Difference between pages "Tools:Data Recovery" and "Open Computer Forensics Architecture"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Carving)
 
m (Typo.)
 
Line 1: Line 1:
{{Wikify}}
+
The '''Open Computer Forensics Architecture''' ('''OCFA''') is a modular computer forensics framework built by the [[Dutch National Police Agency]]. The main goal is to automate the digital forensic process to speed up the investigation and give tactical [[investigator]]s direct access to the seized data through an easy to use search and browse interface.
  
= Partition Recovery =
+
The architecture forms an environment where existing forensic [[tools]] and libraries can be easily plugged into the architecture and can thus be made part of the recursive extraction of data and [[metadata]] from digital evidence.
  
*[http://www.ptdd.com/index.htm Partition Table Doctor]
+
The Open Computer Forensics Architecture aims to be highly modular, robust, fault tolerant, recursive and scalable in order to be usable in large investigations that spawn numerous terabytes of evidence data and covers hundreds of evidence items.
: Recover deleted or lost Partitions (FAT16/FAT32/NTFS/NTFS5/EXT2/EXT3/SWAP).
+
  
*[http://www.stud.uni-hannover.de/user/76201/gpart/ gpart]
+
Currently the Open Computer Forensics Architecture is only available for [[law enforcement]]. Organizations interested can send an email to [mailto:ocfa@dnpa.nl ocfa@dnpa.nl]. Under [[NDA]] conditions it can also be made available for academic purposes. Questions about licensing can be directed at [mailto:license@dnpa.nl license@dnpa.nl].
: Gpart is a tool which tries to guess the primary partition table of a PC-type hard disk in case the primary partition table in sector 0 is damaged, incorrect or deleted.
+
 
+
*[http://www.cgsecurity.org/wiki/TestDisk Testdisk]
+
: TestDisk is OpenSource software and is licensed under the GNU Public License (GPL).
+
 
+
== See Also ==
+
 
+
* [http://support.microsoft.com/?kbid=166997 Using Norton Disk Edit to Backup Your Master Boot Record]
+
 
+
== Notes ==
+
 
+
* "fdisk /mbr" restores the boot code in the [[Master boot record]], but not the partition itself.
+
 
+
= Data Recovery =
+
 
+
*[http://www.toolsthatwork.com/bringback.htm BringBack]
+
: BringBack offers easy to use, inexpensive, and highly successful data recovery for Windows and Linux (ext2) operating systems and digital images stored on memory cards, etc.
+
 
+
*[http://www.runtime.org/raid.htm RAID Reconstructor]
+
: Runtime Software's RAID Reconstructor will reconstruct RAID Level 0 (Striping) and RAID Level 5 drives.
+
 
+
*[http://www.salvationdata.com Salvation Data]
+
: Claims to have a program that can read the "bad blocks" of Maxtor drives with proprietary commands.
+
 
+
=Carving=
+
*[http://www.datalifter.com/products.htm DataLifter® - File Extractor Pro]
+
: Data carving runs on multiple threads to make use of modern processors
+
 
+
*[http://foremost.sourceforge.net/ Foremost]
+
: Foremost is a console program to recover files based on their headers, footers, and internal data structures.
+
 
+
*[http://www.digitalforensicssolutions.com/Scalpel/ Scalpel]
+
: Scalpel is a fast file carver that reads a database of header and footer definitions and extracts matching files from a set of image files or raw device files. Scalpel is filesystem-independent and will carve files from FATx, NTFS, ext2/3, or raw partitions.
+
 
+
*[[EnCase]]
+
: EnCase comes with some eScripts that will do carving.
+
 
+
*[http://ocfa.sourceforge.net/libcarvpath/ CarvFs]
+
: A virtual filesystem (fuse) implementation that can provide carving tools with the posibility to do recursive multi tool zero-storage carving (also called in-place carving). Patches and scripts for scalpel and foremost are provided. Works on raw and encase images.
+
 
+
*[http://ocfa.sourceforge.net/libcarvpath/ LibCarvPath]
+
: A shared library that allows carving tools to use zero-storage carving on carvfs virtual files.
+
 
+
*[http://www.cgsecurity.org/wiki/PhotoRec PhotoRec]
+
: PhotoRec is file data recovery software designed to recover lost files including video, documents and archives from Hard Disks and CDRom and lost pictures (thus, its 'Photo Recovery' name) from digital camera memory.
+
 
+
* [https://www.uitwisselplatform.nl/projects/revit RevIt]
+
: RevIt (Revive It) is an experimental carving tool, initially developed for the DFRWS 2006 carving challenge. It uses 'file structure based carving'. Note that RevIt currently is a work in progress.
+
 
+
* [http://www.e-rol.com/en/ e-ROL]
+
: Erol allows you to recover through the internet files erased by mistake. Recover your files online for free.
+

Revision as of 19:23, 15 May 2006

The Open Computer Forensics Architecture (OCFA) is a modular computer forensics framework built by the Dutch National Police Agency. The main goal is to automate the digital forensic process to speed up the investigation and give tactical investigators direct access to the seized data through an easy to use search and browse interface.

The architecture forms an environment where existing forensic tools and libraries can be easily plugged into the architecture and can thus be made part of the recursive extraction of data and metadata from digital evidence.

The Open Computer Forensics Architecture aims to be highly modular, robust, fault tolerant, recursive and scalable in order to be usable in large investigations that spawn numerous terabytes of evidence data and covers hundreds of evidence items.

Currently the Open Computer Forensics Architecture is only available for law enforcement. Organizations interested can send an email to ocfa@dnpa.nl. Under NDA conditions it can also be made available for academic purposes. Questions about licensing can be directed at license@dnpa.nl.