREE PTK Forensics uses a centralized database for case management; thus, more investigators can work simultaneously on the same case from different computers. With the Indexing Engine the administrator can perform preliminary operations and this result can be used by every investigator associated with a case: Timeline generation File categoryzation MD5, SHA1 Keyword indexing Page 8
9 Advanced Tabular Timeline (free version) Why are timeline analysis/file timestamps so important? It can be used by an investigator to gain insight of what happened and the people involved: who was logged when event x happened? It can be used to identify anomalies: how come we had 1000 failed logins after working hours? It can be used to reconstruct the sequence of events Page 9
10 Advanced Graphic Timeline (free version) This is a graphic that shows the trend of each type of action (among the three of the MAC time), distributed over the entire period or over the selected time interval. Provides a useful instrument in order to visualize peaks of access/modification/creation to files. Investigators can apply filters (i.e. show only modified event, accessed event or created event). Page 10
11 2009/10 New Features: Data Carving (currently full version only, will be the first to scale to the free version by the end of Q3) PTK Forensics uses the technique called zero storage ; The tool uses Scalpel, which originally export on file system every file identified during the data carving phase, using the p switch so just a reference is stored, without allocating new disk space. This modality enables users to run the data carving process without having to allocate the physical space on the disk; saving instead, for every recognized file, its own reference inside the disk (start sector and offset); Page 11
12 2009/10 New Features: Data Carving (currently full version only) Predefined file signature Customized file signature Page 12
13 2009/10 New Features:Data Carving example (currently full version only) At the end of the process, the investigator can choose to export only those files which are of major interest. It is automatically integrated with the PTK Forensics (File analysis). Page 13
14 2009/10 New Features: Plug-in system (currently full version only) Why is the plug-in system so important? Every investigator can extend PTK Forensics' features according to his needs The output of a single plug-in can be exported and saved as bookmark for further analyses; Page 14
15 2009/10 New Features: Plug-in system example (currently full version only) Currently PTK forensics supports the plug-in for the registry analysis (RegRipper) and also the windows artifact analysis; Page 15
16 2009/10 New Features: Plug-in system example (currently full version only) The PTK Forensics development team tested and validated several plug-ins in order to increase PTK capabilities: Volatility Framework (already included also in the free version); Pasco; Rifiuti; Galleta. Users are required to decide which plug-in must be included Page 16
17 2009/10 New Features: Hashset (currently full version only) Why is the hashset so important? The hashset analysis can be used, for example, in cases of copyright infringement where the aim of the investigation is to identify possible projects that two companies may have in common (and one has been stolen) In order to hide files that are not relevant to the investigation (i.e. Operating system files or well-known program files) Users can create their own hash sets and or include external ones Page 17
18 2009/10 New Features: Hashset (currently full version only) It is possible to create, for example, three different hash sets (such as INFECTED, SYSTEM, STOLEN ) giving each of them a name, description, a particular colour, and manually inserting the entries with the hashes to search inside the evidence. Page 18
19 2009/10 New Features: Hashset example (currently full version only) Page 19
