0% found this document useful (0 votes)
272 views10 pages

Eti Micropoject.

This micro project report summarizes a study on digital forensics tools. It provides an introduction to digital forensic tools and their basic principles. It then reviews literature on challenges with early tools and how newer tools address issues like processing speed, operating system support, handling distributed data across devices and networks, and analyzing cloud-based data. The report analyzes and compares several popular digital forensic tools - EnCase, Digital Forensic Framework, Pro Discover, FTK, Bulk_Extractor, X-Ways Forensics, WindowsSCOPE - and how they help resolve challenges identified in prior research. It concludes with references used in the report.

Uploaded by

The Looser
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
272 views10 pages

Eti Micropoject.

This micro project report summarizes a study on digital forensics tools. It provides an introduction to digital forensic tools and their basic principles. It then reviews literature on challenges with early tools and how newer tools address issues like processing speed, operating system support, handling distributed data across devices and networks, and analyzing cloud-based data. The report analyzes and compares several popular digital forensic tools - EnCase, Digital Forensic Framework, Pro Discover, FTK, Bulk_Extractor, X-Ways Forensics, WindowsSCOPE - and how they help resolve challenges identified in prior research. It concludes with references used in the report.

Uploaded by

The Looser
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
You are on page 1/ 10

A

Micro Project Report

ON

Study on Digital Forensic.

SUBMITTED BY

Karan sathe.(40)

Under Guidance of

MR. Samadhan Thokal sir

Diploma Course in Computer Technology

(As per directives of I Scheme, MSBTE)

JAYWANT SHIKSHAN PRASARK MANDA

BHIVARABAI SAWANT POLYTECHNIC, PUNE - 412207


Maharashtra State

Board of technical Education

Certificate

This is to certify that Mr.karan prakash sathe with Roll No. 40 of

Sixth Semester of Diploma in Computer Engineering of Institute

Bhivarabai Sawant Polytechnic Wagholi , Pune has successfully

completed the Micro-Project in Environmental Technology Initiative (22618)


for the academic year 2021-2022

Place: Wagholi, Pune Enrollment No: 1910870046

Date: 24 Apr 2022 Exam seat No:

MS.WALE SWATI . MS.S.GAIKWAD . Dr.P.T KALE

Subject Teacher Head of Department Princelple


1.INTRODUCTION:
The most promising technical development in digital

forensics is the development of software application

tools/computer forensics tools. The platform on which the data

are stored varies from controllers on the industrial machines,

autonomous devices, personal computers, mobile devices,

computer networks, cloud-based systems and servers. There are

many types of digital forensics tools available in the market in

which one of the core features of is to preserve the original file

or data after the data is recovered from these devices, so they can

be compared with the original data and make sure that the

extracted date is not contaminated or tampered with. There are some basic principles that need to
be notices while

using digital forensic tools. When the data is collected, the data

should not be altered. People who are using the digital forensic

tools should have a documentation of all their activity. And the

main principle is the access to the original document should be

restricted to prevent any alteration or modification of the

evidence.

2.LITERATUREREVIEW :
With the emergence of digital forensics and its applications

in industry, tools were emerging in the market that began

focusing on different types of problems that deal with forensic

investigation. In 2010 Garfinkel presented his work called

Digital forensics research: The next 10 years [8] which portrays

the crisis that might be confronted by the developers in the

subject of digital forensics. We see the problems that were

overcome since 2010 and the ones that still remain challenging.
The crisis that were analyzed by Simson L. Garfinkel are

Vishal R. Ambhire, Dr. B.B. Meshram [1] has explained in

the paper Digital Forensic Tools the process and the flow of a

digital forensic investigation. The process starts after the incident is reported or a crime is detected.
After that it goes in

the flow as shown in Fig. 1

3.DIGITAL FORENIC TOOL :


A. EnCase:

Guidance Software are the creators of EnCase [6], [12]. It is

one of the widely used forensic tools in world. In fact, 90% of

the consumer goods companies around the world, 93% of the

banks, 100% of the federal agencies, 75% of the power

distributors and 80% of the Universities in the U.S. use Encase.

The investigation lifecycle is almost the same that is being

described in [2] starting with investigation then collecting data

analyzing it and then generating a report.

Triage: EnCase Forensic gives you the capacity to rapidly view

and inquiry potential confirmation to figure out if assist

examination is justified.

Collect: It helps to obtain more evidence by collecting from a

variety of file formats and operating systems.

Decrypt: Here, it uses Tableau Hardware for password

recovery and decryption is done.

Process: As EnCase is built specifically for speed and

performance which can automate complicated queries.

B.Digital Forenic Framwork:

Digital Forensics Framework [13] is an Open Source

forensics platform which is developed on a customized

Application Programming Interface. Mostly used by the law

enforcement agencies, educational institutions and private


companies around the world. It is available in three options as

DFF which is free, DFF Pro: 1,000€ for one-year support and

DFF Live: 1,300€ for one-year support. DFF free will not get

any professional support, report editor, automation engine, user

activities reporting, hash scanner and skype analysis when

compared with DFF Pro and DFF Live.

The following are the features of DFF:

 It can perform Cryptographic hash calculation

 Can perform EXIF meta-data extraction

 Can import all Microsoft Outlook mailboxes

 Memory Dump analysis

 Scripting and batching capabilities

 Instinctive reporting of valuable information and web-

browsing

 Can automatically extract data

 Can perform investigation during live and static

Analysi.

3. Pro Discover:

 It allows inspection, image capture and search of

Hardware Protected Area

 To find the data, it uses Boolean search capability to

search for regular expressions and keywords

 It is flexible and fast

 ProDiscover Incident Response Edition can help to stop

the threat within the minutes of alert

 One can install the SMART AGENT when required and

can remove when it is done

 It also comes with malware discovery hash sets

 Uses Perl Scripts for performing investigation tasks

 It creates automatic reports with the information.

