Today we are going to discuss “Network Packet Forensic” by covering some important track such as how Data is transferring between two nodes, what is “OSI 7 layer model” and how Wireshark stores which layers information when capturing the traffic between two networks. As we know, to transfer data from one system to another, we […]
Forensics Tools in Kali Linux
Many instances consider Kali Linux as one of the most popular tools available to security professionals. It offers a robust package of programs that security professionals can use to conduct a host of security-based operations. One part of its division of tools is the forensics tab, which contains a collection of tools explicitly designed for […]
Mobile Forensics Investigation using Cellebrite UFED
The manifold increase in the mobile penetration amongst the world population has interested people from all works of life namely mobile manufactures, service providers, application developers and more to this industry. The quantum jump in the user base and its usage of mobile has even caught the eye of Forensic Experts. Cellebrite UFED: Investigating a […]
Mobile Phone Forensic Investigation using MOBILedit
With MOBILedit Forensic, you can view, search, or retrieve all data from a phone with only a few clicks. Moreover, this data includes call history, phonebook, text messages, multimedia messages, files, calendars, notes, reminders, and raw application data. It will also retrieve all phone information such as IMEI, operating systems, firmware including SIM details (IMSI), […]
Android Mobile Device Forensics with Mobile Phone Examiner Plus
AccessData (AD) provides Mobile Phone Examiner Plus (MPE+), a powerful mobile device data review tool that users can utilize in the field as part of a mobile field unit or in the lab. Additionally, investigators can easily import data that MPE+ extracts from mobile devices into an FTK case, which offers more in-depth drill-down, categorization, […]
How to Retrieve Saved Password from RAW Evidence Image
Creating a New Case in OS Forensic First Download OS Forensic from here and install in your pc then open OS Forensic and click on Create Case button to create a new forensic case. Now enter the details such as Case Name, Investigator Name, Default Drive, and Acquisition Type To specify the case folder, click on browse & select the Location where […]
How to Create a Forensic Image of Android Phone using Magnet Acquire
Magnet ACQUIRETM is designed to quickly and easily acquire an image of any iOS or Android device. Examiners are given the option of two extraction methods: Quick and Full. Firstly Download Magnet Acquire from here and Install in your Computer. Now connect your Android phone with Computer using Data Cable. You will get a pop up on […]
Forensics Investigation of Android Phone using Andriller
Andriller – is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has other features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (and some Apple iOS) databases for decoding communications. Extraction and […]
Logical Forensics of an Android Device using AFLogical
In this article, we explore Android Logical Forensics AFLogical, a method for extracting data from Android devices using the AFLogical OSE tool. By leveraging this approach, forensic analysts can retrieve valuable information such as call logs, SMS messages, and contacts, aiding in digital investigations. Installing and Launching AF Logical OSE on Santoku Linux First need […]
SANTOKU Linux- Overview of Mobile Forensics Operating System
Santoku Linux is dedicated to mobile forensics, analysis, and security, and packaged in an easy to use, Open Source platform. Installing Santoku Linux First Download Santoku ISO image from here After having started the Santoku boot loader, you will see a screen with several boot options. Now click on Install – start the installer directly […]