Tools for cyber forensic investigation and analysis

Which are the tools useful for forensic investigation and analysis?
Here we have listed some important tools which will be useful in forensic investigation as well as crime scene while seizing the evidences, also helps in analysis and reporting of cyber crimes.

NMAP:
NMAP stand for Network Mapper. It is most popular tool for mapping networks and security system auditing. It also support for all operating systems like Windows, Linux, Red Hat, Mac OS.

Forensic Investigator:
Forensic investigator is best tool in cyber forensics. It is helpful in many types likes WHOIS/GeoIP lookup, ping, port scanner, banner grabber, URL decoder/parser, XOR/HEX?base64 converter, SMB Share/Net-BIOS viewer, virus-total lookup.

Hash Calculator:
Hash calculator is software useful for calculating hash values for any files as well as any folder. It generates MD5 and SHA-1 hash value.

USB write blocker:
USB write blocker is most important tool in prevention of data altering in our systems without permissions. USB write blocker is most important to every system in forensic laboratory.

Crowd Response:
Crowd response is software tool useful for generation incident response in our system and gathering system security engagement information. And it also gives report in different formats like excel, word, pdf and HTML files.

Wireshark:
Wireshark is network capturing, analysis and tracking traces of transferring data over internet. Wireshark also useful for checking incidents happening on your computer systems.

Magnet RAM Capture:
It is useful at crime scenes for capturing live physical system RAM. And also helpful for investigation and analysis of RAM.

Encrypted Disk Detector:
Encrypted Disk Detector is useful for checking encrypted hard drives. It also supports bit-locker, safe-boot encrypted volumes and PGP.

NFI Defraser:
NFI defraser is software useful in forensic analysis to analysis multimedia files from data streams.

ExifTool:
ExifTool is forensic tool useful for read, write and alter data of number of files types.


Comments

Popular posts from this blog

basic introduction about networking and its components.

Introduction to Cyber Forensic