4.ANALYSIS:
The reference [8] have described the crisis that the developer

might face. So, we have compared the challenges with the

present scenario of the tools available and have suggested which

framework is helpful in resolving the problem. The first problem

they discussed was related to the time that was taken by the tool

to make analysis of the device. The tools that have successfully

solved the barrier of time are EnCase, DFF, Pro-Discover, FTK,

Bulk_Extractor, X-ways forensics, The Sleuth Kit and

WindowsSCOPE.

The second hindrance specified in [8] was related to

operating system. For instance, EnCase can run on Windows,

Linux, Dos and MAC. Similarly, there are different tools that

bolster various stages, for example, DFF, Pro-Discover, X-ways

Forensics, FTK, The Sleuth Kit, Bulk_Extractor.


The third problem mentioned in [8] is if the files are not

placed on the same computers. For example, if the file is stored

on computer A than another piece of file related to that might be

stored in computer B then, there should some kind of forensic

tools that should be able to extract the information out of this

networks. The tools that are used to extract this files present on

different computers are EnCase, Quest changeauditor,

WindowSCOPE, X-ways Forensic, FTK.

The fourth issue that is mentioned in [8] by the authors is

what if the information is stored away in the cloud. The tools

that are used to resolve this scenario are EnCase, Quest

changeauditor, WindowsSCOPE, Bulk_Extractor.

5.REFERENCE:
[1] Vishal R. Ambhire and Dr. B.B. Meshram, “Digital Forensic Tools”,

IOSR Journal of Engineering, Mar, 2012, Vol. 2(3) pp.392-398

[2] Varsha Karbhari Sanap, Vanita Mane “Comparative Study and

Simulation of Digital Forensic Tools”, International Conference on

Advances in Science and Technology 2015 (ICAST 2015)

[3] Charles W. Adams, “Legal Issues Pertaining to the Development of

Digital Forensic Tools”, Third International Workshop on Systematic

Approaches to Digital Forensic Engineering, pp.123-132.

[4] Dan Manson, Anna Carlin, Steve Ramos, Alain Gyger, Matthew

Kaufman, Jeremy Treichelt, “Is the Open Way a Better Way? Digital

Forensics using Open Source Tools”, Proceedings of the 40th Hawaii

International Conference on System Sciences, Jan. 29, 2007.

[5] George Grispos, Tim Storer, William Bradley Glisson, “A comparison of

forensic evidence recovery techniques for a windows mobile

smartphone”, Digital Investigation, Volume 8, Issue 1, July 2011, pp. 23–

36.
[6] Lee Garber, “EnCase: A Case Study in Computer-Forensic Technology”,

Computer Magazine, Jan 2001.

[7] Mamoona Rafique, M.N.A.Khan, “Exploring Static and Live Digital

Forensics: Methods, Practices and Tools”, International Journal of

Scientific & Engineering Research Volume 4, Issue 10, Oct 2013

[8] Simson L. Garfinkel, “Digital forensics research: The next 10 years”, The

International Journal of Digital Forensics & Incident Response, Volume

7, Supplement, Aug 2010, pp. 64–S73 Naval Postgraduate School,

Monterey, USA.

[9] Ben Martini and Kim-Kwang Raymond Choo, “An integrated conceptual

digital forensic framework for cloud computing”, The International

Journal of Digital Forensics & Incident Response, Volume 9, Issue 2, Nov

2012, pp. 71–80

[10] D. Parker, Crime by Computer, Scribner’s, New York, 1976.

[11] Simson L. Garfinkel, “Digital media triage with bulk data analysis and

bulk_extractor”, The International Journal of Digital Forensics & Incident

Response, Volume 32, Feb 2013, pp. 56–72.

[12] EnCase tool, https://www.guidancesoftware.com/encase-forensic.

[Accessed: 2- Oct- 2016].

[13] Digital Forensics Framework tool, http://www.arxsys.fr/features/.

[Accessed: 2- Oct- 2016].

[14] Pro-Discover tool, http://www.arcgroupny.com/services/computer-

forensics/. [Accessed: 2- Oct- 2016].

[15] X-Ways Forensics tool, http://www.x-ways.net/forensics/. [Accessed: 2-

Oct- 2016].

[16] Quest changeauditor tool, https://www.quest.com/change-auditor/.

[Accessed: 28- Oct- 2016].

[17] The Sleuth Kit, http://www.sleuthkit.org/autopsy/features.php.

[Accessed: 28- Oct- 2016].

[18] Computer Online Forensic Evidence Extractor, https://cofee.nw3c.org/.

[Accessed: 28- Oct- 2016].


[19] Bulk_Extractor, http://tools.kali.org/forensics/bulk-extractor. [Accessed:

10- Nov- 2016].

[20] WindoesScope, https://www.windowsscope.com/products/. [Accessed:

12- Nov- 2016].

[21] SANS Investigative Forensic Toolkit, http://digital-

forensics.sans.org/community/downloads. [Accessd: 20- Nov- 2016].

[22] Forensic Toolkit, http://accessdata.com/solutions/digital-

forensics/forensic-toolkit-ftk. [Accessed: 20- Nov- 2016].

[23] K. Barker, M. Askari, M. Banerjee, K. Ghazinour, B. Mackas, M. Majedi,

S. Pun, and A. Williams. A data privacy taxonomy. In BNCOD 26:

Proceedings of the 26th British National Conference on Databases, pages

42–54, Berlin, Heidelberg, July 2009. Springer Verlag.

You might also like