20 2009/10 New Features: Data Interpreter (currently full version only, via Php PTK Implementation) Why is the data interpreter so important? Computer forensic tools are used to parse and interprete data correctly. Data can be found in different formats: Size 8-BIT INTEGER (SIGNED AND UNSIGNED) 16-BIT INTEGER (SIGNED AND UNSIGNED) 32-BIT INTEGER (SIGNED AND UNSIGNED) 64-BIT INTEGER (SIGNED AND UNSIGNED) FLOAT REAL DOUBLE Value BINARY DIGITS WINDOWS TIMESTAMP DATE DOS TIMESTAMP DOS UNIX DATE Page 20
21 2009/10 New Features: Data Interpreter (currently full version only) It s available in data analysis tab and converts on the fly data in HEX to common type format. The implementation is made via PTK own source code. INFO2 file analysis Page 21
22 2009/10 New Features: Job Manager (currently full version only) In order to improve and make PTK Forensics easier to use we have inserted the first version of PTK Forensics Job Manager. Why is the PTK Forensics Job Manager so important? It allows to insert the concept thread like (cannot be called multithreading because PHP structure do not permit it); However, during the indexing activity, user can still work on the evidence- It allows to monitor the status of import and indexing operations in real time. Page 22
23 2009/10 New Features: Job Manager (currently full version only) Now it is possible to start working while indexing tasks are running. INVESTIGATOR Import hashkeeper START INDEXING Indexing operations PTK Script ANALYSIS JOB MANAGER INDEXING FINISHED INTERFACE *Features in Roadmap Page 23
24 Current Status: Indexing engine, main features String extraction (Ascii&Unicode) from the space: Allocated; Un allocated. Slack (NTFS and FAT) ; Identification of the know(n) good and the know(n) bad (Hashset libraries); (Full version only) File Signature analysis; File categorization (graphics, documents, executables, etc.) ; Metadata and hash generation of the files present on the evidence; Timeline generation; Data carving, zero-storage technique; (Full Version only) The results of the preliminary operations are stored into the database for a better and faster interrogation/inquiry. Page 24
25 Indexing engine, First Version (2008) First engine (Sequential approach, based upon several icat instances) String Extraction, Timeline generation, Hash of all files, Categorization and Keyword search; file info md5 sha1 keyword filetype timeline MySQL MySQL MySQL MySQL MySQL MySQL Page 25
26 Indexing engine 1.0 (First Stable Version 2009) Thread engine Besides previous operations, Data Carving was also inserted; Optimized use of the icat command: the icat output is used to generate in one shot Md5, SHA1 and Keyword list. Reduced number of queries towards MySQL file info md5 sha1 keyword file type timeline MySQL Page 26
27 New indexing engine, v2.0 TSK API Based Engine API: allow the interface with evidence without using external tools such as TSK Performance increase; file info md5 sha1 filetype keyword timeline MySQL Page 27
28 Indexing engine: benchmark PTK Engine v. 1.0 Indexing options: File info; File type flag*; MD5, SHA1. PTK Engine v. 2.0 Indexing options: File info; File type flag*; MD5, SHA1. FTK 1.81 Indexing options: File info; File type flag*; MD5, SHA1. *The benchmark were carried out on the following evidence: 1,2 Gb (raw) Filesystem: Ext2 46 Gb (E01) Filesystem: NTFS HW TECHNICAL SPECIFICATIONS - Processor Quad Core Xeon X3323, 2.5GHz, - 4GB DDR2 667MHz Memory *We estimated both situations: enabling and disabling the file type flag for both products; The file type option allows file categorization based on type (Documents, Graphics, Audio, etc.) Page 28
29 Hours Minutes PTK Engine v1.0 Vs PTK Engine v PTK Engine v PTK Engine v ,2 Gb (no filetype) 1,2 Gb (filetype) 46 Gb (no filetype) Computation in hours 46 Gb (filetype) The performance increase was possible thanks to inserting the API of TSK. The timetable indicated include the analysis and the insertion in the respective database. 0 1,2Gb (no filetype) 1,2Gb (filetype) 46Gb (no filetype) Computation in minutes 46Gb (filetype) Page 29
30 PTK Engine v1.0 Vs PTK Engine v2.0 Benchmark table: Evidence PTK Engine v1.0 PTK Engine v Gb (no filetype) 6 minutes 6 seconds 12 Gb (filetype) 9 minutes 1 minutes 1seconds 46 Gb (no filetype) 6 hours 4 minutes 14 minutes 8 seconds 46 Gb (filetype) 10 hours 3 minutes 20 minutes 34 seconds Page 30
