Forensic Network Tools: Win hex, Pro discover Basic, Hex Workshop
VerifiedAdded on 2023/06/11
|15
|1419
|320
AI Summary
This article discusses the forensic network tools like Win hex, Pro discover Basic, Hex Workshop used for data recovery, IT security, low level data processing and forensics. It also covers analyzing digital evidence and steganography tools like Stegosuite, X-stegsecret and stegdetect.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
6/4/2018 Forensics
network
network
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
FORENSIC NETWORK
Forensic Tools used:
Win hex
Pro discover Basic
Hex Workshop
Win hex Editor:
Win hex is a kind of editor. Which is used to edit the hexadecimal.it is just like a
universal hexa-decimals editor and it is particularly helpful for the things like data
recovery, IT security, low level data processing and forensics ("Windows Forensic
Analysis Toolkit", 2014).It is an advanced and new tool for date to day and emergency
purpose uses like recovering deleted files as well as lost data from our hard disks in
corrupted file systems and also camera cards (memory card).
Pro Discover Basic:
It is an powerful and secured tool that supports and enables computer professionals that is
used to find all the files and data on the computer drive when we protecting evidence &
quality reports of created evidentiary in the legal proceedings ("Practical Forensic
Imaging", 2017).It is also an disk image analyzing tool and can analyze and acquire disk
partitions. Pro discover is a most noticeable remote client which allows online system to
be imaged when they runs in a live file system and also remains file systems to being
subject to change. It is a tool which is not a unique one, even though it is more expensive
(Ren, 2006). The main feature of pro discover is open source and free of cost and
platform independent application.
Forensic Tools used:
Win hex
Pro discover Basic
Hex Workshop
Win hex Editor:
Win hex is a kind of editor. Which is used to edit the hexadecimal.it is just like a
universal hexa-decimals editor and it is particularly helpful for the things like data
recovery, IT security, low level data processing and forensics ("Windows Forensic
Analysis Toolkit", 2014).It is an advanced and new tool for date to day and emergency
purpose uses like recovering deleted files as well as lost data from our hard disks in
corrupted file systems and also camera cards (memory card).
Pro Discover Basic:
It is an powerful and secured tool that supports and enables computer professionals that is
used to find all the files and data on the computer drive when we protecting evidence &
quality reports of created evidentiary in the legal proceedings ("Practical Forensic
Imaging", 2017).It is also an disk image analyzing tool and can analyze and acquire disk
partitions. Pro discover is a most noticeable remote client which allows online system to
be imaged when they runs in a live file system and also remains file systems to being
subject to change. It is a tool which is not a unique one, even though it is more expensive
(Ren, 2006). The main feature of pro discover is open source and free of cost and
platform independent application.
Forensic Digital Science:
Forensic Report Security Control:
Forensic Report Security Control:
Summary of findings:
In our System installing the forensic tool namely PDB and HE.PDB stands for Pro
Discover Basic and HE stands for Hex Editor. The hex editor tool mainly used for the shifting
the bits. In our system contains the file name.txt. Thus the file contains the Cipher text data
Converted into the Scrambled bits. By taking the scramble bits data to analysis and put into the
hex editor tool .Thus the tool are easily finding out the plain text. The hex editor tool contains the
operation toolbar, thus the toolbar are converted the bits into the plain text. If the original Palin
text are generated could be change the bits type (Dhammearatchi, 2015).This tool contains the
8,16,32,64 bits types, Change the bits one by one dependent on the original plain text. Another
tool used for our windows system .Thus tool are mainly used for the converting the image file
only. Thus any viruses occur any images, it could be easily find out the pro discover basic tool.
Thus the tool are Commercial one for our windows System.
Analyzing digital Evidence
In digital evidence analysis you need to recover data. Suspect deleted the file or
damage the file or overwritten files on a disk. Now the files are deleted the existing space
become free. Forensic investigator need to recover the data .Identify the recourses and gathering
the resource in your investigation plan (Lin, Huang & Chang, 2015).To acquire Bob Aspen’s
from the Information department and then secure the evidence. Forensics workstation must
require to conduct investigation and analysis. Computer forensic and data recovery are different.
Collection of evidence is mainly used for the Evidence analysis. Evidence collection is used to
recover the data and analysis the information easily. Types of Collection Evidence are given
below. They are Hearsay and Testimonial.
