Tools used in Cyber investigation — —

Anany sharma
4 min readMay 29, 2021

--

What is Cyber investigation ?

Cyber investigation is the process in which cyber cell officers use to track criminals with the help of computer techniques. This process may be to investigate computer crimes or it may be to track records of criminals using computer forensics

Tools mostly used by forensics experts

1- Autopsy

An autopsy is the Digital forensic tool and it is the most famous tool used to collect evidence…Autopsy 3.0 is written in Java using the NetBeans platform. It was released under the Apache License 2.0 …..This tool is used by the military, law enforcement, and corporate examiners to investigate what recent activities happen with smartphones or computers. The tool has the ability to recover all the data from the device like USB, hard drive, smartphones, laptops…….etc

Main features of Autopsy….

Singaluser/multiuser

E-mail analysis

Hash Set

Android support

File type detection etc…..

An autopsy is available in Kali Linux or windows both

Windows version Interface
Kali Linux interface

Lets’s jump on another tool — — -called Binwalk

2- Binwalk

Binwalk is first discovered in 2010…by Craig Heffner in ReFirm Labs Binwalk is a tool for searching a given binary image for embedded files and executable code. Specifically, it is designed for identifying files and code embedded inside of firmware images…….. Binwalk uses libmagic, so it is compatible with magic signatures created for the Unix file utility. Binwalk also includes a custom magic signature file that contains improved signatures for files that are commonly found in firmware images such as compressed/archived files, firmware headers, Linux kernels, bootloaders, filesystems, etc.

Craig Heffner

In simple words, Binwalk is a tool for analyzing binary files for embedded files and executable code. It is mostly used to extract the content of firmware images.

The interface of Binwalk (The image is owned by a reboot. pro)

Features of Binwalk tool

Scanning Firmware — Binwalk can scan a firmware image for many different embedded file types and file systems.

File Extraction — You can tell Binwalk to extract any files that it finds in the firmware image.

String Search — This allows you to search the specified file(s) for a custom string.

Entropy Analysis — This can help identify interesting sections of data inside a firmware image.

3- Bulk-Extractor

Bulk Extractor is a great tool that is used for extracts functions such as e-mail addresses, credit/Debit card numbers, URLs(Uniform Resource Locator), and other types of information to collect digital evidence files. It is a useful forensic survey tool that can be used for many tasks such as malware and intrusion surveys, identity surveys, and web surveys, as well as image, PDF, ZIP analysis, and password breaking. This tool is used by the military, law enforcement, and corporate examiners to investigate sensitive cases. It is a great tool for searching a file system for sensitive data. The bulk extractor ignores the file system and scans it linearly. This, in combination with parallel processing, makes the tool very fast.

The interface of Bulk-Extractor ……

The bulk extractor is also available in the GUI interface……

GUI interface of Bulk-Extractor

In the next article, we tell about how you can use these tools — — So follow us for more……..

If you want to learn about more tools that are used for penetration testing then visit this article……..

Quotes on Cybersecurity

Cyberwarfare is as much about psychological strategy as technical prowess.”
James Scott

“Information technology and business are becoming inextricably interwoven… I don’t anybody can talk meaningfully about one without the talking about the other”.-Bill Gates

“To competently perform rectifying security service, two critical incident response elements are necessary: information and organization.”
Robert E. Davis

The cyber power of a country is more the atomic power of any country….

So beware😈😈😈😈😈👹👹 from cyber attacks and follow or share our page WIZARDING CODES for the latest updates Thank you for visit — — — — ANANY SHARMA(WIZARDING CODES)

--

--

Anany sharma
Anany sharma

Written by Anany sharma

Security used to be an inconvenience sometimes, but now it’s a necessity all the time. — Martina Navratilova.

No responses yet