Sleuth Kit: an open-source forensic tool used to analyze Disk Images and Restore Files
SIFT is a Ubuntu-based forensic release provided by SANS. It contains many forensic tools, such as Sleuth kit/Autopsy. However, Sleuth kit/Autopsy can be directly installed on Ubuntu or Fedora without downloading the entire release version of SIFT.
Sleuth Kit/Autopsy is an open-source Electronic forensic investigation tool that can be used to restore lost files from Disk Images and perform disk image analysis
and autopsy founder Brian Carrier pointed out. "The Sleuth kit is more like a set of libraries that can be incorporated into its own tools, but users do not need to use the training directly." "Project Link: Https://github.com/sleuthkit/sleuthkit 10, OssecThe host-based Intrusion detection system (OSSEC) enables log analysis, file integrity checking, monitoring, and alerting, and can be easily compared to
investigators to identify and restore evidence from the image in the event response process or in the system. Autopsy acts as a user interface solution based on sleuth kit and other tools, which is a digital forensics platform. "Autopsy focuses more on users," said Brian carrier, the creator of sleuth kit and autopsy. "The sleuth kit is more like a complete set of libraries that can be incorporated into your own tools, but users do not need to directly use the training ."
Project Link: https://
seek help from a professional company.
Tools
1. The Sleuth Kit http://www.sleuthkit.org/sleuthkit/ (Autopsy is one of its graphics front ends)
2. Foremost http://foremost.sourceforge.net
3. a versatile tool, Finaldata, can restore files accidentally deleted under unix/linux/dos. For unix, these products are supported: Solaris, AIX, and HP-UX. For linux, EXT2 file systems are supported. For dos, the file system supports FAT 12/16/32, NTFS 4/5/5.1.
file system.
3, if the data is very useful, perhaps to find a professional company to rescue.
Tools
1. The Sleuth Kit http://www.sleuthkit.org/sleuthkit/(autopsy is one of its graphical front ends)
2, Foremost http://foremost.sourceforge.net
3, an omnipotent tool, FinalData, can restore Unix/linux/dos under the false deletion of the file. For UNIX, these products are supported, Solaris, AIX, and HP-UX. For Linux, a EXT2 file system is supported. For
After understanding the concept of penetration testing, the next step is to learn the various tools used for penetration testing. Before you do penetration testing, you need to understand the tools needed to penetrate. The tools required for penetration testing are shown in table 1-1:Table 1-1 Tools required for penetration
Splint
Unhide
Scrub
Pscan
Examiner
Ht
Flawfinder
Srm
Driftnet
Rats
Nwipe
Binwa
After understanding the concept of penetrant testing. The next step is to learn the various tools used in penetrant testing. Before doing the penetrant test. You need to understand the tools needed to penetrate the first. The tools required to penetrate the test are as shown in table 1-1:Table 1-1 Tools required for penetration
Splint
Unhide
Scrub
Pscan
Examiner
Ht
Flawfinder
Srm
Driftnet
Rats
Nwipe
B
-> /var/log/httpd/ssl_scache.sem (deleted)
3. use the statically compiled lsof | grep deleted to check which commands pid user fd type device size node NAMEgpm 1650 root 1u REG 8, 2 5 149743/var/run/gpm208raa (deleted) 4 are deleted. obtain the inode Number of the file, which is 1497435. use sleuthkit to restore the disk. df/var indicates that the hard disk location is sda1icat/dev/sda1 1497436. check the recovered files carefully. Generally, traces
Prepare the environment
First, create another test file in the EXT4 file system.
# echo Time for knowledge >testfile# touch -a -t 211101231917.42 testfile# touch -m -t 204005160308.19 testfile
You can use the touch command to directly modify the atime (last access time) and mtime (last modification time) of the file. In this way, you can set these timestamps to the desired time, otherwise, the atime and mtime timestamps of the newly created file will be the time when the file is created. One th
After understanding the concept of penetrant testing, the next step is to learn the various tools used in penetrant testing. Before you do a penetrant test, you need to understand the tools needed to penetrate. The tools required to penetrate the test are as shown in table 1-1:Table 1-1 Tools required for penetration
Splint
Unhide
Scrub
Pscan
Examiner
Ht
Flawfinder
Srm
Driftnet
Rats
Nwipe
Binwalk
After understanding the concept of penetrant testing, the next step is to learn the various tools used in penetrant testing. Before you do a penetrant test, you need to understand the tools needed to penetrate. The tools required to penetrate the test are as shown in table 1-1:Table 1-1 Tools required for penetration
Splint
Unhide
Scrub
Pscan
Examiner
Ht
Flawfinder
Srm
Driftnet
Rats
Nwipe
Binwalk
file to its original state. If you want to ensure that the contents of the file cannot be restored, consider using shred.So theoretically the RM deleted files can still be recovered. Deleting a file is simply releasing the index point (information nodes) that points to the block, as long as it is not overwritten and the data is actually on the hard disk, the key is to find the index point and then grab the data in the data block it refers to and save it to another partition. After using RM to d
Contact Us
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.