{"id":1708,"date":"2016-03-14T10:08:36","date_gmt":"2016-03-14T15:08:36","guid":{"rendered":"http:\/\/swildow.darktech.org\/wp\/?p=1708"},"modified":"2016-03-14T10:08:36","modified_gmt":"2016-03-14T15:08:36","slug":"top-20-free-digital-forensic-investigation-tools-for-sysadmins","status":"publish","type":"post","link":"https:\/\/www.wildow.com\/blog\/?p=1708","title":{"rendered":"Top 20 Free Digital Forensic Investigation Tools for SysAdmins"},"content":{"rendered":"<div class=\"post-heading\">\n<div class=\"post-title\">\n<h1>Top 20 Free Digital Forensic Investigation Tools for SysAdmins<\/h1>\n<div class=\"post-meta\">\n<div class=\"ratings\">\n<div id=\"post-ratings-10821\" class=\"post-ratings\" data-nonce=\"7f6c075876\"><a href=\"http:\/\/www.gfi.com\/blog\/top-20-free-digital-forensic-investigation-tools-for-sysadmins\/\" target=\"_blank\">http:\/\/www.gfi.com\/blog\/top-20-free-digital-forensic-investigation-tools-for-sysadmins\/ <\/a><\/div>\n<\/div>\n<div class=\"comments\"><\/div>\n<\/div>\n<div class=\"post-share\"><\/div>\n<\/div>\n<\/div>\n<div class=\"post-entry\">\n<div class=\"post-content\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-thumbnail wp-image-22070\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/J003-Content-Top-20-Free-Digital-Forensic-Investigation-Tools-for-SysAdmins-June-Edits_SQ-150x150.jpg\" alt=\"J003-Content-Top-20-Free-Digital-Forensic-Investigation-Tools-for-SysAdmins-June-Edits_SQ\" width=\"150\" height=\"150\" \/>Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it\u2019s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn a new skill, these suites and utilities will help you conduct memory forensic analysis, hard drive forensic analysis, forensic image exploration, forensic imaging and mobile forensics. As such, they all provide the ability to bring back in-depth information about what\u2019s \u201cunder the hood\u201d of a system.<\/p>\n<div id=\"ulp-inline-gLZBsKdw6DkkDOc8\" class=\"ulp-inline-window\" data-id=\"cbiKoDdv59CzTKSA\" data-title=\"LanGuard-WebMonitor\" data-width=\"650\" data-height=\"550\" data-close=\"on\">\n<div class=\"ulp-content\">\n<div id=\"ulp-inline-layer-gLZBsKdw6DkkDOc8-498\" class=\"ulp-layer\" data-left=\"0\" data-top=\"0\" data-appearance=\"fade-in\" data-appearance-speed=\"1000\" data-appearance-delay=\"200\" data-font-size=\"14\" data-scrollbar=\"off\" data-confirmation=\"off\">\n<div class=\"pop-up-wrapper\">\n<div class=\"header-pop-up\">\n<h2>Try premium business software for FREE for 30 days!<\/h2>\n<\/div>\n<div class=\"right-pop-up1\"><span class=\"pop-up-title\"><img decoding=\"async\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2015\/10\/Popup-LanGuardLogo_inline.png\" alt=\"\" \/><br \/>\nThe most essential tool for sysadmins:<\/span><\/p>\n<ul class=\"pop-up-ul\">\n<li>Automate multiple OS patching<\/li>\n<li>Scan for vulnerabilities<\/li>\n<li>Audit hardware and software<\/li>\n<li>Run compliance reports<\/li>\n<\/ul>\n<div align=\"center\"><input class=\"submit-btn-form\" type=\"submit\" value=\"Get it for FREE now!\" \/><\/div>\n<div align=\"center\"><img decoding=\"async\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2015\/08\/Popup-PC-mag-review02.png\" alt=\"\" \/><\/div>\n<\/div>\n<div class=\"left-pop-up1\"><span class=\"pop-up-title\"><img decoding=\"async\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2015\/10\/Popup-WebMonitorLogo_inline.png\" alt=\"\" data-pin-nopin=\"true\" \/><br \/>\nDiscover, manage and secure your network<\/span><\/p>\n<ul class=\"pop-up-ul\">\n<li>Monitor &amp; control web activity<\/li>\n<li>Manage bandwidth &amp; internet usage<\/li>\n<li>Secure downloads &amp; web browsing<\/li>\n<li>Control of applications &amp; stronger policy<\/li>\n<\/ul>\n<div align=\"center\"><input class=\"submit-btn-form\" type=\"submit\" value=\"Get it for FREE now!