Www.belkasoft.com Belkasoft Acquisition and Analysis Suite.

Slides:



Advertisements
Similar presentations
Intel® RPIER 3.1 User Training Joe Schwendt Steve Mancini 7/31/2006.
Advertisements

Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
XProtect ® Professional Efficient solutions for mid-sized installations.
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
{ Making Microsoft Office work for you Organizing Your Life at work and home in the Cloud Presented by: Matthew Baker (321)
Objectives Overview Define an operating system
This presentation will take a look at to prevent your information from being discovered by and investigator.
Effective Discovery Techniques In Computer Crime Cases.
No Nonsense File Collection Presented by: Pinpoint Labs Presenter: Jon Rowe, CCE, ISFCE Certified Computer Examiner Members: The International Society.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Guide to Computer Forensics and Investigations Fourth Edition
You can run that from a USB Drive ? Portable Applications: the good, the bad and the ugly Jeff Gimbel © 2007.
XProtect ® Essential Brilliant simplicity. With support for up to 26 cameras, XProtect Essential is cost-efficient and easy to use IP video surveillance.
COEN 252 Computer Forensics
Capturing Computer Evidence Extracting Information.
Installing Windows Vista Lesson 2. Skills Matrix Technology SkillObjective DomainObjective # Performing a Clean Installation Set up Windows Vista as the.
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
XProtect ® Enterprise. XProtect Enterprise is comprehensive IP video surveillance software with interactive monitoring capabilities The perfect match.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
USING THE CLOUD 1. WHAT IS CLOUD COMPUTING? Cloud computing means storing and accessing data and programs over the Internet instead of your computer's.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
eScan Total Security Suite with Cloud Security
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
How to discover ephemeral evidence with Live RAM analysis.
Hardware vs. Software Computer systems consist of both hardware and software. Hardware refers to anything you can physically touch. Keyboards, mice, monitors,
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
SSD Forensics 2014 Oleg Afonin, Yuri Gubanov.
Damien Leake. Definition To examine digital media to identify and analyze information so that it can be used as evidence in court cases Involves many.
Licitware a forensic software tool designed to investigate computer crimes.
Belkasoft Evidence Center Yuri Gubanov CEO, Belkasoft What the flagship Belkasoft product can do for you?
How to make your investigation more complete in less time.
Week #7 Objectives: Secure Windows 7 Desktop
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
- your business within reach -. WHY CLOUD? Services run through browsers and apps on Smartphones and Tablets Eliminates physical devices Secured access.
Troubleshooting Windows Vista Security Chapter 4.
Explain the purpose of an operating system
 Saundra Speed  Mariela Esparza  Kevin Escalante.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Guide to Computer Forensics and Investigations Fourth Edition
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Mock Forensics Crime Scene Investigation utilizing the Chain of Custody. Francisco Salinas South Texas College Dr Deanne Wesley Forsyth Technical Community.
AKick Software’s Many Years of Excellence us: | Website: Toll Free:
How to Recover Deleted Photos from Android Cell Phone? Android is keeping on improving their products and make sure to provide the best software service.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
ONLINE BACKUP. Online Backup Online BackUp Online Backup.
How to Sync Android Phone to Computer (PC/Mac)? Are you a person that always has your Android phone in your hands? Nowadays, a cell phone is not just for.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Full Review of Jihosoft Android Data Recovery
WHAT IS CLOUD COMPUTING? Pierce County Library System.
 1- Definition  2- Helpdesk  3- Asset management  4- Analytics  5- Tools.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Creighton Barrett Dalhousie University Archives
Discovering Computers 2012: Chapter 8
Customized Solutions to your needs
Digital Forensics 2 Lecture 8:Digital artefacts Presented by : J.Silaa Lecturer: FCI 25 Oct 2017.
Cloud Storage Services
LO2: Understand Computer Software
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Exam Information CSI5107 Network Security.
Computer Forensics Lab 1 INFORMATION TECHNOLOGY DEPARTMENT LEBANESE FRENCH UNIVERSITY (LFU) COURSE CODE: IT402CF 1.
Data Recovery: Why Secure Deletion is so Important.
Presentation transcript:

Belkasoft Acquisition and Analysis Suite

Computer Acquisition Step By Step 1.Acquisition Capturing volatile memory Imaging disks 2.Discovery and analysis Discovering existing evidence Carving destroyed evidence Analyzing data 3.Management Reporting Sharing evidence Managing cases Preparing for the next case The Complete Cycle of Forensic Process

Computer Acquisition Step By Step 1.Ready-to-use portable memory dumping tool High-capacity USB pen drive Kernel mode RAM acquisition software 2.Disk imaging hardware Disk cloning Secure erase 3.Evidence discovery and analysis software Analysis and reporting Evidence sharing, archiving and management tools What’s Inside?

