📜 ⬆️ ⬇️

Computer forensics (forsensik): a selection of useful links

image


In order to successfully conduct investigations into information security incidents, one must have practical skills in working with tools for extracting digital artifacts. This article will provide a list of useful links and tools for carrying out work on the collection of digital evidence.


The main purpose of such work is the use of methods and means for preserving (immutability), collecting and analyzing digital evidence in order to reconstruct the incident events.


The term "forensics" is an abbreviated form of "forensic science," literally "forensic science," that is, the science of examining evidence — exactly what is called criminology in Russian. The Russian term "forensic" does not mean any forensic science, namely computer.
Some authors share computer forensics and network forensics.


The main field of application of forensics is the analysis and investigation of events in which computer information appears as an object of infringement, a computer as an instrument for committing a crime, as well as any digital evidence.


For the complete collection and analysis of information, various highly specialized utilities are used, which will be discussed below. I want to warn you that when carrying out work on the conclusion in a particular criminal case, the presence of certain certificates and software conformance (FSTEC license) will most likely be considered. In this case, you will have to use combined methods for collecting and analyzing information, or write conclusions and conclusions based on the data obtained from non-certified sources.


Frameworks



Real-time utility



Work with images (creation, cloning)



Data retrieval



Work with RAM



Network analysis



Windows artifacts (extracting files, download histories, USB devices, etc.)



OS X study



Internet artifacts



Time Interval Analysis



Hex editors



Converters



File analysis



Processing disk images



Total


To carry out research and collection of digital evidence, it is necessary to adhere to the principles of immutability, integrity, completeness of information and its reliability. To do this, follow the recommendations for software and methods for conducting investigations. In the next article I will give examples of the practical use of tools for analyzing memory images.


')

Source: https://habr.com/ru/post/338378/


All Articles