\" \/><\/div>\n<div align=\"center\"><img decoding=\"async\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2015\/10\/Popup-RedmondAward.png\" alt=\"\" data-pin-nopin=\"true\" \/><\/div>\n<\/div>\n<\/div>\n<div align=\"center\">No credit card required, Trial also includes GFI technical support<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>This is by no means an extensive list and may not cover everything you need for your investigation. You might also need additional utilities such a file viewers, hash generators, and text editors \u2013 checkout<span class=\"Apple-converted-space\">\u00a0<\/span><b><a href=\"http:\/\/www.gfi.com\/blog\/101-free-admin-tools\/\">101 Free Admin Tools<\/a><\/b><span class=\"Apple-converted-space\">\u00a0<\/span>for some of these.<\/p>\n<p>My articles on<span class=\"Apple-converted-space\">\u00a0<\/span><b><a href=\"http:\/\/www.gfi.com\/blog\/top-10-free-system-troubleshooting-tools-for-sysadmins\/\">Top 10 Free Troubleshooting Tools for SysAdmins<\/a><\/b>,<span class=\"Apple-converted-space\">\u00a0<\/span><b><a href=\"http:\/\/www.gfi.com\/blog\/the-top-20-free-network-monitoring-and-analysis-tools-for-sys-admins\/\">Top 20 Free Network Monitoring and Analysis Tools for Sys Admins<\/a><span class=\"Apple-converted-space\">\u00a0<\/span><\/b>and<span class=\"Apple-converted-space\">\u00a0<\/span><b><a href=\"http:\/\/www.gfi.com\/blog\/the-top-20-free-file-management-tools-for-sys-admins\/\">Top 20 Free File Management Tools for Sys Admins<\/a><span class=\"Apple-converted-space\">\u00a0<\/span><\/b>might also come in handy since they contain a bunch of tools that can be used for Digital Forensic Investigations (e.g. BackTrack and the SysInternals Suite or the NirSoft Suite of tools).<\/p>\n<p>Even if you may have heard of some of these tools before, I\u2019m confident that you\u2019ll find a gem or two amongst this list.<\/p>\n<h2><b><a href=\"http:\/\/computer-forensics.sans.org\/community\/downloads\" target=\"_blank\">01 SANS SIFT<\/a><\/b><\/h2>\n<p>The SANS Investigative Forensic Toolkit (SIFT) is an Ubuntu based Live CD which includes all the tools you need to conduct an in-depth forensic or incident response investigation. It supports analysis of Expert Witness Format (E01), Advanced Forensic Format (AFF), and RAW (dd) evidence formats. SIFT includes tools such as log2timeline for generating a timeline from system logs, Scalpel for data file carving, Rifiuti for examining the recycle bin, and lots more.<\/p>\n<p><a href=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/01-SANS-SIFT.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-10822\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/01-SANS-SIFT.jpg\" alt=\"01 SANS SIFT\" width=\"402\" height=\"221\" \/><\/a><\/p>\n<p>When you first boot into the SIFT environment, I suggest you explore the documentation on the desktop to help you become accustomed to what tools are available and how to use them. There is also a good explanation of where to find evidence on a system. Use the top menu bar to open a tool, or launch it manually from a terminal window.<\/p>\n<h2><b><a href=\"http:\/\/www.techpathways.com\/desktopdefault.aspx?tabindex=8&amp;tabid=14\" target=\"_blank\">02 ProDiscover Basic<\/a><\/b><\/h2>\n<p>ProDiscover Basic is a simple digital forensic investigation tool that allows you to image, analyse and report on evidence found on a drive. Once you add a forensic image you can view the data by content or by looking at the clusters that hold the data. You can also search for data using the Search node based on the criteria you specify.<\/p>\n<p><a href=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/02-ProDiscover-Basic.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-10823\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/02-ProDiscover-Basic.jpg\" alt=\"02 ProDiscover Basic\" width=\"472\" height=\"251\" \/><\/a><\/p>\n<p>When you launch ProDiscover Basic you first need to create or load a project and add evidence from the \u2018Add\u2019 node. You can then use the \u2018Content View\u2019 or \u2018Cluster View\u2019 nodes to analyse the data and the Tools menu to perform actions against the data. Click the \u2018Report\u2019 node to view important information about the project.