This is an overview of available tools for forensic investigators. Please click on the name of any tool for more details.
Disk Imaging Tools
At CanSec West 05, Michael Becher, Maximillian Dornseif, and Christian N. Klein discussed an exploit which uses DMA to read arbitrary memory locations of a firewire-enabled system. The paper lists more details. The exploit is run on an iPod running Linux. This can be used to grab screen contents.
In theory, this could be used with the ... to send through an exploit code that would cause the system to dump the contents of its hard drive back to the iPod.
- Part of the AFF system, aimage can create either a raw file or an AFF file. It can optionally compress and calculate MD5 or SHA-1 hash residues while the data is being copied.
- A version of dd created by the Digital Computer Forensics Laboratory. dcfldd is an enhanced version of GNU dd with features useful for forensics and security, such as calculating MD5 or SHA-1 hashes on the fly and faster disk wiping.
- A program that converts and copies files, is one of the oldest Unix programs. I can copy data from any Unix "file" (including a raw partition) to any other Unix "file" (including a disk file or a raw partition). This is one of the oldest of the imaging tools, and produces raw image files. Extended into dcfldd.
- A tool similar to dd, but unlike dd it will continue reading the next sector, if it stumbles over bad sectors it cannot read.
- iLook IXimager
- The primary imaging tool for iLook. It is Linux based and produces compressed authenticatable image files that may only be read in the iLook analysis tool.
- Their ultimate tool lets you "READ, ACQUIRE, DECRYPT, ANALYZE and REPORT (R.A.D.A.R.)."
- Can image and convert many file formats. Also builds mobile toolkit.
- Can image with out dongle plugged in. Only images to E0* file.
- FTK Imager by AccessData
- Can image and convert many image formats. Including E0* and dd. Also a free tool.
Data Recovery Tools
- BringBack(tm) offers easy to use, inexpensive, and highly successful data recovery for Windows(tm) & Linux (ext2) operating systems and digital images stored on memory cards, etc.
- ByteBack Data Recovery Investigative Suite v4.0
- Now with UDMA, ATA & SATA support, memory management and greater ease and control of Partition and MBR manipulations, ByteBack continues to uphold it's viability as the computer forensics and recovery application of professionals.
- RAID Reconstructor
- Runtime Software's RAID Reconstructor will reconstruct RAID Level 0 (Striping) and RAID Level 5 drives. People who have used it, love it.
- Salvation Data
- Claims to have a program that can read the "bad blocks" of Maxtor drives with proprietary commands.
Disk Analysis Tools
- Macintosh Forensic Software, by BlackBag Technologies, Inc.
- ILook Investigator, by Elliot Spencer and U.S. Dept of Treasury, Internal Revenue Service - Criminal Investigation (IRS)
Open Source Tools
- A library for working with disk images. Currently AFFLIB supports raw, AFF, AFD, and EnCase file formats. Work to support segmented raw, iLook, and other formats is ongoing.
- Tries to guess the primary partition table of a PC-type hard disk in case the primary partition table in sector 0 is damaged, incorrect or deleted.
Forensics Live CDs
- FCCU Gnu/Linux Boot CD
- Also a Live CD built on top of Knoppix with a lot of tools with forensic purpose.
- It leaves the target devices unaltered (it does not use the swap partitions found on the devices) nor does it automount partitions.
- A Live CD built on top of Knoppix with special tools for incident response and electronic discovey.
- Its a hybrid CD which also contains a Cygwin environment for use on a running Windows system (w/o rebooting) including the sysinternal tools.
Metadata Extraction Tools
- Extracts metadata from various Microsoft Word files (doc). Can also convert doc files to other formats such as HTML or plain text.
- pdfinfo (part of the xpdf package) displays some metadata of PDF files.
File Analysis Tools
- The file command determines the file type of a given file, depending on its contents and not on e.g. its extension or filename. In order to do that, it uses a magic configuration file that identifies filetypes.
- Strings will print the strings of printable characters in files. It allows choosing different charactersets (ASCII, UNICODE). It is a quick way to browse through files/partitions/... in order to look for words, filenames, keywords etc.
Network Forensics Tools
- A tool to hide files within the slack space of the NTFS file system.
- A tool that allows one to modify all four NTFS timestamp (MACE) values.
Securely deleting data
- CyberScrub cyberCide
- This program securely erases all data from drives or partitions.
- CyberScrub Privacy Suite
- This program securely erases selected data, wipes free space, powerful scheduling capabilities.
- Darik's Boot and Nuke (DBAN)
- This is a bootable disk that securely wipes any hard disk it can detect.
- Part of GNU coreutils.
- VMware Player
- A free player for VMware virtual machines that will allow them to "play" on either Windows or Linux-based systems.
- VMware Server
- The free server product, for setting up/configuring/running VMware virtual machine.Important difference being that it can run 'headless', i.e. everything in background.