Digital Forensics Framework

Digital Forensics Framework (DFF)
Original author(s) Frédéric Baguelin, Solal Jacob, Christophe Malinge, Jérémy Mounier
Developer(s) Frédéric Baguelin, Solal Jacob, Jérémy Mounier
Stable release 1.3.0[1] / February 28, 2013 (2013-02-28)
Development status Active
Written in C++, Python, PyQt4
Operating system Unix-like, Windows
Available in 7 languages
Type Computer forensics
License GPL
Website www.digital-forensic.org

Digital Forensics Framework (DFF) is computer forensics open-source software. It is used by professionals and non-experts to collect, preserve and reveal digital evidence without compromising systems and data.[2]

User interfaces

Digital Forensics Framework offers a graphical user interface (GUI) developed in PyQt and a classical tree view. Features such as recursive view, tagging, live search and bookmarking are available. Its command line interface allows the user to remotely perform digital investigation. It comes with common shell functions such as completion, task management, globing and keyboard shortcuts. DFF can run batch scripts at startup to automate repetitive tasks. Advanced users and developers can use DFF directly from a Python interpreter to script their investigation.

Distribution methods

In addition to the source code package and binary installers for GNU/Linux and Windows,[3] Digital Forensics Framework is available in operating system distributions as is typical in free and open-source software (FOSS), including Debian,[4] Fedora and[5] Ubuntu.

Other Digital Forensics Framework methods available are digital forensics oriented distribution and live cd:

Publications

Published books that mention Digital Forensics Framework are:

In literature

'Erik gives her another appreciative once over before handing her a laptop and turning all business minded. "We've been using the Digital Forensics Framework, ran various algorithms, including k-means clustering, but we keep coming up empty.” “What about SSH, cryptographic algorithms?” Raina asks ...'

White papers

Prize

DFF was used to solve the 2010 Digital Forensic Research Workshop (DFRWS) challenge consisting of the reconstructing a physical dump of a NAND flash memory.[24]

References

  1. "[dff] Digital Forensics Framework 1.3.0 released". Lists.digital-forensic.org. Retrieved 2014-02-16.
  2. "Welcome to S.B. Jain Institute of Technology Management and Research". ArxSys. Retrieved 28 May 2014.
  3. "Open Source digital forensics & incident response software". Digital-forensic.org. Retrieved 2014-02-16.
  4. "DFF accepted into Debian - Pollux's blog". Wzdftpd.net. Retrieved 2014-02-16.
  5. https://web.archive.org/20131104091132/http://www.cert.org/forensics/tools/. Archived from the original on November 4, 2013. Retrieved January 24, 2014. Missing or empty |title= (help)
  6. "DEFT 8 Roadmap and features | DEFT Linux - Computer Forensics live CD". DEFT Linux. Retrieved 2014-02-16.
  7. "Packages Summary". Git.kali.org. 2013-02-02. Retrieved 2014-02-16.
  8. "Misc 70 - LES EDITIONS DIAMOND". Boutique.ed-diamond.com. Retrieved 2014-02-16.
  9. https://web.archive.org/20140202175327/http://www.esgilab-secu.com/fiche.php. Archived from the original on February 2, 2014. Retrieved January 24, 2014. Missing or empty |title= (help)
  10. "Digital Forensics with Open Source Tools: Cory Altheide, Harlan Carvey: 9781597495868: Amazon.com: Books". Amazon.com. Retrieved 2014-02-16.
  11. "Computer-Forensik Hacks: Amazon.de: Lorenz Kuhlee, Victor Völzow: Bücher". Amazon.de. 2009-09-09. Retrieved 2014-02-16.
  12. "Malwares - Identification, analyse et éradication: Amazon.fr: Paul Rascagneres: Livres". Amazon.fr. 2009-09-09. Retrieved 2014-02-16.
  13. "Digital Forensics for Handheld Devices: Amazon.fr: Eamon P. Doherty: Livres anglais et étrangers". Amazon.fr. 2009-09-09. Retrieved 2014-02-16.
  14. "Saving Rain: The First Novel in The Rain Trilogy eBook: Karen-Anne Stewart: Kindle Store". Amazon.com. Retrieved 2014-02-16.
  15. "IEEE Xplore Abstract - Selective Imaging Revisited". Ieeexplore.ieee.org. 2013-03-14. doi:10.1109/IMF.2013.16. Retrieved 2014-02-16.
  16. "A survey of main memory acquisition and analysis techniques for the windows operating system". Digital Investigation (Sciencedirect.com) 8: 3–22. 2011-07-31. doi:10.1016/j.diin.2011.06.002. Retrieved 2014-02-16.
  17. "Uforia: Universal forensic indexer and analyzer - Springer". Link.springer.com. Retrieved 2014-02-16.
  18. "IEEE Xplore Abstract - Visualizing Indicators of Rootkit Infections in Memory Forensics". Ieeexplore.ieee.org. 2013-03-14. doi:10.1109/IMF.2013.12. Retrieved 2014-02-16.
  19. "EM-DMKM Case Study Computer and Network Forensics" (PDF). Cygalski.pl. Retrieved 2014-02-16.
  20. "L'investigation numerique" (PDF) (in French). Agence-nationale-recherche.fr. Retrieved 2014-02-16.
  21. "Journal of Computer Applications : Vol.31 No.11". Joca.cn. November 2011. Retrieved 2014-02-16.
  22. "DFRWS 2010 Forensics Challenge Results". Dfrws.org. Retrieved 2014-02-16.

External links

This article is issued from Wikipedia - version of the Friday, February 26, 2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.