31 Minutes PTK Engine v2.0 Vs FTK ,2Gb (senza filetype) 1,2Gb (con filetype) 46Gb (senza filetype) 46Gb (con filetype) PTK Engine v2.0 FTK 1.81 The timetable indicated include the analysis and the insertion in the respective database. FTK 2.x and 3.x being tested. Page 31
32 Integrating PTK with external tools: IncMan Suite DFLabs Incman Suite, is an incident tracking software that enables the management of every kind of information security incidents. Incident Management Software supports the entire incident management process from security to fraud, including digital forensics, case management, evidence and incident tracking. IncMan, Incident Management Suite, supports all certification and accreditation processes required by sections 3505 and 3544 of the Federal Information Security Management Act (FISMA), as well as the ability to report and manage incidents associated with government facilities and systems. More than 100 enterprise customers worldwide, including the DIM Module. Page 32
33 PTK Forensics with IncMan Suite IncMan Suite allows the complete integration with PTK Forensics. It is thus possible to include the analysis report among the information regarding the host. There is also a module, called DIM, which allows investigators to track their digital evidences and manage their forensic cases. PTK INVESTIGATOR INCMAN INVESTIGATOR START ANALYSIS CREATE CASE GENERATE REPORTS (PDF, XML) FILL IN HOST INFORMATION LINK PTK REPORT (IODEF) Page 33
34 PTK Forensics with IncMan Suite In the final incident report it is possible to include the bookmarks saved by each investigator. PTK INVESTIGATOR INCMAN INVESTIGATOR START ANALYSIS CREATE CASE GENERATE BOOKMARKS FILL IN INCIDENT INFORMATION LINK PTK BOOKMARKS Page 34
35 Where will be: 12months Further steps PTK Forensics roadmap: Background processing: improve the job management system. Recursive export: enable the recursive support of a folder or of several files; (Free version) Report form: allow the dynamic generation and custom report. Integration with DIM Incman Suite - Metadata extraction: file office, pdf, exif: add further information in the file analysis section. PTK Script: allow plug-in in order to automatically extract information from the evidence. Timeline Filter: improve the graphic representation with the possibility to apply complex filters. Mail Archive Analysis: allow the analysis of the best known formats through a dedicated section and a user-friendly interface. More external tools integration both opensource and commercial Page 35
36 Conclusions PTK Forensic is the demonstration that OpenSource, Free and Commercial Sofwtare can co-exist We will be happy to cooperate with both communities to continue to build a computer forensic framework based upon open source and commercial software, able to valorize both sides of the industry This will give to the community chance to approach forensics with lower budgets. In fact: Free version will constitute the basic level for starting to work with Digital forensics and will be kept updated thanks to the FIFO Shifting Paradigm Full version will give an advanced framework at very competitive price Page 36
37 Thanks! Page 37
38 Internet: Placeholder, enter your own text here Youtube: youtube.com/dflabs Page 38
Digital Forensic Techniques
Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics
CHAD TILBURY. [email protected]. http://forensicmethods.com @chadtilbury
CHAD TILBURY [email protected] 0 Former: Special Agent with US Air Force Office of Special Investigations 0 Current: Incident Response and Computer Forensics Consultant 0 Over 12 years in the trenches
Digital Forensics. Module 4 CS 996
Digital Forensics Module 4 CS 996 Hard Drive Forensics Acquisition Bit for bit copy Write protect the evidence media EnCase for DOS Safeback (NTI: www.forensics-intl.com) Analysis EnCase FTK (www.accessdata.com)
Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012
Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used
Where is computer forensics used?
