Skip to content

Forensic Tools

links: DF TOC - Labs & Tools - Index


Default tools that can be used for forensics:

  • ls: Lists directory contents. Useful for quickly viewing files and directories.
  • cat: Concatenates and displays file content. Can be used to read files.
  • grep: Searches through text using patterns. Ideal for finding specific data within files.
  • find: Searches for files and directories. Useful for locating specific files based on various criteria.
  • dd: Converts and copies files. Commonly used for creating disk images.
  • hexdump: Displays file content in hexadecimal format. Useful for examining file headers and raw data.
  • stat: Displays file or filesystem status. Provides metadata like access time, modification time, and size.
  • strings: Extracts printable strings from files. Can reveal hidden information in binaries.
  • file: Determines file type. Helps in identifying unknown files.
  • mount: Attaches file systems to directories. Used for mounting disk images or partitions.
  • umount: Detaches file systems. Ensures that changes to mounted filesystems are properly saved.
  • ps: Reports a snapshot of current processes. Useful for identifying running processes and their details.
  • netstat: Displays network connections, routing tables, and interface statistics. Helps in network forensics.
  • dmesg: Displays kernel ring buffer messages, useful for diagnosing hardware and system issues.
  • journalctl: A command to query and display messages from the journal, which logs systemd messages and events.

Forensic tools

  • disktype: A command-line utility that provides detailed information about disk images and partitions.
  • dc3dd: A forensic disk imaging tool similar to dd but with additional features such as data verification and logging.
  • dcfldd: An enhanced version of dd developed by the U.S. Department of Defense Computer Forensics Lab (DCFL). It includes features like progress indicators and multiple output files.
  • sfsimage: A forensic imaging tool that captures images of filesystems.
  • ewfacquire: Part of the [[[[Forensic Acquisition#Popular Forensic Formats|EWF]] (Expert Witness Format) toolkit, used for acquiring disk images in the EWF format.
  • ftkimager: A data imaging utility that allows the creation of forensic images of local hard drives, CDs, DVDs, and USB devices.
  • guymager: An open-source forensic imager for media acquisition. It provides a graphical user interface and supports various image formats.
  • foremost: A file carving tool that recovers files based on their headers, footers, and internal data structures.
  • bulk_extractor: A tool that scans disk images, files, or directories to extract useful information such as email addresses, URLs, and other artifacts.
  • lshw: Lists detailed information about the hardware configuration of the system.
  • lspci: Displays information about PCI buses and the devices connected to them.
  • lsusb: Lists USB devices connected to the system and provides detailed information about each device.
  • lsblk: Lists information about all available block devices, such as hard drives and their partitions.
  • hdparm: A command-line utility for displaying and setting hardware parameters of hard disk drives.
  • smartctl: Part of the Smartmontools package, it is used to monitor and control storage devices using the Self-Monitoring, Analysis, and Reporting Technology (SMART) system built into most modern drives.

Sleuth Kit

Autopsy: A graphical interface to The Sleuth Kit. Helps in analyzing disk images, file systems, and digital artifacts.

Partitions and Forensic File Formats:

  • mmcat: Concatenates partitions.
  • mmls: Lists partition layout.
  • mmstat: Displays partition statistics.
  • fsstat: Displays file system details.
  • img_cat: Concatenates disk images.
  • img_stat: Displays disk image details.

Analyzing by Blocks/Sectors:

  • blkcalc: Maps blocks back to their original locations.
  • blkcat: Displays block contents (similar to dd).
  • blkls: Lists blocks (allocated, unallocated, slack).
  • blkstat: Displays block details.

Analyzing by Inodes:

  • icat: Extracts file contents by inode number.
  • ifind: Finds the inode corresponding to a block or filename.
  • ils: Lists inode details.
  • istat: Displays inode statistics.
  • tsk_recover: Recovers deleted files based on inode information.

Analyzing by Filename:

  • fcat: Extracts file contents by filename.
  • ffind: Finds filename based on inode.
  • fls: Lists file and directory names.
  • fiwalk: Walks through file system metadata.

Journaling Filesystems:

  • jcat: Extracts data from a file system journal.
  • jls: Lists entries in a file system journal.
  • usnjls: Lists USN journal entries (Windows).

Timelines:

  • mactime: Creates a timeline from metadata.
  • tsk_gettimes: Extracts timeline information from files.

Search and Sort:

  • jpeg_extract: Extracts JPEG images from unallocated space.
  • sigfind: Finds file signatures.
  • sorter: Sorts files based on their metadata.
  • srch: Searches for a string within files.
  • strings: Extracts printable strings from files.
  • tsk_comparedir: Compares directory contents.
  • hfind: Looks up hash values in a hash database.
  • tsk_loaddb: Loads TSK data into a database.

Other Data Extraction:

  • jls: Lists entries in a file system journal.
  • jcat: Extracts data from a file system journal.
  • isoinfo: Provides information about ISO images.
  • isodump: Dumps data from ISO images.
  • findkey: Finds keys in a disk image (part of TCT).

links: DF TOC - Labs & Tools - Index