<\/p>\n<h2><b><a href=\"https:\/\/www.volatilesystems.com\/default\/volatility\" target=\"_blank\">03 Volatility<\/a><\/b><\/h2>\n<p>Volatility is a memory forensics framework for incident response and malware analysis that allows you to extract digital artefacts from volatile memory (RAM) dumps. Using Volatility you can extract information about running processes, open network sockets and network connections, DLLs loaded for each process, cached registry hives, process IDs, and more.<\/p>\n<p><a href=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/03-Volatility.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-10824\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/03-Volatility.jpg\" alt=\"03 Volatility\" width=\"473\" height=\"113\" \/><\/a><\/p>\n<p>If you are using the standalone Windows executable version of Volatility, simply place volatility-2.1.standalone.exe into a folder and open a command prompt window. From the command prompt, navigate to the location of the executable file and type \u201cvolatility-2.1.standalone.exe \u2013f &lt;FILENAME&gt; \u2013profile=&lt;PROFILENAME&gt; &lt;PLUGINNAME&gt;\u201d without quotes \u2013 FILENAME would be the name of the memory dump file you wish to analyse, PROFILENAME would be the machine the memory dump was taken on and PLUGINNAME would be the name of the plugin you wish to use to extract information.<\/p>\n<p><b>Note:<\/b><span class=\"Apple-converted-space\">\u00a0<\/span>In the example above I am using the \u2018connscan\u2019 plugin to search the physical memory dump for TCP connection information.<\/p>\n<h2><b><a href=\"http:\/\/www.sleuthkit.org\/\" target=\"_blank\">04 The Sleuth Kit (+Autopsy)<\/a><\/b><\/h2>\n<p>The Sleuth Kit is an open source digital forensics toolkit that can be used to perform in-depth analysis of various file systems. Autopsy is essentially a GUI that sits on top of The Sleuth Kit. It comes with features like Timeline Analysis, Hash Filtering, File System Analysis and Keyword Searching out of the box, with the ability to add other modules for extended functionality.<\/p>\n<p><b>Note:<span class=\"Apple-converted-space\">\u00a0<\/span><\/b>You can use The Sleuth Kit if you are running a Linux box and Autopsy if you are running a Windows box.<\/p>\n<p><a href=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-10827\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/1.jpg\" alt=\"1\" width=\"506\" height=\"311\" \/><\/a><\/p>\n<p>When you launch Autopsy, you can choose to create a new case or load an existing one. If you choose to create a new case you will need to load a forensic image or a local disk to start your analysis. Once the analysis process is complete, use the nodes on the left hand pane to choose which results to view.<\/p>\n<h2><b><a href=\"http:\/\/www.accessdata.com\/support\/product-downloads\" target=\"_blank\">05 FTK Imager<\/a><\/b><\/h2>\n<p>FTK Imager is a data preview and imaging tool that allows you to examine files and folders on local hard drives, network drives, CDs\/DVDs, and review the content of forensic images or memory dumps. Using FTK Imager you can also create SHA1 or MD5 hashes of files, export files and folders from forensic images to disk, review and recover files that were deleted from the Recycle Bin (providing that their data blocks haven\u2019t been overwritten), and mount a forensic image to view its contents in Windows Explorer.<\/p>\n<p><b>Note:<\/b><span class=\"Apple-converted-space\">\u00a0<\/span>There is a portable version of FTK Imager that will allow you to run it from a USB disk.<\/p>\n<p><a href=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-10829\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/2.jpg\" alt=\"2\" width=\"507\" height=\"460\" \/><\/a><\/p>\n<p>When you launch FTK Imager, go to \u2018File &gt; Add Evidence Item\u2026\u2019 to load a piece of evidence for review. To create a forensic image, go to \u2018File &gt; Create Disk Image\u2026\u2019 and choose which source you wish to forensically image.