What is computer forensics? The preservation, recovery, analysis and reporting of digital artifacts including information stored on computers, storage media (such as a hard disk or CD-ROM), an electronic
Advanced Registry Forensics with Registry Decoder. Dr. Vico Marziale Sleuth Kit and Open Source Digital Forensics Conference 2012 10/03/2012
Advanced Registry Forensics with Registry Decoder Dr. Vico Marziale Sleuth Kit and Open Source Digital Forensics Conference 2012 10/03/2012 Who am I? Senior Security Researcher @ DFS Published Researcher
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE Vahidin Đaltur, Kemal Hajdarević, Internacional Burch University, Faculty of Information Technlogy 71000 Sarajevo, Bosnia
ACE STUDY GUIDE. 3. Which Imager pane shows information specific to file systems such as HFS+, NTFS, and Ext2? - Properties Pane
ACE STUDY GUIDE *Note* All of the actual exam questions are in multiple choice format. This Study Guide is designed to cover all of the material on the exam, 1. FTK Imager supports the encryption of forensic
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE Jesús Alexander García Luis Alejandro Franco Juan David Urrea Carlos Alfonso Torres Manuel Fernando Gutiérrez UPB 2012 Content INTRODUCTION... 3 OBJECTIVE 4 EVIDENCE
EnCase 7 - Basic + Intermediate Topics
EnCase 7 - Basic + Intermediate Topics Course Objectives This 4 day class is designed to familiarize the student with the many artifacts left behind on Windows based media and how to conduct a forensic
Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)
s Unix Definition of : Computer Coherent application of a methodical investigatory techniques to solve crime cases. Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM) s Unix
State of the art of Digital Forensic Techniques
State of the art of Digital Forensic Techniques Enos K. Mabuto 1, H. S Venter 2 Department of Computer Science University of Pretoria, Pretoria, 0002, South Africa Tel: +27 12 420 3654 Email: [email protected]
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
A Day in the Life of a Cyber Tool Developer
A Day in the Life of a Cyber Tool Developer by Jonathan Tomczak [email protected] Jonathan Tomczak ( Front Man ) Software Engineer w/ over 7 years experience working in software and web development Dave
Redline Users Guide. Version 1.12
Redline Users Guide Version 1.12 Contents Contents 1 About Redline 5 Timeline 5 Malware Risk Index (MRI) Score 5 Indicators of Compromise (IOCs) 5 Whitelists 5 Installation 6 System Requirements 6 Install
FreeForm Designer. Phone: +972-9-8309999 Fax: +972-9-8309998 POB 8792, Natanya, 42505 Israel www.autofont.com. Document2
FreeForm Designer FreeForm Designer enables designing smart forms based on industry-standard MS Word editing features. FreeForm Designer does not require any knowledge of or training in programming languages
FORENSIC ANALYSIS Aleš Padrta
FORENSIC ANALYSIS Aleš Padrta CESNET, CESNET-CERTS, FLAB CESNET Czech NREN operator CESNET-CERTS 2004 Established 2008 Accredited CSIRT FLAB Forensic LABoratory Established 6/2011 Support team for CESNET-CERTS
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers Brian Carrier Research Scientist @stake Abstract This paper uses the theory of abstraction layers to describe the purpose
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
Forensic Acquisition and Analysis of VMware Virtual Hard Disks
Forensic Acquisition and Analysis of VMware Virtual Hard Disks Manish Hirwani, Yin Pan, Bill Stackpole and Daryl Johnson Networking, Security and Systems Administration Rochester Institute of Technology
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
The following features have been added to FTK with this release:
FTK 2.0.2 Readme The following sections present information on the new features, resolved issues, and known issues with the FTK 2.0.2 release. NEW FEATURES The following features have been added to FTK
VX Search File Search Solution. VX Search FILE SEARCH SOLUTION. User Manual. Version 8.2. Jan 2016. www.vxsearch.com [email protected]. Flexense Ltd.
