Forensic Network Tools: Win hex, Pro discover Basic, Hex Workshop
Verified
Added on 2023/06/11
|15
|1419
|320
AI Summary
This article discusses the forensic network tools like Win hex, Pro discover Basic, Hex Workshop used for data recovery, IT security, low level data processing and forensics. It also covers analyzing digital evidence and steganography tools like Stegosuite, X-stegsecret and stegdetect.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
6/4/2018Forensics network
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
FORENSIC NETWORK Forensic Tools used: Win hex Pro discover Basic Hex Workshop Win hex Editor: Win hex is a kind of editor. Which is used to edit the hexadecimal.it is just like a universal hexa-decimals editor and it is particularly helpful for the things like data recovery, IT security, low level data processing and forensics("Windows Forensic Analysis Toolkit", 2014).It is an advanced and new tool for date to day and emergency purpose uses like recovering deleted files as well as lost data from our hard disks in corrupted file systems and also camera cards (memory card). Pro Discover Basic: It is an powerful and secured tool that supports and enables computer professionals that is used to find all the files and data on the computer drive when we protecting evidence & quality reports of created evidentiary in the legal proceedings("Practical Forensic Imaging", 2017).It is also an disk image analyzing tool and can analyze and acquire disk partitions. Pro discover is a most noticeable remote client which allows online system to be imaged when they runs in a live file system and also remains file systems to being subject to change. It is a tool which is not a unique one, even though it is more expensive (Ren, 2006). The main feature of pro discover is open source and free of cost and platform independent application.
Forensic Digital Science: Forensic Report Security Control:
Summary of findings: In our System installing the forensic tool namely PDB and HE.PDB stands for Pro Discover Basic and HE stands for Hex Editor. The hex editor tool mainly used for the shifting the bits. In our system contains the file name.txt. Thus the file contains the Cipher text data Converted into the Scrambled bits. By taking the scramble bits data to analysis and put into the hex editor tool .Thus the tool are easily finding out the plain text. The hex editor tool contains the operation toolbar, thus the toolbar are converted the bits into the plain text. If the original Palin text are generated could be change thebits type(Dhammearatchi, 2015).This tool contains the 8,16,32,64 bits types, Change the bits one by one dependent on the original plain text. Another tool used for our windows system .Thus tool are mainly used for the converting the image file only. Thus any viruses occur any images, it could be easily find out the pro discover basic tool. Thus the tool are Commercial one for our windows System. Analyzing digital Evidence In digital evidence analysis you need to recover data. Suspect deleted the file or damage the file or overwritten files on a disk. Now the files are deleted the existing space become free. Forensic investigator need to recover the data .Identify the recourses and gathering the resource in your investigation plan (Lin, Huang & Chang, 2015).To acquireBob Aspen’s from the Information department and then secure the evidence. Forensics workstation must require to conduct investigation and analysis. Computer forensic and data recovery are different. Collection of evidence is mainly used for the Evidence analysis. Evidence collection is used to recover the data and analysis the information easily. Types of Collection Evidence are given below. They are Hearsay and Testimonial.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
TASK 1: Recovering Scrambled bits Win hex editor is the most powerful tool for analyzing. It can be converted the real image into the VMware, thus the tool are converted any of the file System like FAT, NTFS, CDFS, UDF media files (Lin, Huang & Chang, 2015).It is the important and good tool for analyzing. Download Hex Workshop: File -> open -> Load the given text file
Choose the given File: The Scrambled bits are shown the below Figure:
Select the operation tool for choose Shifting: Choose the Left Shift or Right Shift and Select the data as Bits:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TASK 2: Steganography is the tool to compressing the particular thing. The thing may be message, image, or video and audio etc. the steganos came from the Greek word which means “covered, protected or concealed” and graphy means “writing”. The advantage of this steganography to over cryptography singly and secret message does not create any attraction or attention when we view it(Kalougivaki, 2014).It is called object of scrutiny. Inotherwordscryptographyisthepracticeofprotectingthemessagecontentsalone. Steganography is the fact of concealing the secret message and changing the message contents. In simple words steganography is the tool. Steganography has many types of tools in that we are to discuss about the two tools. They are 1. Stegosuite 2. X-stegsecret 3. Stegdetect 1. StegoSuite: Stegosuite is an open source and free tool which is written and coded in java. Using this tool we can easily hide the information in the picture that is an image This is a kind of comprehensive suite application. And which is for design and quickly identify and examine and also analyze digital image as well as audio and video files with hidden information and channels communication(Schiffman, 2003).Without advanced materials and tools it is impossible to identify the secret message content which is present in the image. Stegosuite is the tool to hide the info and data in an image and embedding of multiples and text message .in other words it is encrypted with AES algorithm. Which supports gif, bmp, jpg and jpeg and also png.
2. X-stegsecret Stegsecret is also an open source and which is available in the market with free of cost.it is a java based tool which is a multi-platform tool that allows the hidden information detection. It detects the following things: 1. EOF 2. DCT 3. LSB 4. And other techniques The main aim and ultimate theme of this tool is to collect and implement and to make easier the usage of techniques(Kipper, 2007).Particularly and especially for digital media like audio and video.3stegdetect is a tool which is an automated tool also the main purpose of this tool is finding the hidden contents in the image. The detectable things are invisible secrets, jphide, jsteg, f5, append X and camouflage. 2.1 Open StegoSuite Tool 2.1 Choose file and open your PC
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
2.3 Image open in StegoSuite Tool 2.4 Write Your Encryption Key Below:
2.5 Your Secret message is displayed in below : Reference:
Dhammearatchi, D. (2015). Use of Network Forensic Mechanisms to Formulate Network Security.International Journal Of Managing Information Technology,7(4), 21-36. doi: 10.5121/ijmit.2015.7402 Kalougivaki, J. (2014). Medico-Legal Death Investigation Systems in the Pacific and Creating a StrongerPacificDisasterVictimIdentificationNetwork.JournalOfForensic Research,06(01). doi: 10.4172/2157-7145.1000255 Kipper, G. (2007).Wirelesscrimeand forensic investigation. Boca Raton, FL: Auerbach Publications. Lin, F., Huang, C., & Chang, P. (2015). A cloud-based forensics tracking scheme for online socialnetworkclients.ForensicScienceInternational,255,64-71.doi: 10.1016/j.forsciint.2015.08.011 PracticalForensicImaging.(2017).NetworkSecurity,2017(6),4.doi:10.1016/s1353- 4858(17)30057-0 Ren,W.(2006).ModelingNetworkForensicsBehavior.JournalOfDigitalForensic Practice,1(1), 57-65. doi: 10.1080/15567280600631932 Schiffman, M. (2003).Hacker's challenge 2. New York: McGraw-Hill. Windows Forensic Analysis Toolkit. (2014).Network Security,2014(11), 4. doi: 10.1016/s1353- 4858(14)70109-6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.