• We just launched and are currently in beta. Join us as we build and grow the community.

Forensic Investigation Tutorial Using DEFT

ohkson

Digital Asset Manager
O Rep
0
0
0
Rep
0
O Vouches
0
0
0
Vouches
0
Posts
98
Likes
193
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 400 XP
DEFT (acronym for Digital Evidence & Forensics Toolkit) is a distribution made for Computer Forensics, with the purpose of running live on systems without tampering or corrupting devices (hard disks, pen drives, etc…) connected to the PC where the boot process takes place.

The DEFT system is based on GNU Linux; it can run live (via DVDROM or USB pen drive), installed or run as a Virtual Appliance on VMware or Virtual box. DEFT employs LXDE as desktop environment and WINE for executing Windows tools under Linux. It features a comfortable mount manager for device management.

First Download ISO image of deft Linux from here

After having started the DEFT boot loader, you will see a screen with several boot options. Now click on Install DEFT Linux 8

1.png


Now click on continue

2.png


Now Select the third party software option and click on continue.

3.png


Select Guided-use entire disk and click on install now

4.png


Now select your time zone and click ok

5.png


Now fill your personal Details and select Continue. Click on Restart Now.

6.png


7.png


Analysis – Analysis Tools files of different types

analysis.png


Antimalware – Search for root kits, viruses, malware and malicious PDFs.

antimalware.png


Data Recovery – File Recovery Software

adat%2Brecovery.png


Hashing – Scripts that allow the realization of calculating hashes of certain processes (SHA1, SHA256, MD5 …)

hashing.png


Imaging – Applications that we can use to make cloned and imaging of hard drives or other sources.

imaging.png


Mobile Forensics – Analysis Blackberry, Android, iPhone, as well as information about typical databases SQLite mobile devices used by applications.

mobile.png


Network Forensics – Tools for processing information stored in network

netwok.png


OSINT – Applications that facilitate obtaining information associated with users and their activity.

osint.png


Password recovery – Recovery BIOS passwords, compressed files, office, brute force, etc.

password.png


Reporting tools – Finally, within this section you will find tools that will facilitate the task of reporting and obtaining evidence that will serve to document forensics. Screen capture, collection of notes, desktop activity log, etc.

reporting%2Btool.png


Author:
Mukul Mohan
is a Microsoft Certified System Engineer in Security and Messaging. He is a Microsoft Certified Technology Specialist with high level of expertise in handling server side operations based on windows platform. An experienced IT Technical Trainer with over 20 years’ Experience. You can contact him at [email protected]
 

450,270

322,965

322,974

Top