VX Search FILE SEARCH SOLUTION User Manual Version 8.2 Jan 2016 www.vxsearch.com [email protected] 1 1 Product Overview...4 2 VX Search Product Versions...8 3 Using Desktop Product Versions...9 3.1 Product
Digital forensic techniques for static analysis of NTFS images
Digital forensic techniques for static analysis of NTFS images Mamoun Alazab Internet Commerce Security Laboratory University of Ballarat, Australia [email protected] Sitalakshmi Venkatraman Internet
Paraben s P2C 4.1. Release Notes
Paraben s P2C 4.1 Release Notes Welcome to Paraben s P2C 4.1! Paraben's P2C is a comprehensive digital forensic analysis tool designed to handle more data, more efficiently while keeping to Paraben's P2
Computer Forensics. Securing and Analysing Digital Information
Computer Forensics Securing and Analysing Digital Information Aims What is a computer? Where is the evidence? Why is digital forensics important? Seizing evidence Encryption Hidden files and folders Live
EnCase v7 Essential Training. Sherif Eldeeb https://eldeeb.net
هللامسب EnCase v7 Essential Training What s in this course Explore the most notable features of the new version. Everything you need to know about EnCase v7 to conduct basic investigations. Create Cases
PRODISC VER. Computer Forensics Family. User Manual. Version 4.8 9/06
PRODISC VER Computer Forensics Family User Manual Version 4.8 9/06 Copyright 2003-2006 Technology Pathways, LLC. All rights reserved. This manual, as well as the software described in it, are furnished
Design and Implementation of a Live-analysis Digital Forensic System
Design and Implementation of a Live-analysis Digital Forensic System Pei-Hua Yen Graduate Institute of Information and Computer Education, National Kaohsiung Normal University, Taiwan [email protected]
Computer Forensic Capabilities
Computer Forensic Capabilities Agenda What is computer forensics? Where to find computer evidence Forensic imaging Forensic analysis What is Computer Forensics? The preservation, identification, extraction,
Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/01. 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.
Frequently Asked Questions Secure Log Manager Last Update: 6/25/01 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 1. What is Secure Log Manager? Secure Log Manager (SLM) is designed
User Manual. Published: 12-Mar-15 at 09:36:51
User Manual Published: 12-Mar-15 at 09:36:51 Chapter Contents Published: 12-Mar-15 at 09:36:48 Chapter 1 - Introduction... 11 1.1 Introducing Forensic Explorer... 12 1.2 Supported file formats... 12 1.3
EFFECTIVE DIGITAL FORENSIC ANALYSIS OF THE NTFS DISK IMAGE
EFFECTIVE DIGITAL FORENSIC ANALYSIS OF THE NTFS DISK IMAGE Mamoun Alazab, Sitalakshmi Venkatraman, Paul Watters University of Ballarat, Australia {m.alazab, s.venkatraman, p.watters} @ballarat.edu.au ABSTRACT
COMPREHENSIVE STUDY OF DIGITAL FORENSICS
COMPREHENSIVE STUDY OF DIGITAL FORENSICS Jatinder kaur, Gurpal Singh SMCA, Thapar University, Patiala-147004, India [email protected], [email protected] Abstract This paper presenting the review
LICENSE4J LICENSE MANAGER USER GUIDE
LICENSE4J LICENSE MANAGER USER GUIDE VERSION 4.5.5 LICENSE4J www.license4j.com Table of Contents Getting Started... 4 Managing Products... 6 Create Product... 6 Edit Product... 7 Refresh, Delete Product...
Determining VHD s in Windows 7 Dustin Hurlbut
Introduction Windows 7 has the ability to create and mount virtual machines based upon launching a single file. The Virtual Hard Disk (VHD) format permits creation of virtual drives that can be used for
Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results
Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results Physical Extraction Physical extraction involves either Removing chips from circuit board
Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform
Int'l Conf. Security and Management SAM'15 3 Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform R. Malik 1, N. Shashidhar 1, and L. Chen 2 1 Department of Computer Science,
Legal Notices. AccessData Corp.
Legal Notices AccessData Corp. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability
Chapter 24: Creating Reports and Extracting Data
Chapter 24: Creating Reports and Extracting Data SEER*DMS includes an integrated reporting and extract module to create pre-defined system reports and extracts. Ad hoc listings and extracts can be generated
W3Perl A free logfile analyzer
W3Perl A free logfile analyzer Features Works on Unix / Windows / Mac View last entries based on Perl scripts Web / FTP / Squid / Email servers Session tracking Others log format can be added easily Detailed
2013 Open Source Digital Forensics Conference
4 TH ANNUAL OSDF 2013 Open Source Digital Forensics Conference Doing More with Less Willi Ballenthin Consultant MANDIANT Introduc4on: Willi Ballenthin Professionally Incident response Malware analysis
Forensically Determining the Presence and Use of Virtual Machines in Windows 7
Forensically Determining the Presence and Use of Virtual Machines in Windows 7 Introduction Dustin Hurlbut Windows 7 has the ability to create and mount virtual machines based upon launching a single file.
Getting Started With LP360
Getting Started With LP360 10/30/2014 1 Contents What is LP360?... 3 System Requirements... 3 Installing LP360... 4 How to Enable the LP360 Extension... 4 How to Display the LP360 Toolbar... 4 How to Import
Social Network Website to Monitor Behavior Change Design Document
Social Network Website to Monitor Behavior Change Design Document Client: Yolanda Coil Advisor: Simanta Mitra Team #11: Gavin Monroe Nicholas Schramm Davendra Jayasingam Table of Contents PROJECT TEAM
Lukas Limacher Department of Computer Science, ETH. Computer Forensics. September 25, 2014
Lukas Limacher Department of Computer Science, ETH Zürich Computer Forensics September 25, 2014 Contents 9 Computer Forensics 1 91 Objectives 1 92 Introduction 2 921 Incident Response 2 922 Computer Forensics
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
FileMaker Pro and Microsoft Office Integration
FileMaker Pro and Microsoft Office Integration page Table of Contents Executive Summary...3 Introduction...3 Top Reasons to Read This Guide...3 Before You Get Started...4 Downloading the FileMaker Trial
CallRecorder User Guide
CallRecorder User Guide 6.1 Copyright 2005-2011 RAI Software SRL, Bucharest, Romania www.raisoftware.ro Table of Contents 1.INTRODUCTION...4 1.1.PRODUCT OVERVIEW...4 1.2.FEATURES AND BENEFITS...4 2.APPLICATION
TIBCO Spotfire Automation Services 6.5. User s Manual
TIBCO Spotfire Automation Services 6.5 User s Manual Revision date: 17 April 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
Detection of Data Hiding in Computer Forensics. About Your Presenter
Detection of Data Hiding in Computer Forensics NEbraskaCERT Conference August 22nd, 2008 James E. Martin CISSP, JD About Your Presenter 2008-Present: Security Engineer, West Corporation 2004-2008: Senior
Forensic Analysis of Internet Explorer Activity Files
Forensic Analysis of Internet Explorer Activity Files by Keith J. Jones [email protected] 3/19/03 Table of Contents 1. Introduction 4 2. The Index.dat File Header 6 3. The HASH Table 10 4. The
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
Is the Open Way a Better Way? Digital Forensics using Open Source Tools
Is the Open Way a Better Way? Digital Forensics using Open Source Tools Dan Manson, Anna Carlin, Steve Ramos, Alain Gyger, Matthew Kaufman, Jeremy Treichelt California State Polytechnic University Computer
Using Open Source Digital Forensics Software for Digital Archives Workshop
Using Open Source Digital Forensics Software for Digital Archives Workshop Mark A. Matienzo 04 Manuscripts and Archives, Yale University Library Society of American Archivists University of Michigan School
Impact of Digital Forensics Training on Computer Incident Response Techniques
Impact of Digital Forensics Training on Computer Incident Response Techniques Valorie J. King, PhD Collegiate Associate Professor University of Maryland University College Presentation to AFCEA June 25,
Lab III: Unix File Recovery Data Unit Level
New Mexico Tech Digital Forensics Fall 2006 Lab III: Unix File Recovery Data Unit Level Objectives - Review of unallocated space and extracting with dls - Interpret the file system information from the
TSM Studio Server User Guide 2.9.0.0
TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio
Sage CRM Technical Specification
Sage CRM Technical Specification Client Software This document outlines the recommended minimum software and hardware requirements for running Sage CRM. Please note that while the document refers to Sage
A Study of Forensic & Analysis Tools
A Study of Forensic & Analysis Tools Sriram Raghavan Secure Cyber Space (www.securecyberspace.org) Email: [email protected] Abstract There are a wide range of forensic and analysis tools
TZWorks Windows Event Log Viewer (evtx_view) Users Guide
TZWorks Windows Event Log Viewer (evtx_view) Users Guide Abstract evtx_view is a standalone, GUI tool used to extract and parse Event Logs and display their internals. The tool allows one to export all
Recovering and Analyzing Deleted Registry Files
Recovering and Analyzing Deleted Registry Files Andrew Case Digital Forensics Solutions [email protected] / @attrc I had a case recently where I was asked to investigate any signs of data exfiltration
Redline User Guide. Release 1.14
Redline User Guide Release 1.14 FireEye and the FireEye logo are registered trademarks of FireEye, Inc. in the United States and other countries. All other trademarks are the property of their respective
SimbaEngine SDK 9.4. Build a C++ ODBC Driver for SQL-Based Data Sources in 5 Days. Last Revised: October 2014. Simba Technologies Inc.
