Question

In: Computer Science

Assign 07 - Linux Forensics Learning Objectives and Outcomes Research information about Linux forensic investigations and...

Assign 07 - Linux Forensics

Learning Objectives and Outcomes

  • Research information about Linux forensic investigations and appropriate tools.
  • Identify and describe three Web sites that provide highly relevant information to Linux forensic investigations.

Assignment Requirements

You are an experienced digital forensics specialist for DigiFirm Investigation Company. DigiFirm is involved in an investigation of a large corporation accused of unauthorized access of a competitor’s database to obtain customer information. The DigiFirm team will be responsible for the forensic investigation of the seized computers that are running Linux.

Chris, your team leader, has asked you to research information and tools that the team can use during the investigations.

For this assignment:

  1. Research Web sites that provide information or tools for Linux forensic investigations.
  2. Write a report that describes three of the most promising Web sites in detail and discusses why these resources might be helpful in a forensic examination.

Required Resources

  • Course textbook
  • Internet

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, size 12, double-space
  • Citation Style: Follow your school’s preferred style guide
  • Length: 1–2 pages

Solutions

Expert Solution

Nowadays, computer or digital forensics is very important because of crimes related to computers, the Internet and mobiles. Pieces of evidence such as computer and digital devices contain or store sensitive information that can be useful for the forensic investigator in a particular crime or incident.

Digital forensic investigation required tools to extract desired information from the devices. Several commercial tools exist for forensic investigation however huge amount is required to buy. Open source community also contributed in this field and there are several open source tools for digital forensic field. In this article, best tools related to digital forensic will be explored.

Before exploring well-known tools for digital forensic, following Linux distributions contained many free forensic tools.

1) SIFT (SANS Investigative Forensic Toolkit)

An international team of forensics experts, along SANS instructors, created the SANS Incident Forensic Toolkit (SIFT) Workstation for incident response and digital forensics use.  SIFT forensic suite is freely available to the whole community. The free SIFT toolkit, that can match any modern incident response and forensic tool suite, which is used in SANS courses. It demonstrates that advanced investigations and responding to intrusions can be accomplished using cutting-edge open-source tools that are freely available and frequently updated.

Features of SIFT distribution are following:

  • Ubuntu LTS 14.04 Base
  • 32/64 bit base system
  • Latest forensic tools and techniques
  • VMware Appliance ready to tackle forensics
  • Cross compatibility between Linux and Windows
  • Option to install stand-alone via (.iso) or use via VMware Player/Workstation/

2) CAINE (Computer Aided Investigative Environment)

CAINE is an Linux live distribution created as a Digital Forensics project. CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface.

The main objectives that CAINE distribution aims to guarantee are the following:

  • an inter-operable environment that supports the digital investigator during the four phases of the digital investigation
  • user-friendly graphical interface
  • contains open source tools

3) KALI (formerly Backtrack)

Kali Linux is an open source project that is maintained and funded by Offensive Security, a provider of world-class information security training and penetration testing services. Kali Linux is the fist choice of penetration tester and security professional. It has security tools for different purposes. Open source tools for mobile,network and RAM analysis are available in the Kali Linux.

4) DEFT linux ( Digital Evidence & Forensics Toolkit )

DEFT is a distribution made for Computer Forensics, with the purpose of running live on systems without tampering or corrupting devices (hard disks, pendrives). It is based on GNU Linux and it can run live (via CD/DVD or USB pendrive), installed or run as a virtual machine on VMware/Virtualbox.  DEFT is paired with DART ( known as Digital Advanced Response Toolkit), a Forensics System which can be run on Windows and contains the best tools for Forensics and Incident Response.

5) Martiux

It is a fully featured security distribution based on Debian consisting of a powerful bunch of more than 300 open source and free tools that can be used for various purposes including, but not limited to, penetration testing, ethical hacking, system and network administration, cyber forensics investigations, security testing, vulnerability analysis, and much more. It is a distribution designed for security enthusiasts and professionals, although it can be used normally as your default desktop system.

Matriux is designed to run from a Live environment like a CD / DVD or USB stick or it can easily be installed to your hard disk in a few steps. Matriux also includes a set of computer forensics and data recovery tools that can be used for forensic analysis and investigations and data retrieval.

6) Santoku

Santoku is dedicated to mobile forensics, analysis, and security, and packaged in an easy to use, Open Source platform. It is sponsored by the mobile security firm "nowsecure".

Free Forensic tools for Linux

There are several categories of computer forensics tools however, following are well-known categories:

  • Memory forensic analysis
  • Hard drive forensic analysis
  • Forensic imaging
  • Network Forensic

7) Volatility

Since that time, memory analysis has become one of the most important topics to the future of digital investigations and Volatility has become the world’s most widely used memory forensics platform. It is well-known memory forensics framework for incident response and malware analysis which allows to extract digital artifacts from volatile memory (RAM) dumps .Volatility has been used on some of the most critical investigations of the past decade.

Using Volatility you can extract information about running processes, open network sockets and network connections, DLL's loaded for each process, cached registry hives, process IDs, and more. It has become an indispensable digital investigation tool relied upon by law enforcement, military, academia, and commercial investigators throughout the world. Volatility framework supports both Windows and linux platform for forensic investigation

8) Linux "dd" utility

"dd" utility comes by default on the majority of Linux distributions available today (e.g. Ubuntu, Fedora). This tool can be used for various digital forensic tasks such as forensically wiping a drive (zero-ing out a drive) and creating a raw image of a drive. It is a very powerful tool that can have devastating effects if not used with care. It is recommended that you experiment in a safe environment before using this tool in the real world.