<\/p>\n<h2><b>06 Linux \u2018dd\u2019<\/b><\/h2>\n<p>dd comes by default on the majority of Linux distributions available today (e.g. Ubuntu, Fedora). This tool can be used for various digital forensic tasks such as forensically wiping a drive (zero-ing out a drive) and creating a raw image of a drive.<\/p>\n<p><b>Note:<\/b><span class=\"Apple-converted-space\">\u00a0<\/span>dd is a very powerful tool that can have devastating effects if not used with care. It is recommended that you experiment in a safe environment before using this tool in the real world.<\/p>\n<p><b>Tip:<\/b><span class=\"Apple-converted-space\">\u00a0<\/span>A modified version of dd is available from<span class=\"Apple-converted-space\">\u00a0<\/span><a href=\"http:\/\/sourceforge.net\/projects\/dc3dd\/\" target=\"_blank\">http:\/\/sourceforge.net\/projects\/dc3dd\/<\/a><span class=\"Apple-converted-space\">\u00a0<\/span>\u2013 dc3dd includes additional features that were added specifically for digital forensic acquisition tasks.<\/p>\n<p><a href=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-10831\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/3.jpg\" alt=\"3\" width=\"490\" height=\"313\" \/><\/a><\/p>\n<p>To use dd, simply open a terminal window and type dd followed by a set of command parameters (which command parameters will obviously depend on what you want to do). The basic dd syntax for forensically wiping a drive is:<\/p>\n<p>dd if=\/dev\/zero of=\/dev\/sdb1 bs=1024<br \/>\n<b><br \/>\n<\/b>where if = input file, of = output file, bs = byte size<\/p>\n<p><b>Note:<\/b><span class=\"Apple-converted-space\">\u00a0<\/span>Replace \/dev\/sdb1 with the drive name of the drive you want to forensically wipe and 1024 with the size of the byte blocks you want to write out.<\/p>\n<p>The basic dd syntax for creating a forensic image of a drive is:<\/p>\n<p>dd if=\/dev\/sdb1 of=\/home\/andrew\/newimage.dd bs=512 conv=noerror,sync<\/p>\n<p>where if = input file (or in this case drive), of = output file, bs = byte size, conv = conversion options<\/p>\n<p><b>Tip:<\/b><span class=\"Apple-converted-space\">\u00a0<\/span>For additional usage info, from a terminal window, type \u201cman dd\u201d without quotes to bring up the help manual for the dd command.<\/p>\n<h2><b><a href=\"http:\/\/www.caine-live.net\/page5\/page5.html\" target=\"_blank\">07 CAINE<\/a><\/b><\/h2>\n<p>CAINE (Computer Aided INvestigative Environment) is Linux Live CD that contains a wealth of digital forensic tools. Features include a user-friendly GUI, semi-automated report creation and tools for Mobile Forensics, Network Forensics, Data Recovery and more.<\/p>\n<p><a href=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-10832\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/4.jpg\" alt=\"4\" width=\"508\" height=\"382\" \/><\/a><\/p>\n<p>When you boot into the CAINE Linux environment, you can launch the digital forensic tools from the CAINE interface (shortcut on the desktop) or from each tool\u2019s shortcut in the \u2018Forensic Tools\u2019 folder on the applications menu bar.<\/p>\n<h2><b><a href=\"http:\/\/www.oxygen-forensic.com\/en\/download\/freeware\" target=\"_blank\">08 Oxygen Forensic Suite 2013 Standard<\/a><\/b><\/h2>\n<p>If you are investigating a case that requires you to gather evidence from a mobile phone to support your case, Oxygen Forensics Suite (Standard Edition) is a tool that will help you achieve this. Features include the ability to gather Device Information (Manufacturer, OS Platform, IMEI, Serial Number, etc.), Contacts, Messages (Emails, SMS, MMS, etc.) and recovery of deleted messages, Call Logs, and Calendar and Task information. It also comes with a file browser which allows you to access and analyse user photos, videos, documents and device databases.