Build a C++ ODBC Driver for SQL-Based Data Sources in 5 Days Last Revised: October 2014 Simba Technologies Inc. Copyright 2014 Simba Technologies Inc. All Rights Reserved. Information in this document
Digital Forensic Tool for Decision Making in Computer Security Domain
Digital Forensic Tool for Decision Making in Computer Security Domain S. K. Khode 1,V. N. Pahune 2 and M. R. Sayankar 3 1, 2, 3 Computer Engineering Department of Bapurao Deshmukh College of Engineering,
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 4 Current Computer Forensics Tools Objectives Understand how to identify needs for computer forensics tools Evaluate the requirements
4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access
4.1 Introduction The operating system (OS) controls almost all functions on a computer. In this lecture, you will learn about the components, functions, and terminology related to the Windows 2000, Windows
Digital Forensics with Open Source Tools
Digital Forensics with Open Source Tools Cory Altheide Harlan Carvey Technical Editor Ray Davidson AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO
Automating the Computer Forensic Triage Process With MantaRay
Automating the Computer Forensic Triage Process With MantaRay Senior Computer Forensic Analysts Doug Koster & Kevin Murphy Worlds best Summer Intern Chapin Bryce GMU RCFG Conference August 2013 1 MantaRay
Dream Report vs MS SQL Reporting. 10 Key Advantages for Dream Report
Dream Report vs MS SQL Reporting 10 Key Advantages for Dream Report Page 2 of 15 Table of Contents INTRODUCTION 3 PROFESSIONAL SOFTWARE FOR NON-PROGRAMMING USERS 4 CONSIDERABLE DIFFERENCE IN ENGINEERING
How to use PDFlib products with PHP
How to use PDFlib products with PHP Last change: July 13, 2011 Latest PDFlib version covered in this document: 8.0.3 Latest version of this document available at: www.pdflib.com/developer/technical-documentation
SNMP Test er Manual 2015 Paessler AG
SNMP Test er Manual 2015 Paessler AG All rights reserved. No parts of this work may be reproduced in any form or by any means graphic, electronic, or mechanical, including photocopying, recording, taping,
An automated timeline reconstruction approach for digital forensic investigations Christopher Hargreaves and Jonathan Patterson, DFRWS 2012
An automated timeline reconstruction approach for digital forensic investigations Christopher Hargreaves and Jonathan Patterson, DFRWS 2012 Original presentation at DFRWS: http://www.dfrws.org/2012/proceedings/dfrws2012-p8.pdf
The Need for PDF Search... 3. Search and Index Overview... 3. IFilter Architecture... 4. Performance and Scalability Are Essential...
