background preloader

Forensic tools

Facebook Twitter

Top 9 Popular OSINT Facebook Tools. Social networks are indeed a big part of any OSINT investigation.

Top 9 Popular OSINT Facebook Tools

They can reveal useful information about individuals, what they look for, how they do it, what they like and many other personal details. But OSINT Facebook data-gathering doesn’t stop with tools that show you only information about Facebook profiles. Today we’ll show you the best OSINT utilities that not only gather information about Facebook public data but also dig a little bit deeper under the surface — so keep reading. Online investigation tool - IP, DNS, MX, WHOIS and SEO tools. MX Lookup Tool - Check your DNS MX Records online - MxToolbox. MX Record Lookup & SPF Record Check - SXPasswordSuite. Open Source Digital Forensics. Digital Forensics Software. Our Recommended Six Mobile Forensics Tools. 21 Popular Computer Forensics Tools. Computer forensics is a very important branch of computer science in relation to computer and Internet related crimes.

21 Popular Computer Forensics Tools

Earlier, computers were only used to produce data but now it has expanded to all devices related to digital data. The goal of Computer forensics is to perform crime investigations by using evidence from digital data to find who was the responsible for that particular crime. SIFT Kit/Workstation: Investigative Forensic Toolkit Download. SANS Investigative Forensic Toolkit (SIFT) Workstation Version 3.0 Download SIFT Workstation VMware Appliance Now - 1.5 GB Having trouble downloading?

SIFT Kit/Workstation: Investigative Forensic Toolkit Download

If you are having trouble downloading the SIFT Kit please contact and include the URL you were given, your IP address, browser type, and if you are using a proxy of any kind. 10 Data Recovery Tools You Can Download For Free [Windows] It happens to the best of us.

10 Data Recovery Tools You Can Download For Free [Windows]

We are working on that very important file when suddenly disaster strikes. It accidently gets deleted, corrupted, the computer died or a number of unfortunate things that prevent you from gaining access to the file. What’s worse, you don’t have a backup and are in desperate need of those important files urgently. Well, don’t fret as it is possible to recover those deleted files.

When you delete a file, you don’t actually ‘delete’ it. Large List of Free Forensic Software. While I personally have never gotten into forensics due to liability reasons, it has always been something that has interested me.

Large List of Free Forensic Software

Recently, one of our forum members (mm201) posted an amazing resource with a large collection of free forensics tools for Windows, Mac and Linux as well as iOS, Android & Blackberry devices. 20 of the best free tools that will help you conduct a digital forensic investigation. The Sleuth Kit (TSK) & Autopsy: Open Source Digital Forensics Tools. Top 20 Free Digital Forensic Investigation Tools for SysAdmins. Digital forensics tools come in many categories, so the exact choice of tool depends on where and how you want to use it. Here are some broad categories to give you an idea of the variety that comes under the umbrella of digital forensics tools:

Virtual USB Analyzer. File recovery / data carving. So...

file recovery / data carving

Unfortunately, I was not able to recover the volume. I have come to the conclusion that I must have overwritten the data. The method I mentioned proved useful and solid, and I will elaborate on it, in case this happens to someone else. First, as H_TeXMeX_H said, it'd be recommended (tough not strictly necessary, if you don't have enough disk space) to make an image of the lost partition. Code: dd if=/dev/sdX of=/home/user/hdd_image.bin bs=1M Then proceed to get ENT.

File Carving: Recover Data From Hard Drive, USB and CD-ROM. When you erase a file on your computer, it doesn’t just disappear.

File Carving: Recover Data From Hard Drive, USB and CD-ROM

The directory table is updated saying that the space used by the file is now able to be overwritten. But the file is still intact. Data recovery programs exist to “un-erase” these files. The Ethical Hacker Network. Book Review: Digital Forensics with Open Source Tools. With more forensic books hitting the shelves, I find myself prioritizing those by authors I know and trust.

Book Review: Digital Forensics with Open Source Tools

I have worked with Cory Altheide and he is an extremely talented forensic professional with a passion for open source tools. Not surprisingly, I would not categorize this as a beginner book. Open source tools require a higher level of interaction than their commercial counterparts, but are a great way to take your forensic skills to the next level. Forensic Tools. Listings Pyext The ext3 or third extended filesystem is a journaled file system that is commonly used by the Linux kernel.