<\/p>\n<p><a href=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-10833\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/5.jpg\" alt=\"5\" width=\"507\" height=\"354\" \/><\/a><\/p>\n<p>When you launch Oxygen Forensic Suite, hit the \u2018Connect new device\u2019 button on the top menu bar to launch the Oxygen Forensic Extractor wizard that guides you through selecting the device and type of information you wish to extract.<\/p>\n<h2><b><a href=\"http:\/\/www.hhdsoftware.com\/free-hex-editor\" target=\"_blank\">09 Free Hex Editor Neo<\/a><\/b><\/h2>\n<p>Free Hex Editor Neo is a basic hex editor that was designed to handle very large files. While a lot of the additional features are found in the commercial versions of Hex Editor Neo, I find this tool useful for loading large files (e.g. database files or forensic images) and performing actions such as manual data carving, low-level file editing, information gathering, or searching for hidden data.<\/p>\n<p><a href=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/9.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-10834\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/9.jpg\" alt=\"9\" width=\"508\" height=\"393\" \/><\/a><\/p>\n<p>Use \u2018File &gt; Open\u2019 to load a file into Hex Editor Neo. The data will appear in the middle window where you can begin to navigate through the hex manually or press CTRL + F to run a search.<\/p>\n<h2><b><a href=\"http:\/\/www.forensicswiki.org\/wiki\/Bulk_extractor\" target=\"_blank\">10 Bulk Extractor<\/a><\/b><\/h2>\n<p>bulk_extractor is a computer forensics tool that scans a disk image, file, or directory of files and extracts information such as credit card numbers, domains, e-mail addresses, URLs, and ZIP files. The extracted information is output to a series of text files (which can be reviewed manually or analysed using other forensics tools or scripts).<\/p>\n<p><b>Tip:<\/b><span class=\"Apple-converted-space\">\u00a0<\/span>Within the output text files you will find entries for data that resemble a credit card number, e-mail address, domain name, etc. You will also see a decimal value in the first column of the text file that, when converted to hex, can be used as the pointer on disk where the entry was found (i.e. if you were analysing the disk manually using a hex editor for example, you would jump to this hexadecimal value to view the data).<\/p>\n<p><a href=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/10.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-10835\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/10.jpg\" alt=\"10\" width=\"508\" height=\"401\" \/><\/a><\/p>\n<p>Bulk_extractor comes as a command-line tool or a GUI tool. In the example above I set the bulk extractor tool to extract information from a forensics image I took earlier and output the results to a folder called \u201cBE_Output\u201d. The results can then be viewed in the Bulk Extractor Viewer and the output text files mentioned above.<\/p>\n<h2><b><a href=\"http:\/\/www.deftlinux.net\/download\/\" target=\"_blank\">11 DEFT<\/a><\/b><\/h2>\n<p>DEFT is another Linux Live CD which bundles some of the most popular free and open source computer forensic tools available. It aims to help with Incident Response, Cyber Intelligence and Computer Forensics scenarios. Amongst others, it contains tools for Mobile Forensics, Network Forensics, Data Recovery, and Hashing.<\/p>\n<p><a href=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/11.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-10836\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/11.jpg\" alt=\"11\" width=\"508\" height=\"384\" \/><\/a><\/p>\n<p>When you boot using DEFT, you are asked whether you wish to load the live environment or install DEFT to disk. If you load the live environment you can use the shortcuts on the application menu bar to launch the required tools.