In our System installing the forensic tool namely PDB and HE.PDB stands for Pro
Discover Basic and HE stands for Hex Editor. The hex editor tool mainly used for the shifting
the bits. In our system contains the file name.txt. Thus the file contains the Cipher text data
Converted into the Scrambled bits. By taking the scramble bits data to analysis and put into the
hex editor tool .Thus the tool are easily finding out the plain text. The hex editor tool contains the
operation toolbar, thus the toolbar are converted the bits into the plain text. If the original Palin
text are generated could be change the bits type (Dhammearatchi, 2015).This tool contains the
8,16,32,64 bits types, Change the bits one by one dependent on the original plain text. Another
tool used for our windows system .Thus tool are mainly used for the converting the image file
only. Thus any viruses occur any images, it could be easily find out the pro discover basic tool.
Thus the tool are Commercial one for our windows System.
Analyzing digital Evidence
In digital evidence analysis you need to recover data. Suspect deleted the file or
damage the file or overwritten files on a disk. Now the files are deleted the existing space
become free. Forensic investigator need to recover the data .Identify the recourses and gathering
the resource in your investigation plan (Lin, Huang & Chang, 2015).To acquire Bob Aspen’s
from the Information department and then secure the evidence. Forensics workstation must
require to conduct investigation and analysis. Computer forensic and data recovery are different.
Collection of evidence is mainly used for the Evidence analysis. Evidence collection is used to
recover the data and analysis the information easily. Types of Collection Evidence are given
below. They are Hearsay and Testimonial.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
TASK 1:
Recovering Scrambled bits
Win hex editor is the most powerful tool for analyzing. It can be converted the real image into the
VMware, thus the tool are converted any of the file System like FAT, NTFS, CDFS, UDF media files
(Lin, Huang & Chang, 2015).It is the important and good tool for analyzing.
Download Hex Workshop:
File -> open -> Load the given text file
Recovering Scrambled bits
Win hex editor is the most powerful tool for analyzing. It can be converted the real image into the
VMware, thus the tool are converted any of the file System like FAT, NTFS, CDFS, UDF media files
(Lin, Huang & Chang, 2015).It is the important and good tool for analyzing.
Download Hex Workshop:
File -> open -> Load the given text file
Choose the given File:
The Scrambled bits are shown the below Figure:
The Scrambled bits are shown the below Figure:
Select the operation tool for choose Shifting:
Choose the Left Shift or Right Shift and Select the data as Bits:
Choose the Left Shift or Right Shift and Select the data as Bits:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Finally the Original Plain text are given below:
TASK 2:
Steganography is the tool to compressing the particular thing. The thing may be message, image,
or video and audio etc. the steganos came from the Greek word which means “covered, protected
or concealed” and graphy means “writing”.
The advantage of this steganography to over cryptography singly and secret message does not
create any attraction or attention when we view it (Kalougivaki, 2014).It is called object of
scrutiny.
In other words cryptography is the practice of protecting the message contents alone.
Steganography is the fact of concealing the secret message and changing the message contents.
In simple words steganography is the tool.
Steganography has many types of tools in that we are to discuss about the two tools. They are
1. Stegosuite
2. X-stegsecret
3. Stegdetect
1. StegoSuite:
Stegosuite is an open source and free tool which is written and coded in java.
Using this tool we can easily hide the information in the picture that is an image
This is a kind of comprehensive suite application. And which is for design and quickly identify
and examine and also analyze digital image as well as audio and video files with hidden
information and channels communication (Schiffman, 2003) .Without advanced materials and
tools it is impossible to identify the secret message content which is present in the image.
Stegosuite is the tool to hide the info and data in an image and embedding of multiples and text
message .in other words it is encrypted with AES algorithm. Which supports gif, bmp, jpg and
jpeg and also png.
Steganography is the tool to compressing the particular thing. The thing may be message, image,
or video and audio etc. the steganos came from the Greek word which means “covered, protected
or concealed” and graphy means “writing”.
The advantage of this steganography to over cryptography singly and secret message does not
create any attraction or attention when we view it (Kalougivaki, 2014).It is called object of
scrutiny.
In other words cryptography is the practice of protecting the message contents alone.
Steganography is the fact of concealing the secret message and changing the message contents.
In simple words steganography is the tool.
Steganography has many types of tools in that we are to discuss about the two tools. They are
1. Stegosuite
2. X-stegsecret
3. Stegdetect
1. StegoSuite:
Stegosuite is an open source and free tool which is written and coded in java.