Forensic Tools

List of digital forensics tools. During the 1980s, most digital forensic investigations consisted of "live analysis", examining digital media directly using non-specialist tools.

List of digital forensics tools

In the 1990s, several freeware and other proprietary tools (both hardware and software) were created to allow investigations to take place without modifying media. Forevid - Forensic video analysis for everyone. 50 Essential Open Source Security Tools - Anti-Everything, Encryption, Secure Delete, Forensics - Roundup. Anti-Everything, Encryption, Secure Delete, Forensics November 11, 2008 By Cynthia Harvey The area of open source security software is growing rapidly, with a cornucopia of apps for every use: anti-spam, firewalls, forensics, encryption, log monitoring, passwords – the list is growing even as you read this. In many cases, these open source security tools – many of which are free – are available for the Windows, Linux and Mac operating systems. Let the downloading begin… 1. Winner of multiple Datamation Product of the Year awards, SpamAssassin uses header and text analysis, Bayesian filtering, DNS blocklists, and collaborative filtering databases to block unwanted e-mail at the server level.

How to Visualize Investigations. In security and investigations, the phrase "A picture is worth a thousand words" usually refers to CCTV footage or some evidence that proves a subject's guilt (or innocence). Unfortunately most corporate investigations rarely even touch upon cases with a lot of visual content, which can become rather large collections of three ring binders. While we all hope to present a smoking gun for our final report, sometimes presenting our case to law enforcement, lawyers, human resources and even our own management without the proper visual can keep even a solid case from closing.

Like children's books full of images deeply expanding short story lines into memorable tales, visualization can be an effective way to quickly and successfully present your investigation on a high level. Below are simple ways to transform even your most complex investigation into a storytelling flowchart. Free Resources for Law Enforcement. These are the most recent notes for my "Free Stuff" presentation. This most recent presentation was from the IACA conference in September 2013. I hope that everyone who came to my presentation can save more than was spent on their conference tuition and expenses. The Prezi to go long with this can be found here: Presentation Notes – Free Resources for Law Enforcement FREE Stuff!

Or… Comparison of Computer Forensics Tools. Netglub. I Need A Relationship Mapping Tool. I was asking for better ways to track PC/NPC relationships in my game on RPG Stack Exchange and Brian brought up the free game Minimus, which is basically an example of social network mapping for an RPG. This reminded me of the person-to-person tracking diagrams I’ve seen in books on intelligence work, it’s a common HUMINT technique. But then I started looking for good tools to do it and started coming up short.. There’s super complicated open source BS like graphviz – not something I want to deal with as part of my hobby. “Do it in R,” suggested someone who clearly wanted a punch in the nose. Then I thought maybe I could use a virtual corkboard like or Spaaze but those don’t even have basic “pins and yarn” kind of ways to represent relations. Email Forensics Software. Forensics for the newbs. Computer Forensics Software. Top 20 Free Digital Forensic Investigation Tools for SysAdmins.

ForensicsWiki. 5 Free FBI & CSI Digital Photo Forensic Tools To Analyze Fake Photos. Updated: May 12, 2017 Home » Computer and Internet Security With the rising popularity of social media such as Facebook and twitter, fake news with fake pictures that look real has become a big problem. Digital Photos are more integral to communication than ever before, but the wide availability of easy image editing and manipulation tools at the disposable of anyone with a computer, or a smartphone, it makes them a risky proposition when trust is important.

See Also ➤ How to Verify Fake Photos, Images or News Report on Facebook and Twitter Whether you’re accepting citizen journalism photos for a news site, profile photos for a dating service, insurance claim photos, or even photos of identity documents like licenses and passports, it’s important to know what’s real and what’s manipulated. FotoForensics. Forensic Explorer Home. Best Forensic Email Analysis Software - Top Ten List. Forensic Resources. In 2010, Indigent Defense Services created the position of Forensic Resource Counsel to assist North Carolina public defenders and private appointed counsel in understanding and if appropriate, challenging the forensic science evidence in their cases.

This website is an initiative of the Forensic Resource Counsel. In February 2011 the Expert Database was launched, providing information about state and defense forensic science experts.