<\/p>\n<h2><b><a href=\"http:\/\/www.xplico.org\/download\" target=\"_blank\">12 Xplico<\/a><\/b><\/h2>\n<p>Xplico is an open source Network Forensic Analysis Tool (NFAT) that aims to extract applications data from internet traffic (e.g. Xplico can extract an e-mail message from POP, IMAP or SMTP traffic). Features include support for a multitude of protocols (e.g. HTTP, SIP, IMAP, TCP, UDP), TCP reassembly, and the ability to output data to a MySQL or SQLite database, amongst others.<\/p>\n<p><a href=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/12.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-10837\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/12.jpg\" alt=\"12\" width=\"508\" height=\"259\" \/><\/a><\/p>\n<p>Once you\u2019ve installed Xplico, access the web interface by navigating to http:\/\/&lt;IPADDRESS&gt;:9876 and logging in with a normal user account. The first thing you need to do is create a case and add a new session. When you create a new session you can either load a PCAP file (acquired from Wireshark for example) or start a live capture. Once the session has finished decoding, use the navigation menu on the left hand side to view the results.<\/p>\n<h2><b><a href=\"http:\/\/www.nirsoft.net\/utils\/computer_activity_view.html\" target=\"_blank\">13 LastActivityView<\/a><\/b><\/h2>\n<p>I briefly touched on LastActivityView when pointing out the NirSoft suite of tools in my<span class=\"Apple-converted-space\">\u00a0<\/span><a href=\"http:\/\/www.gfi.com\/blog\/top-10-free-system-troubleshooting-tools-for-sysadmins\/\" target=\"_blank\"><b>Top 10 Free System Troubleshooting Tools for SysAdmins<span class=\"Apple-converted-space\">\u00a0<\/span><\/b><\/a>article. LastActivityView allows you to view what actions were taken by a user and what events occurred on the machine. Any activities such as running an executable file, opening a file\/folder from Explorer, an application or system crash or a user performing a software installation will be logged. The information can be exported to a CSV \/ XML \/ HTML file. This tool is useful when you need to prove that a user (or account) performed an action he or she said they didn\u2019t.<\/p>\n<p><a href=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/13.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-10838\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/13.jpg\" alt=\"13\" width=\"507\" height=\"293\" \/><\/a><\/p>\n<p>When you launch LastActivityView, it will immediately start displaying a list of actions taken on the machine it is being run on. Sort by action time or use the search button to start investigating what actions were taken on the machine.<\/p>\n<h2><a href=\"http:\/\/dsicovery.com\/dsi-software\/usb-write-blocker\/\" target=\"_blank\">14\u00a0<strong>DSi USB Write Blocker<\/strong><\/a><\/h2>\n<p>DSi USB Write Blocker is a software-based write blocker that prevents write access to USB devices. This is important in an investigation to prevent modifying the metadata or timestamps and invalidating the evidence.<\/p>\n<p><a href=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/14-DF.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22066 size-full\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/14-DF.png\" alt=\"14 DF\" width=\"429\" height=\"416\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>When you run DSi USB Write Blocker, it brings up a window that allows you to enable or disable the USB Write Blocker. Once you make changes and exit the application, you can keep an eye on the status from the padlock icon in the taskbar. When performing an analysis of a USB drive, enable the USB Write Blocker first and<span class=\"Apple-converted-space\">\u00a0<\/span><em>then<\/em><span class=\"Apple-converted-space\">\u00a0<\/span>plug the USB drive in.