The Autopsy Forensics Browser is a graphical interface to The Sleuth Kit (TASK). Autopsy allows one to view allocated and deleted file system content in a "File Manager" style interface, create timelines of file activity, sort files by type, and perform key word searches.
61d752dcec0c92b9a7bb0dcc844a24e8b30913646d2f64d78e2fbb5deb440033
The Sleuth Kit is a collection of open source file system forensics tools that allow one to view allocated and deleted data from NTFS, FAT, FFS, and EXT2FS images. The Autopsy Forensic Browser provides a graphical interface to The Sleuth Kit.
2ef8cd41584b70c595c997932c5f219bf03632be6bf787f6333e75349026b29c
The Autopsy Forensics Browser is a graphical interface to The Sleuth Kit (TASK). Autopsy allows one to view allocated and deleted file system content in a "File Manager" style interface, create timelines of file activity, sort files by type, and perform key word searches.
5e514879f77a30c1b6c5eb222f5fcd42a74dce85c50a61d3ffd185aea07b984e
The Sleuth Kit is a collection of open source file system forensics tools that allow one to view allocated and deleted data from NTFS, FAT, FFS, and EXT2FS images. The Autopsy Forensic Browser provides a graphical interface to The Sleuth Kit.
7d026ec2e16d8ccacece01a494c97bb7f15f0c569ef4841571de6045c95c5c28
The Autopsy Forensic Browser is an HTML-based graphical interface to The here.
cde4370054a7517eb875f440b96f74eecd787db70646c17b539c794decd11608
Open Source Digital Forensics Tools: The Legal Argument - This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a tool must be reliable and relevant. The reliability of evidence is tested by applying "Daubert" guidelines. To date, there have been few legal challenges to digital evidence, but as the field matures this will likely change. This paper examines the Daubert guidelines and shows that open source tools may more clearly and comprehensively meet the guidelines than closed source tools.
1dea4d20683fc6e458972fda2847864b0e3cc1d23d2688366a4a7f52018805f9
The @stake Sleuth Kit (TASK) is an open source forensic toolkit for a complete analysis of Microsoft and UNIX file systems. TASK enables investigators to identify and recover evidence from images acquired during incident response or from live systems. Features the ability to analyze images generated by the 'dd' utility, Supports the NTFS, FAT, FFS, and EXT2FS file systems, 14 command line tools that allow the user to control what data is processed and presented, identify deleted files by name and location, and create time lines of file activity to identify files and directories to analyze.
6ecf9a862791266bd9d6b242a4b64a9536637fb3f0a10d432dab44af3f145f7f
Mac-robber is a forensics and incident response program that collects Modified, Access, and Change (MAC) times from files. Its output can be used as input to the 'mactime' tool in The @stake Sleuth Kit (TASK) to make a time line of file activity. mac-robber is similar to running the 'grave-robber' tool from The Coroner's Toolkit with the '-m' flag, except this is written in C and not Perl.
fba5080859c28624e2e603940d5efd60cb02546d431f19f5ace0fbf4a7ad88db
The Autopsy Forensic Browser is an HTML-based graphical interface to The here.
7082a6700ccd1c6090ef3d8e04453441c07498c803d272c05f52b45e9c6e55ca
The @stake Sleuth Kit (TASK) is an open source forensic toolkit for a complete analysis of Microsoft and UNIX file systems. TASK enables investigators to identify and recover evidence from images acquired during incident response or from live systems. Features the ability to analyze images generated by the 'dd' utility, Supports the NTFS, FAT, FFS, and EXT2FS file systems, 14 command line tools that allow the user to control what data is processed and presented, identify deleted files by name and location, and create time lines of file activity to identify files and directories to analyze.
93b1aef022aa80a1c0bc1eedb0000236c337396313bafb181568418b3c502e18
Atstake security advisory - This advisory describes a vulnerability that exists in Cisco Systems Virtual Central Office 4000 (VCO/4K). There is a vulnerability in the SNMP interface that allows an attacker to enumerate username and obfuscated password pairs for the Telnet interface. Since the obfuscation method used on the passwords is reversible, administrative access to the VCO/4K can be obtained. Perl proof of concept exploit included.
7efd12964efef16b759d3fcdb2af9a30829c39d81b2e68ec5426c943032bfa96
L0pht Security Advisory - Passwords can be easily decrypted by exploiting NetZero's encryption algorithm. Includes proof of concept code to decode the password stored in jnetz.prop.
18ccbc25607e0b2335bd76b829e896cac1e0716922f3dfbdd160e52c8cc11c82