logo

Forensic Network Tools: Win hex, Pro discover Basic, Hex Workshop

   

Added on  2023-06-11

15 Pages1419 Words320 Views
6/4/2018
Forensics
network
Forensic Network Tools: Win hex, Pro discover Basic, Hex Workshop_1
FORENSIC NETWORK
Forensic Tools used:
Win hex
Pro discover Basic
Hex Workshop
Win hex Editor:
Win hex is a kind of editor. Which is used to edit the hexadecimal.it is just like a
universal hexa-decimals editor and it is particularly helpful for the things like data
recovery, IT security, low level data processing and forensics ("Windows Forensic
Analysis Toolkit", 2014).It is an advanced and new tool for date to day and emergency
purpose uses like recovering deleted files as well as lost data from our hard disks in
corrupted file systems and also camera cards (memory card).
Pro Discover Basic:
It is an powerful and secured tool that supports and enables computer professionals that is
used to find all the files and data on the computer drive when we protecting evidence &
quality reports of created evidentiary in the legal proceedings ("Practical Forensic
Imaging", 2017).It is also an disk image analyzing tool and can analyze and acquire disk
partitions. Pro discover is a most noticeable remote client which allows online system to
be imaged when they runs in a live file system and also remains file systems to being
subject to change. It is a tool which is not a unique one, even though it is more expensive
(Ren, 2006). The main feature of pro discover is open source and free of cost and
platform independent application.
Forensic Network Tools: Win hex, Pro discover Basic, Hex Workshop_2
Forensic Digital Science:
Forensic Report Security Control:
Forensic Network Tools: Win hex, Pro discover Basic, Hex Workshop_3
Summary of findings:
In our System installing the forensic tool namely PDB and HE.PDB stands for Pro
Discover Basic and HE stands for Hex Editor. The hex editor tool mainly used for the shifting
the bits. In our system contains the file name.txt. Thus the file contains the Cipher text data
Converted into the Scrambled bits. By taking the scramble bits data to analysis and put into the
hex editor tool .Thus the tool are easily finding out the plain text. The hex editor tool contains the
operation toolbar, thus the toolbar are converted the bits into the plain text. If the original Palin
text are generated could be change the bits type (Dhammearatchi, 2015).This tool contains the
8,16,32,64 bits types, Change the bits one by one dependent on the original plain text. Another
tool used for our windows system .Thus tool are mainly used for the converting the image file
only. Thus any viruses occur any images, it could be easily find out the pro discover basic tool.
Thus the tool are Commercial one for our windows System.
Analyzing digital Evidence
In digital evidence analysis you need to recover data. Suspect deleted the file or
damage the file or overwritten files on a disk. Now the files are deleted the existing space
become free. Forensic investigator need to recover the data .Identify the recourses and gathering
the resource in your investigation plan (Lin, Huang & Chang, 2015).To acquire Bob Aspen’s
from the Information department and then secure the evidence. Forensics workstation must
require to conduct investigation and analysis. Computer forensic and data recovery are different.
Collection of evidence is mainly used for the Evidence analysis. Evidence collection is used to
recover the data and analysis the information easily. Types of Collection Evidence are given
below. They are Hearsay and Testimonial.
Forensic Network Tools: Win hex, Pro discover Basic, Hex Workshop_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Digital Forensics Report for EMTS Organization
|28
|2503
|371

Tasks And forensic report Assignment
|20
|2743
|107

University Semester.
|25
|2602
|55

Digital Forensics: Recovering Scrambled Bits and Suspicious Data
|25
|2901
|132

Digital forensic investigation PDF
|21
|2438
|167

Digital Forensics: Recovering Deleted Files from USB using Winhex and Stenography Tool
|22
|2401
|395