<\/p>\n<p><strong>Note:<\/strong><span class=\"Apple-converted-space\">\u00a0<\/span>If you are looking for a command line alternative USB Write Blocker, check out \u2018USB Write Blocker for ALL Windows\u2019:<span class=\"Apple-converted-space\">\u00a0<\/span><a href=\"http:\/\/sourceforge.net\/projects\/usbwriteblockerforwindows8\/\" target=\"_blank\">http:\/\/sourceforge.net\/projects\/usbwriteblockerforwindows8\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2><b><a href=\"https:\/\/www.mandiant.com\/resources\/download\/redline\" target=\"_blank\">15 Mandiant RedLine<\/a><\/b><\/h2>\n<p>RedLine offers the ability to perform memory and file analysis of a specific host. It collects information about running processes and drivers from memory, and gathers file system metadata, registry data, event logs, network information, services, tasks, and Internet history to help build an overall threat assessment profile.<\/p>\n<p><a href=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/15.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-10840\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/15.jpg\" alt=\"15\" width=\"508\" height=\"312\" \/><\/a><\/p>\n<p>When you launch RedLine, you will be given a choice to Collect Data or Analyze Data. Unless you already have a memory dump file available, you\u2019ll need to create a collector to gather data from the machine and let that process run through to completion. Once you have a memory dump file to hand you can begin your analysis.<\/p>\n<h2><b><a href=\"http:\/\/www.plainsight.info\/index.html\" target=\"_blank\">16 PlainSight<\/a><\/b><\/h2>\n<p>PlainSight is a Live CD based on Knoppix (a Linux distribution) that allows you to perform digital forensic tasks such as viewing internet histories, data carving, USB device usage information gathering, examining physical memory dumps, extracting password hashes, and more.<\/p>\n<p><a href=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/16.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-10841\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/16.jpg\" alt=\"16\" width=\"509\" height=\"383\" \/><\/a><\/p>\n<p>When you boot into PlainSight, a window pops up asking you to select whether you want to perform a scan, load a file or run the wizard. Enter a selection to begin the data extraction and analysis process.<\/p>\n<h2><b><a href=\"http:\/\/mh-nexus.de\/en\/hxd\/\" target=\"_blank\">17 HxD<\/a><\/b><\/h2>\n<p><strong>HxD is one of my personal favourites.<\/strong><span class=\"Apple-converted-space\">\u00a0<\/span>It is a user-friendly hex editor that allows you to perform low-level editing and modifying of a raw disk or main memory (RAM). HxD was designed with easy-of-use and performance in mind and can handle large files without issue. Features include searching and replacing, exporting, checksums\/digests, an in-built file shredder, concatenation or splitting of files, generation of statistics and more.<\/p>\n<p><a href=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/17.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-10842\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/17.jpg\" alt=\"17\" width=\"473\" height=\"451\" \/><\/a><\/p>\n<p>From the HxD interface start your analysis by opening a file from \u2018File &gt; Open\u2019, loading a disk from \u2018Extras &gt; Open disk\u2026\u2019 or loading a RAM process from \u2018Extras &gt; Open RAM\u2026\u2019<\/p>\n<h2><b><a href=\"http:\/\/www.e-fense.com\/products.php\" target=\"_blank\">18 HELIX3 Free<\/a><\/b><\/h2>\n<p>HELIX3 is a Live CD based on Linux that was built to be used in Incident Response, Computer Forensics and E-Discovery scenarios. It is packed with a bunch of open source tools ranging from hex editors to data carving software to password cracking utilities, and more.<\/p>\n<p><b>Note:<\/b><span class=\"Apple-converted-space\">\u00a0<\/span>The HELIX3 version you need is 2009R1. This version was the last free version available before HELIX was taken over by a commercial vendor. HELIX3 2009R1 is still valid today and makes for a useful addition to your digital forensics toolkit.<\/p>\n<p><a href=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/18.