1 Contents The Need for PDF Search... 3 Search and Index Overview... 3 IFilter Architecture... 4 Performance and Scalability Are Essential... 6 Search for PDF Documents with the Fastest PDF IFilter on
Sophos for Microsoft SharePoint Help. Product version: 2.0
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2
Practice Exercise March 7, 2016
DIGITAL FORENSICS Practice Exercise March 7, 2016 Prepared by Leidos CyberPatriot Forensics Challenge 1 Forensics Instruction Guide Introduction The goal of this event is to learn to identify key factors
Monitoring Replication
Monitoring Replication Article 1130112-02 Contents Summary... 3 Monitor Replicator Page... 3 Summary... 3 Status... 3 System Health... 4 Replicator Configuration... 5 Replicator Health... 6 Local Package
Computer forensic timeline visualization tool
available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin Computer forensic timeline visualization tool Jens Olsson*, Martin Boldt Blekinge Institute of Technology, School of Computing,
Open Source Digital Forensics Tools
The Legal Argument 1 [email protected] Abstract This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a
WildFire Features. Palo Alto Networks. PAN-OS New Features Guide Version 6.1. Copyright 2007-2015 Palo Alto Networks
WildFire Features Palo Alto Networks PAN-OS New Features Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
Getting started with Mendeley. Guide by ITC library
Getting started with Mendeley Guide by ITC library January 2015 Table of Contents 1 Mendeley in not even 10 steps... 3 1.1 Go to www.mendeley.com and register... 3 1.2 Download Mendeley desktop... 3 1.3
Fuzzy Hashing for Digital Forensic Investigators Dustin Hurlbut - AccessData January 9, 2009
Fuzzy Hashing for Digital Forensic Investigators Dustin Hurlbut - AccessData January 9, 2009 Abstract Fuzzy hashing allows the investigator to focus on potentially incriminating documents that may not
Introduction to The Sleuth Kit (TSK) By Chris Marko. Rev1 September, 2005. Introduction to The Sleuth Kit (TSK) 1
Introduction to The Sleuth Kit (TSK) By Chris Marko Rev1 September, 2005 Introduction to The Sleuth Kit (TSK) 1 This paper provides an introduction to The Sleuth Kit (referred to as TSK herein), from Brian
Sophos Endpoint Security and Control How to deploy through Citrix Receiver 2.0
Sophos Endpoint Security and Control How to deploy through Citrix Receiver 2.0 Product version: 9.5 Document date: November 2010 Contents 1 About this guide...3 2 Overview...4 3 System requirements...5
ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT
ITU Session Four: Device Imaging And Analysis Mounir Kamal Q-CERT 2 Applying Forensic Science to Computer Systems Like a Detective, the archaeologist searches for clues in order to discover and reconstruct
Sophos for Microsoft SharePoint Help
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28
Symantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
Datzilla. Error Reporting and Tracking for NOAA Data
Datzilla Error Reporting and Tracking for NOAA Data Overview Datzilla is a web based system used to report and track errors in NOAA datasets and Data Products. It is an adaptation of the software bug tracking
Computer Forensics using Open Source Tools
Computer Forensics using Open Source Tools COMP 5350/6350 Digital Forensics Professor: Dr. Anthony Skjellum TA: Ananya Ravipati Presenter: Rodrigo Sardinas Overview Use case explanation Useful Linux Commands
RECOVERING FROM SHAMOON
Executive Summary Fidelis Threat Advisory #1007 RECOVERING FROM SHAMOON November 1, 2012 Document Status: FINAL Last Revised: 2012-11-01 The Shamoon malware has received considerable coverage in the past
Xtreeme Search Engine Studio Help. 2007 Xtreeme
Xtreeme Search Engine Studio Help 2007 Xtreeme I Search Engine Studio Help Table of Contents Part I Introduction 2 Part II Requirements 4 Part III Features 7 Part IV Quick Start Tutorials 9 1 Steps to
Kentico CMS 6.0 Performance Test Report. Kentico CMS 6.0. Performance Test Report February 2012 ANOTHER SUBTITLE
Kentico CMS 6. Performance Test Report Kentico CMS 6. Performance Test Report February 212 ANOTHER SUBTITLE 1 Kentico CMS 6. Performance Test Report Table of Contents Disclaimer... 3 Executive Summary...
Analyzing Huge Data Sets in Forensic Investigations
Analyzing Huge Data Sets in Forensic Investigations Kasun De Zoysa Yasantha Hettiarachi Department of Communication and Media Technologies University of Colombo School of Computing Colombo, Sri Lanka Centre
