• Get application security done the right way! Detect, Protect, Monitor, Accelerate, and more…
  • A data breach happens almost every day.

    Some of the top data breaches are;

    • JP Morgan Chase
    • Bank of America
    • HSBC
    • TD Bank
    • Target
    • Tumbler
    • Home Depot
    • MySpace
    • eBay
    • Adobe System Inc
    • iMesh

    Juniper Research suggests Cybercrime will cost over $5 trillion to the business by 2024. So computer forensic expert demand will also increase.

    Tools are the administrator’s best friend; using the right tool always helps you to move things faster and make you productive. Forensic investigation is always challenging as you may gather all the information you could for the evidence and mitigation plan.

    Here are some of the computer forensic investigator tools you would need. Most of them are free!

    Autopsy

    Autopsy is a GUI-based open source digital forensic program to analyze hard drives and smartphones efficiently. Autospy is used by thousands of users worldwide to investigate what happened on the computer.

    autopsy

    It’s widely used by corporate examiners, military to investigate, and some of the features are.

    • Email analysis
    • File type detection
    • Media playback
    • Registry analysis
    • Photos recovery from memory card
    • Extract geolocation and camera information from JPEG files
    • Extract web activity from a browser
    • Show system events in a graphical interface
    • Timeline analysis
    • Extract data from Android – SMS, call logs, contacts, etc.

    It has extensive reporting to generate in HTML, XLS file format.

    Encrypted Disk Detector

    Encrypted Disk Detector can be helpful to check encrypted physical drives. It supports TrueCrypt, PGP, BitLocker, Safeboot encrypted volumes.

    Wireshark

    Wireshark is a network capture and analyzer tool to see what’s happening in your network. Wireshark will be handy to investigate the network-related incident.

    Magnet RAM Capture

    You can use Magnet RAM capture to capture the physical memory of a computer and analyze artifacts in memory.

    It supports the Windows operating system.

    Network Miner

    An interesting network forensic analyzer for Windows, Linux & MAC OS X to detect OS, hostname, sessions, and open ports through packet sniffing or by PCAP file. Network Miner provides extracted artifacts in an intuitive user interface.

    networkminer

    NMAP

    NMAP (Network Mapper) is one of the most popular networks and security auditing tools. NMAP is supported on most of the operating systems, including Windows, Linux, Solaris, Mac OS, HP-UX, etc. It’s open-source so free.

    RAM Capturer

    RAM Capturer by Belkasoft is a free tool to dump the data from a computer’s volatile memory. It’s compatible with Windows OS. Memory dumps may contain encrypted volume’s password and login credentials for webmails and social network services.

    Forensic Investigator

    If you are using Splunk, then Forensic Investigator will be a convenient tool. It’s a Splunk app and has many tools combined.

    splunk-forensic-investigator

    • WHOIS/GeoIP lookup
    • Ping
    • Port scanner
    • Banner grabber
    • URL decoder/parser
    • XOR/HEX/Base64 converter
    • SMB Share/NetBIOS viewer
    • Virus Total lookup

    FAW

    FAW (Forensics Acquisition of Websites) is to acquire web pages for forensic investigation, which has the following features.

    • Capture the entire or partial page
    • Capture all types of image
    • Capture HTML source code of the web page
    • Integrate with Wireshark

    faw

    HashMyFiles

    HashMyFiles will help you to calculate the MD5 and SHA1 hashes. It works on almost all the latest Windows OS.

    hashmyfiles

    Crowd Response

    Response by Crowd Strike is a windows application to gather system information for incident response and security engagements. You can view the results in XML, CSV, TSV, or HTML with the help of CRConvert. It runs on 32 or 64 bit of Windows XP above.

    Crowd Strike has some other helpful tools for investigation.

    • Totrtilla – anonymously route TCP/IP and DNS traffic through Tor.
    • Shellshock Scanner – scan your network for shellshock vulnerability.
    • Heartbleed scanner – scan your network for OpenSSL heart bleed vulnerability.

    crowdstrike

    NFI Defraser

    Defraser forensic tool may help you to detect full and partial multimedia files in the data streams.

    ExifTool

    ExifTool helps you to read, write, and edit meta information for a number of file types. It can read EXIF, GPS, IPTC, XMP, JFIF, GeoTIFF, Photoshop IRB, FlashPix, etc.

    Toolsley

    Toolsley got more than ten useful tools for investigation.

    • File signature verifier
    • File identifier
    • Hash & Validate
    • Binary inspector
    • Encode text
    • Data URI generator
    • Password generator

    SIFT

    SIFT (SANS investigative forensic toolkit) workstation is freely available as Ubuntu 14.04. SIFT is a suite of forensic tools you need and one of the most popular open source incident response platform.

    sift

    Dumpzilla

    Extract all exciting information from Firefox, Iceweasel and Seamonkey browser to be analyzed with Dumpzilla.

    dumpzilla

    Browser History

    Foxton has two free exciting tools.

    1. Browser history capturer – capture web browser (chrome, firefox, IE & edge) history on Windows OS.
    2. Browser history viewer – extract and analyze internet activity history from most of modern browsers. Results are shown in the interactive graph, and historical data can be filtered.

    ForensicUserInfo

    Extract the following information with ForensicUserInfo.

    • RID
    • LM/NT Hash
    • Password reset/Account expiry date
    • Login count/fail date
    • Groups
    • Profile path

    Black Track

    Blacktrack is one of the most popular platforms for penetration testing, but it has forensic capability too.

    Paladin

    PALADIN forensic suite – the world’s most famous Linux forensic suite is a modified Linux distro based on Ubuntu available in 32 and 64 bit.

    paladin

    Paladin has more than 100 tools under 29 categories, almost everything you need to investigate an incident. Autospy is included in the latest version – Paladin 6.

    Sleuth Kit

    The Sleuth Kit is a collection of command-line tools to investigate and analyze volume and file systems to find the evidence.

    CAINE

    CAINE (Computer Aided Investigate Environment) is a Linux distro that offers the complete forensic platform which has more than 80 tools for you to analyze, investigate, and create an actionable report.

    caine

    Conclusion

    I hope the above tools help you handle the Cybersecurity incident more efficiently and make the investigation process faster. If you are new to forensic investigation then you may want to check out this course.