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-10843\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/18.jpg\" alt=\"18\" width=\"475\" height=\"359\" \/><\/a><\/p>\n<p>When you boot using HELIX3, you are asked whether you want to load the GUI environment or install HELIX3 to disk. If you choose to load the GUI environment directly (recommended), a Linux-based screen will appear giving you the option to run the graphical version of the bundled tools.<\/p>\n<h2><a href=\"https:\/\/sumuri.com\/products\/paladin\/\" target=\"_blank\"><b>19\u00a0<strong>Paladin Forensic Suite<\/strong><\/b><\/a><\/h2>\n<p>Paladin Forensic Suite is a Live CD based on Ubuntu that is packed with wealth of open source forensic tools. The 80+ tools found on this Live CD are organized into over 25 categories including Imaging Tools, Malware Analysis, Social Media Analysis, Hashing Tools, etc.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22067\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/19-DF-300x225.png\" alt=\"19 DF\" width=\"510\" height=\"383\" \/><\/p>\n<p>After you boot Paladin Forensic Suite, navigate to the App Menu or click on one of the icons in the taskbar to get started.<\/p>\n<p>Note: A handy Quick Start Guide for Paladin Forensic Suite is available to view or download from the Paladin website as well as the taskbar within Paladin itself.<\/p>\n<p>&nbsp;<\/p>\n<h2><a href=\"http:\/\/www.4discovery.com\/our-tools\/\" target=\"_blank\">20\u00a0<strong>USB Historian<\/strong><\/a><\/h2>\n<p>&nbsp;<\/p>\n<p>USB Historian parses USB information, primarily from the Windows registry, to give you a list of all USB drives that were plugged into the machine. It displays information such as the name of the USB drive, the serial number, when it was mounted and by which user account. This information can be very useful when you\u2019re dealing with an investigation whereby you need to understand if data was stolen, moved or accessed.<\/p>\n<p><a href=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/20-DF.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22068\" src=\"http:\/\/www.gfi.com\/blog\/wp-content\/uploads\/2013\/09\/20-DF-300x180.png\" alt=\"20 DF\" width=\"510\" height=\"306\" \/><\/a><\/p>\n<p>When you launch USB Historian, click the \u2018+\u2019 icon on the top menu to launch the data parse wizard. Select which method you want to parse data from (Drive Letter, Windows and Users Folder, or Individual Hives\/Files) and then select the respective data to parse. Once complete you will see information similar to that shown in the above image.<\/p>\n<div class=\"bawmrp\">\n<h3>You may also like:<\/h3>\n<ul>\n<li class=\"bawmrp_manual\"><a href=\"http:\/\/www.gfi.com\/blog\/top-10-free-database-tools-for-sys-admins\/\">Top 10 free database tools for sys admins<\/a><\/li>\n<li class=\"bawmrp_manual\"><a href=\"http:\/\/www.gfi.com\/blog\/top-5-free-rescue-discs-for-your-sys-admin-toolkit\/\">Top 5 Free Rescue Discs for Your Sys Admin Toolkit<\/a><\/li>\n<li class=\"bawmrp_manual\"><a href=\"http:\/\/www.gfi.com\/blog\/the-top-20-free-network-monitoring-and-analysis-tools-for-sys-admins\/\">The Top 20 Free Network Monitoring and Analysis Tools for\u2026<\/a><\/li>\n<li class=\"bawmrp_manual\"><a href=\"http:\/\/www.gfi.com\/blog\/top-20-free-disk-tools-for-sysadmins\/\">Top 20 Free Disk Tools for SysAdmins<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Top 20 Free Digital Forensic Investigation Tools for SysAdmins http:\/\/www.gfi.com\/blog\/top-20-free-digital-forensic-investigation-tools-for-sysadmins\/ Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it\u2019s for an internal human resources case, an investigation into unauthorized access &#8230; <a class=\"more-link\" href=\"https:\/\/www.wildow.com\/blog\/?p=1708\">Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1708","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1708"}],"version-history":[{"count":1,"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1708\/revisions"}],"predecessor-version":[{"id":1709,"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1708\/revisions\/1709"}],"wp:attachment":[{"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}