Tools used in Cyber investigation — —
What is Cyber investigation ?
Cyber investigation is the process in which cyber cell officers use to track criminals with the help of computer techniques. This process may be to investigate computer crimes or it may be to track records of criminals using computer forensics
Tools mostly used by forensics experts
1- Autopsy
An autopsy is the Digital forensic tool and it is the most famous tool used to collect evidence…Autopsy 3.0 is written in Java using the NetBeans platform. It was released under the Apache License 2.0 …..This tool is used by the military, law enforcement, and corporate examiners to investigate what recent activities happen with smartphones or computers. The tool has the ability to recover all the data from the device like USB, hard drive, smartphones, laptops…….etc
Main features of Autopsy….
Singaluser/multiuser
E-mail analysis
Hash Set
Android support
File type detection etc…..
An autopsy is available in Kali Linux or windows both
Lets’s jump on another tool — — -called Binwalk
2- Binwalk
Binwalk is first discovered in 2010…by Craig Heffner in ReFirm Labs Binwalk is a tool for searching a given binary image for embedded files and executable code. Specifically, it is designed for identifying files and code embedded inside of firmware images…….. Binwalk uses libmagic, so it is compatible with magic signatures created for the Unix file utility. Binwalk also includes a custom magic signature file that contains improved signatures for files that are commonly found in firmware images such as compressed/archived files, firmware headers, Linux kernels, bootloaders, filesystems, etc.
In simple words, Binwalk is a tool for analyzing binary files for embedded files and executable code. It is mostly used to extract the content of firmware images.
Features of Binwalk tool
Scanning Firmware — Binwalk can scan a firmware image for many different embedded file types and file systems.
File Extraction — You can tell Binwalk to extract any files that it finds in the firmware image.
String Search — This allows you to search the specified file(s) for a custom string.
Entropy Analysis — This can help identify interesting sections of data inside a firmware image.
3- Bulk-Extractor
Bulk Extractor is a great tool that is used for extracts functions such as e-mail addresses, credit/Debit card numbers, URLs(Uniform Resource Locator), and other types of information to collect digital evidence files. It is a useful forensic survey tool that can be used for many tasks such as malware and intrusion surveys, identity surveys, and web surveys, as well as image, PDF, ZIP analysis, and password breaking. This tool is used by the military, law enforcement, and corporate examiners to investigate sensitive cases. It is a great tool for searching a file system for sensitive data. The bulk extractor ignores the file system and scans it linearly. This, in combination with parallel processing, makes the tool very fast.
The bulk extractor is also available in the GUI interface……
In the next article, we tell about how you can use these tools — — So follow us for more……..
If you want to learn about more tools that are used for penetration testing then visit this article……..
Quotes on Cybersecurity
Cyberwarfare is as much about psychological strategy as technical prowess.”
― James Scott
“Information technology and business are becoming inextricably interwoven… I don’t anybody can talk meaningfully about one without the talking about the other”.-Bill Gates
“To competently perform rectifying security service, two critical incident response elements are necessary: information and organization.”
― Robert E. Davis
The cyber power of a country is more the atomic power of any country….
So beware😈😈😈😈😈👹👹 from cyber attacks and follow or share our page WIZARDING CODES for the latest updates Thank you for visit — — — — ANANY SHARMA(WIZARDING CODES)