9) Sleuth kit (Autopsy)

Sleuth Kit is an open source digital forensics toolkit that can be used to perform in-depth analysis of various file systems (FAT,NTFS, EXT2/3 etc and raw images). Autopsy is a graphical interface that for Sleuth Kit (command line tool). It comes with features like Timeline Analysis, Hash Filtering, File System Analysis and Keyword Searching with the ability to add other modules for extended functionality.

When you launch Autopsy, you can choose to create a new case or load an existing one. To create a new case you will need to load a forensic image to start analysis and once the analysis process is complete, use the nodes on the left hand pane to choose which results to view.

10) Xplico

Xplico is an open source network forensic analysis tool. It is basically used to extract useful data from applications which use Internet and network protocols. It supports most of the popular protocols including HTTP, IMAP, POP, SMTP, SIP, TCP, UDP, TCP and others. Output data of the tool is stored in SQLite database of MySQL database. It also supports IPv4 and IPv6 both. It is already available in Kali Linix, DEFT, Security Onion and Matriux security distributions.

note: plzzz don't give dislike.....plzzz comment if you have any problem i will try to solve your problem.....plzzz give thumbs up i am in need....


Related Solutions

A2Z Forensics is a digital forensics investigation firm that conducts forensic investigations for public as well...
A2Z Forensics is a digital forensics investigation firm that conducts forensic investigations for public as well as private sectors. You are working in this firm as a forensics specialist for a number of years now. The firm is establishing a new forensics lab to meet the future requirements. You have been asked to prepare a business case for this new lab. Your job is to focus on three aspects of the new lab which are hardware, software and lab security....
Discussion Learning Objectives and Outcomes You will learn the phases of incident response and the team...
Discussion Learning Objectives and Outcomes You will learn the phases of incident response and the team members involved who respond to incidents. Discussion Requirements You are provided a handout that describes a scenario in which an incident occurred along with corrective actions taken. The handout also includes a description of the phases of information security incident response. Tasks Discuss the phases of a typical information security incident response. Using the information presented in the handout, discuss the following questions: What...
Policy Implementation Steps Learning Objectives and Outcomes  Explain proper policy implementation steps and describe factors...
Policy Implementation Steps Learning Objectives and Outcomes  Explain proper policy implementation steps and describe factors relating to its success. Scenario Two health care organizations have recently merged. The parent organization is a large medical clinic that is HIPAA compliant. The clinic recently acquired a remote medical clinic that provides a specialty service. The remote clinic is organized in a flat structure, but the parent organization is organized in a hierarchical structure with many departments and medical clinics. These organizations...
LINUX Please conduct some research about the different types of servers there are, provide me 4...
LINUX Please conduct some research about the different types of servers there are, provide me 4 types. Provide me a summary of what you have learned for each.
Linux Commands 8.How would you find out information about systemdon your Linux workstation? 9.A user would...
Linux Commands 8.How would you find out information about systemdon your Linux workstation? 9.A user would like to put the firefoxprogram in the background –what would you type into the command prompt to do this? 10.For the program in above, how would you bring it back into the foreground? 11.What is the fork()function call? 12.In Linux what command sequence do we enter to stop a program? 13.What is the UIDcolumn in the output of the command ps -ef? 14.What is...
Learning Objectives Learn more about the statistical analysis tools in SPSS. Practice manual calculations and confirm...
Learning Objectives Learn more about the statistical analysis tools in SPSS. Practice manual calculations and confirm with SPSS output. Walk through all steps of hypothesis testing for a related-samples t-Test. About Your Data A statistics student was late on completing the final statistics project. While racking her brain for ideas, she watched her cat eating supper and noticed how much quicker the cat ate the new brand of cat food. Feeling desperate about the project, she decided to figure out...
Neurotransmitters paper URGENT Please Objectives of the Assignment Research and learn about the different classes of...
Neurotransmitters paper URGENT Please Objectives of the Assignment Research and learn about the different classes of NTs and Receptors Search for credible information on the web and your textbook Practice research techniques (information literacy) and source citation Start with an introductory paragraph telling the reader what to expect in your paper First, explain the specific release of NT used at the NMJ, the class of receptor it binds to, and how that specific NT is removed from the synaptic cleft...
Consider a research question you are interested in learning more about. think of two variables that...
Consider a research question you are interested in learning more about. think of two variables that you think could be used to answer your question. State which variable is your explanatory variable and which is your response variable. What type is each variable (numeric or categorical), and how is it measured (in years? dollars? education level?).
The table below provides some information about the possible outcomes of a particular study. From the...
The table below provides some information about the possible outcomes of a particular study. From the information provided determine the effect size and power of each scenario. Sketch the distributions involved and show the areas representing alpha, beta, and power for each scenario. You can assume that all the populations are normally distributed. Hint 1: For scenario 1, the power is 80.23%. For scenario 2 the power is 99.63. So be sure to show your work for the rest of...
The Internet provides a wonderful opportunity for doing marketing research and learning about various consumer markets....
The Internet provides a wonderful opportunity for doing marketing research and learning about various consumer markets. In this research paper, you will be preparing a report on the size, location, purchasing power, and market potential for the three largest minority target markets in the country—Hispanic Americans, African Americans, and Asian Americans. Part 1 of the paper is to be in outline form. Part 2 will be narrative (paragraph.) subject is marketing.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT