Total views : 267

Contemplation of Expunged Data with the help of Digital Forensic Toolkits

Affiliations

  • Department of Electronics and Computer Engineering, KL University, Guntur District - 522502, Andhra Pradesh, India

Abstract


Objective: The main motto of this work is to trace the cyber fraud people and moreover we had extended this work in multiple way usage in the forensic mode. Method: So in this method let us imagine a scenario in which something incorrectly happen on the server and on the off chance that if an association will misfortune some kind of information (means if an association will hack and misfortune some critical information. Yes this may happen, it may happen in light of the fact that an assailant more keen than an infiltration analyzer. So after this the time is to get the programmer, for this reason you require a scientific device, so in this article we will talk about DEFT Linux a complete distro for measurable purposes. Findings: The Digital Evidence and Forensic Toolkit or DEFT Linux, is a live distro that gives devices to investigating PC frameworks and gathering criminological confirmation. The distro contains apparatuses for scanning and breaking down circle drives, databases and system movement of Windows and Linux frameworks. Application: DEFT incorporates instruments to bolster Incident Response, Cyber Intelligence and Computer Forensics. It incorporates WINE and the Digital Advanced Response Toolkit (DART). The essential center of the distro is the precise and dependable gathering of proof for use in criminal procedures. Thus, most DEFT devices are arranged to gathering data without changing the framework being analyzed. And more over we had used FTK imager and Winhex, data recovery tools to find suspect. So, finally in this paper we are going to test an unapproved information with a planned results.

Keywords

DART, DEFT, Computer Forensic, Cyber Intelligence, Penetration.

Full Text:

 |  (PDF views: 198)

References


  • Talatam DR, Vankayalapati SM. Exploring the Social Engineering Toolkit (SET) using Backtrack 5R3. IJERA. 2014 Dec; 4(12):240–4.
  • Kamyab M, Delafrooz N. Investigating the effect of personality traits, subjective norms and perceptions of customers on using Internet Banking. Indian Journal of Science and Technology. 2016 Jan; 9(1):1–8.
  • Sindhu KK, Meshram BB. Digital forensic investigation using WinHex Tool. International Journal of Computer Science and Technology. 2012 Jan–Mar; 3(1):1–7.
  • Krombholz K, Hobel H, Huber M, Weipple E. Advanced social engineering attacks. Journal of Information Security and Applications. 2015 Jun; 22:113–22.
  • Cegan Jakub, Vizvary M. Lessons learned from KYPO Cyber Exercise and Research Platform Project. Security and Protection of Information; Brno: University of Defence; 2015 May. p. 1–11.
  • Kamble DR, Jain N. Digital Forensic Tools: A comparative approach. International Journal of Advance Research in Science and Engineering. 2015 Feb; 4(2):1–12.
  • Hejazi SM, Debbabi TC. Extraction of forensically sensitive information from windows physical memory. DFRWS Digital Investigation. 2009 Sep; 6: S121–31.
  • Ariffin A, Choo KKR, Slay J. Digital camcorder forensics. Proceedings of the Eleventh Australasian Information Security Conference (AISC 2013); Adelaide, Australia. 2013; 138:1–10.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.