Difference between pages "Gargoyle Investigator" and "JTAG Forensics"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(New page: '''Gargoyle Investigator™ Forensic Pro Edition''' [https://www.wetstonetech.com/cgi/shop.cgi?view,2] == == Gargoyle Investigator Forensic Pro Edition is our most advanced malware detec...)
 
 
Line 1: Line 1:
'''Gargoyle Investigator™ Forensic Pro Edition''' [https://www.wetstonetech.com/cgi/shop.cgi?view,2]
+
== Definition ==
 +
=== From Wikipedia ([http://en.wikipedia.org/wiki/Joint_Test_Action_Group http://en.wikipedia.org/wiki/Joint_Test_Action_Group ]): ===
  
==  ==
+
Joint Test Action Group (JTAG) is the common name for what was later standardized as the IEEE 1149.1 Standard Test Access Port and Boundary-Scan Architecture. It was initially devised for testing printed circuit boards using boundary scan and is still widely used for this application. Today JTAG is also widely used for IC debug ports. In the embedded processor market, essentially all modern processors support JTAG when they have enough pins. Embedded systems development relies on debuggers talking to chips with JTAG to perform operations like single stepping and breakpointing. Digital electronics products such as cell phones or a wireless access point generally have no other debug or test interfaces.
Gargoyle Investigator Forensic Pro Edition is our most advanced malware detection software package for rapid in depth forensic investigations. It is designed for forensic laboratories, law enforcement, field investigators and advanced private investigators. Gargoyle performs a quick search for malicious software programs and provides significant clues regarding activities, motives and the intent of the suspect or potential suspects. Gargoyle goes beyond the standard  virus protection software with our extensive collection of “hostile” programs that typical virus protection software cannot detect. This tool was developed to shorten investigation time and provide accurate and detailed forensic evidence reports to assist  investigators in the malware investigation process.
+
  
 +
=== Forensic Application ===
  
'''Key Features:'''
+
JTAG forensics is an acquisition procedure which involves connecting to the Standard Test Access Port (TAPs) on a device and instructing the processor to transfer the raw data stored on connected memory chips. Jtagging supported phones can be an extremely effective technique to extract a full physical image from devices that cannot be acquired by other means.
  
Ability to conduct scans on a stand-alone system or network resource,20 datasets containing thousands of types of malicious software, Dataset Creator™ - ability to create or extend datasets, Interoperable with popular forensic tools such as EnCase™ and FTK™, 32-Bit and 64-Bit drive mounting and management integration, Detailed forensic evidence reports with secure source timestamping
+
== Tools and Equipment ==
  
 +
* [[JTAG and Chip-Off Tools and Equipment]]
  
'''System Recommendations:'''
+
== Procedures ==
  
Microsoft Windows® 2000, 130 MB free disk space, 256 MB RAM, Pentium® III 1GHz processor
+
* [[JTAG HTC Wildfire S]]
 
+
* [[JTAG LG P930]]
 
+
* [[JTAG Samsung Galaxy S4 (SGH-I337)]]
'''License:'''
+
 
+
Single user license, To Simultaneously scan suspects up to 100 systems please view Gargoyle Investigator™ Enterprise Module[https://www.wetstonetech.com/cgi/shop.cgi?view,3]
+
 
+
 
+
----
+
 
+
'''Contact Information:'''
+
 
+
1-877-WETSTONE ext. 2
+
 
+
 
+
www.wetstonetech.com [https://www.wetstonetech.com/index.html]
+

Revision as of 23:23, 17 August 2013

Definition

From Wikipedia (http://en.wikipedia.org/wiki/Joint_Test_Action_Group ):

Joint Test Action Group (JTAG) is the common name for what was later standardized as the IEEE 1149.1 Standard Test Access Port and Boundary-Scan Architecture. It was initially devised for testing printed circuit boards using boundary scan and is still widely used for this application. Today JTAG is also widely used for IC debug ports. In the embedded processor market, essentially all modern processors support JTAG when they have enough pins. Embedded systems development relies on debuggers talking to chips with JTAG to perform operations like single stepping and breakpointing. Digital electronics products such as cell phones or a wireless access point generally have no other debug or test interfaces.

Forensic Application

JTAG forensics is an acquisition procedure which involves connecting to the Standard Test Access Port (TAPs) on a device and instructing the processor to transfer the raw data stored on connected memory chips. Jtagging supported phones can be an extremely effective technique to extract a full physical image from devices that cannot be acquired by other means.

Tools and Equipment

Procedures