Beruflich Dokumente
Kultur Dokumente
Forensic Investigator
Module XIV
Computer Forensic Tools
Module Objective
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Module Objective
~ Linux/UNIX tools
~ Multipurpose tools
• Ltools • ByteBack
• Mtools • Maresware
• TCT • BIA Protect Tools
• TCTUTILs • LC-Technology Software
• WinHex specialist editor
~ Password recovery tool
• ProDiscover DFT
• @stake
~ Toolkits
~ Internet History Viewer
• NTI-Tools
~ ASRData
• DataLifter
~ Ftimes
• R-Tools
~ Oxygen phone manager
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Module Flow
Permanent deletion
File Integrity checkers Disk imaging tools
of files
Password recovery
Partition managers Linux/UNIX tools
tools
Toolkits
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Dump Tool: DS2DUMP
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Dump Tool: Chaosreader
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Slack Space & Data Recovery Tools:
Drivespy
~ A Forensic DOS shell
~ Programmed to imitate and expand the potential of DOS for
forensic purposes
~ Uses its own commands included with common DOS
commands
~ This tool can process
•Hard drives with capacity of more than 8.4 GB
•Floppy drives and other removable drives
•FAT12/16/16x/32/32x partitions
•Hidden DOS partitions
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Slack Space & Data Recovery Tools:
Ontrack
~ Retrieves lost, remote or deleted data and entire partitions
~ The user can start, stop or resume the recovery process
~ The user can select an FTP location to copy the recovered
files and folders
~ Allows the user to filter and sort the recovered files
according to date, name, time, status and size
~ It does the following functions for recovering data
• Scans the media for data that is lost or
remote to access
• The user can select copy the recovered files
and folders to another specified location
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Hard Disk Write Protection Tools:
Pdblock
~ PDBlock
•Write protects hard disks on a system and prevents write
requests to particular hard disks on a system
•Has an option to select specific write protected hard drives
•Safeguard any particular drive accessed from the system through
Interrupt 13 or the MS/IBM Interrupt 13 extensions
~ Write-blocker
•Prevents data from being written to a hard disk during
investigations
•Allows ample access to the forensic examiner to download,
examine and investigate the data present in a system
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Hard Disk Write Protection Tools:
Nowrite & Firewire Drivedock
~ NoWrite ~ FireWire DriveDock
• Wiebetech’s DriveDock is
• It is a hardware device a forensic tool for
which does not allow investigators who want to
writing on to the hard swap the hard drive or test
drive it
• It supports drives with • It is compatible with Mac
huge capacity and Windows operating
systems
• Supports Windows, DOS,
Linux and other known • It is the FireWire to IDE
bridge that write protects
operating systems the hard drive
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Permanent Deletion of Files:pdwipe
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Disk Imaging Tools: Image &
Iximager
~ Image
•It is a standalone utility to generate physical replicas of floppy disks
• It generates highly compressed or "flat" images for forensic analysis
•Processing of large numbers of diskettes is supported and
automated by cyclic imaging and restoration processes
~ IXimager
•Captures and analyzes images created from hard drives and other
external storage media
•It is compatible with Windows XP Service Pack 1, Windows 2000
Service Pack 4 and Windows 2003 Server
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Disk Imaging Tools: Snapback
Datarrest
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Partition Managers: PART &
Explore2fs
~ PART
•It displays important information about all the partitions present in
a hard disk
•It performs switching bootable partitions, and hides and unhide
DOS partitions
• It identifies the available partitions and file format for the
disks/drives of a compromised system
~ Explore2fs
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Linux/unix Tools: Ltools and Mtools
~ Ltools
•Accesses Linux files from Windows 9x and Windows NT
•A set of command line tools for reading and writing Linux ReiserFS,
ext2, and ext3 file systems
•Has Java and .NET based GUI, an Explorer-like interface in a Web
browser, providing remote access to file systems
•Used in DOS environment to repair Linux , if the Linux system does
not boot
~ Mtools
•Allows MS-DOS files to be manipulated by Unix systems
•Reads , writes and moves files of MS-DOS file system (floppy disk)
•Floppies can be changed without unmounting and mounting
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Linux/unix Tools: TCT and Tctutils
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Password Recovery Tool: @Stake
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Screenshot of @Stakelc5
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Asrdata
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
SMART Screenshot
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Ftime
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Oxygen Phone Manager
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Oxygen Phone Manager
Main Window
SMS
Manager
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Multipurpose Tools: Byte Back &
Biaprotect
~ ByteBack ~ BIAProtect
• It is a professional data • BIA stands for Business
recovery and computer Intelligence Associates
investigative utility with the • It is an organization indulged in
following functionality the fields of law, computer
– Cloning / Imaging forensics and software
– Automated File Recovery programming
– Rebuild Partitions and • It has various hardware and
Boot Records software (tools) for computer
forensics
– Media Wipe: Overwrites
every sector of a drive
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Multipurpose Tools: Maresware
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Multipurpose Tools: LC Technologies
Software
~ It has following software/tools
• Photorecovery: Designed to recover images, movies,
and sound files from all types of digital media
• File RecoveryPro: Scans and finds lost partitions,
boot sectors and other file system components
• FILExtinguisher: This tools completely removes a
data from disks to avoid passing private/secret
information
• SanDiskRescuePRO: It recovers all kinds of data
from the hard disk
• Data Recovery kit: It allows fast, safe, and reliable
file recovery with Windows environment
• Intelli-SMART: This is a software used for reporting
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Multipurpose Tools: Winhex Specialist
Edition
~ It is a hexadecimal editor, which helps in recovering
data, low-level data processing
~ It is used in the field of computer forensics and IT
security
~ Salient features
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Multipurpose Tools: Prodiscover DFT
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Toolkits: NTI Tools
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Toolkits: R-Tools-I
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Toolkits: R-Tools-II
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Toolkits: Accessdata
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
LC Technology International Hardware
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Screenshot of Forensic Hardware
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Image Masster Solo and Fastbloc
~FastBloc:
• It is a data acquisition software, which connects
through an IDE channel. Does not require SCSI
controller cards or SCSI drivers
• The common IDE write-blocked architecture allows
data from any IDE hard drive to be gathered safely in
Windows OS
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
RMON2 Tracing Tools and
MCI DoStracker
~ RMON2 tracing tools:
•It requires some compatible devices to perform tracing
•Looks for evidence of remote/unrecognized conversations
performed within the victim’s perimeter
•By moving “outwards” a step at a time, the source of the attack
is determined
~MCI DoSTracker:
•Traces source forged packets from the victim’s location to its
source while tracing backwards.
•Deploys access control list in debug mode for victim IP.
•Clears victim subnet cache and looks for forged packets by
comparing to route table.
•Spawns separate process to log into next hop router and continue.
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited
Encase
Copyright © by EC-Council
EC-Council All Rights reserved. Reproduction is strictly prohibited