Using this tool we can easily hide the information in the picture that is an image
This is a kind of comprehensive suite application. And which is for design and quickly identify
and examine and also analyze digital image as well as audio and video files with hidden
information and channels communication (Schiffman, 2003) .Without advanced materials and
tools it is impossible to identify the secret message content which is present in the image.
Stegosuite is the tool to hide the info and data in an image and embedding of multiples and text
message .in other words it is encrypted with AES algorithm. Which supports gif, bmp, jpg and
jpeg and also png.
2. X-stegsecret
Stegsecret is also an open source and which is available in the market with free of cost.it is a
java based tool which is a multi-platform tool that allows the hidden information detection. It
detects the following things:
1. EOF
2. DCT
3. LSB
4. And other techniques
The main aim and ultimate theme of this tool is to collect and implement and to make easier the
usage of techniques (Kipper, 2007).Particularly and especially for digital media like audio and
video.3stegdetect is a tool which is an automated tool also the main purpose of this tool is
finding the hidden contents in the image. The detectable things are invisible secrets, jphide, jsteg,
f5, append X and camouflage.
2.1 Open StegoSuite Tool
2.1 Choose file and open your PC
Stegsecret is also an open source and which is available in the market with free of cost.it is a
java based tool which is a multi-platform tool that allows the hidden information detection. It
detects the following things:
1. EOF
2. DCT
3. LSB
4. And other techniques
The main aim and ultimate theme of this tool is to collect and implement and to make easier the
usage of techniques (Kipper, 2007).Particularly and especially for digital media like audio and
video.3stegdetect is a tool which is an automated tool also the main purpose of this tool is
finding the hidden contents in the image. The detectable things are invisible secrets, jphide, jsteg,
f5, append X and camouflage.
2.1 Open StegoSuite Tool
2.1 Choose file and open your PC
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
2.3 Image open in StegoSuite Tool
2.4 Write Your Encryption Key Below:
2.4 Write Your Encryption Key Below:
2.5 Your Secret message is displayed in below :
Reference:
Reference:
Dhammearatchi, D. (2015). Use of Network Forensic Mechanisms to Formulate Network
Security. International Journal Of Managing Information Technology, 7(4), 21-36. doi:
10.5121/ijmit.2015.7402
Kalougivaki, J. (2014). Medico-Legal Death Investigation Systems in the Pacific and Creating a
Stronger Pacific Disaster Victim Identification Network. Journal Of Forensic
Research, 06(01). doi: 10.4172/2157-7145.1000255
Kipper, G. (2007). Wireless crime and forensic investigation. Boca Raton, FL: Auerbach
Publications.
Lin, F., Huang, C., & Chang, P. (2015). A cloud-based forensics tracking scheme for online
social network clients. Forensic Science International, 255, 64-71. doi:
10.1016/j.forsciint.2015.08.011
Practical Forensic Imaging. (2017). Network Security, 2017(6), 4. doi: 10.1016/s1353-
4858(17)30057-0
Ren, W. (2006). Modeling Network Forensics Behavior. Journal Of Digital Forensic
Practice, 1(1), 57-65. doi: 10.1080/15567280600631932
Schiffman, M. (2003). Hacker's challenge 2. New York: McGraw-Hill.
Windows Forensic Analysis Toolkit. (2014). Network Security, 2014(11), 4. doi: 10.1016/s1353-
4858(14)70109-6
Security. International Journal Of Managing Information Technology, 7(4), 21-36. doi:
10.5121/ijmit.2015.7402
Kalougivaki, J. (2014). Medico-Legal Death Investigation Systems in the Pacific and Creating a
Stronger Pacific Disaster Victim Identification Network. Journal Of Forensic
Research, 06(01). doi: 10.4172/2157-7145.1000255
Kipper, G. (2007). Wireless crime and forensic investigation. Boca Raton, FL: Auerbach
Publications.
Lin, F., Huang, C., & Chang, P. (2015). A cloud-based forensics tracking scheme for online
social network clients. Forensic Science International, 255, 64-71. doi:
10.1016/j.forsciint.2015.08.011
Practical Forensic Imaging. (2017). Network Security, 2017(6), 4. doi: 10.1016/s1353-
4858(17)30057-0
Ren, W. (2006). Modeling Network Forensics Behavior. Journal Of Digital Forensic
Practice, 1(1), 57-65. doi: 10.1080/15567280600631932
Schiffman, M. (2003). Hacker's challenge 2. New York: McGraw-Hill.
Windows Forensic Analysis Toolkit. (2014). Network Security, 2014(11), 4. doi: 10.1016/s1353-
4858(14)70109-6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 out of 15
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.