Step 1: Live RAM Acquisition

Acquiring Information Never Stored on the Disk RAM contains information never stored on a hard drive 1-16Gb of important data decryption keys for encrypted volumes Facebook chats, InPrivate browsing history, etc Getting The Most Out of a Computer Portable software Can run from a thumb drive Dumps all available memory contents Very small executable (~150Kb) Our solution

Overcoming Memory Protection Malware can detect user-mode memory dumping, block acquisition or fake content Certain games do this as well Malicious software can prevent memory dumping Capturer tool runs in kernel mode Transparent to other software 32-bit and 64 -bit kernel-mode drivers supplied Our solution

Step 2: Disk Acquisition

Problems solved: Unknown Device Condition Many imaging products stall on damaged devices Other imagers may take hours to show an issue You are not in control Devices Being Acquired Are in Unknown Condition Our solution Detailed real-time acquisition information Remote diagnostics (RDC, Ethernet)

Problems Solved: HDD Passwords ATA passwords effectively prevent all disk access In Maximum Security mode, Secure Erase follows unsuccessful unlock attempts Few duplicators can deal with ATA passwords Possible loss of data ATA password may lock the device Automatic acquisition of password-protected disks Our solution

Problems Solved: Physical Damage May slow down or prevent acquisition Physical damage prevents imaging Our solution Real-time diagnostics and reporting Advanced options to skip bad sectors and heads Skipped areas can be analyzed later Forward (linear) and backward (reverse) modes Imaging of specified sectors only Receive data from undamaged areas really fast Damaged areas can be analyzed later Important for field investigations

Problems Solved: HPA/DCO Areas HPA/DCO areas are “invisible” to most imagers HPA/DCO areas can be of any size Device may be clipped with HPA/DCO techniques Instantly resets HPA/DCO Acquires data from HPA/DCO areas Our solution

Step 3: Discovering and Analyzing Evidence

Belkasoft Evidence Center: Searches Everywhere Looks in: Storage devicesHard drives and removable media Disk imagesEnCase (including Ex01), FTK, raw (DD), SMART Mobile devicesiPhone/iPad, Android and Blackberry backups Mobile dumpsUFED dumps, chip-off dumps Virtual machinesVMWare, Virtual PC Volatile memoryLive RAM dumps Fragmented memory set analysis with BelkaCarving™ Virtual memoryHibernation files and Page files Unallocated spaceFile carving discovers destroyed evidence Network trafficPCAP files

Belkasoft Evidence Center: Data types Can find and analyze: Office documents s Mobile device backups Social network chats (Facebook, Twitter etc.) Browsing history Instant messenger chats Pictures Videos System Files SQLite databases Chats in multi-player online games Data from P2P and file sharing apps Encrypted files

Analyze Evidence Automated Evidence Analysis Picture analysisDetects faces, scanned text and pornography Authenticity analysisDetects altered pictures with Forgery detection Geolocation analysisDetermines EXIF and GPS coordinates for images Video analysisExtracts key frames from videos Encryption detectionDiscovers encrypted files and volumes

Evidence in Images and Videos Automated Image Content Analysis Automatically discovers scanned text and human faces Automated detection of pornographic content Extracts EXIF data and GPS coordinates Speeds up content analysis Speeds Up Video Analysis Lengthy videos are represented as series of key frames and displayed as galleries of still images Key frames automatically analyzed for all supported evidence types

SQLite Evidence Cleared Skype Histories and Deleted SQLite Records Native SQLite support recovers more evidence SQLite is used in: most system and user-level Android and iOS apps Skype, Yahoo Messenger, eBuddy, PhotoBox, Picasa Explorer Major Web browsers: Mozilla, Chrome, Safari Support for damaged and destroyed SQLite databases ‘freelist’ analysis recovers deleted records Cleared Skype histories and conversation logs can be recovered

Evidence in Smartphones and Tablets Android, BlackBerry, Apple iOS Backups Locates Android, BlackBerry and iTunes backups Extracts information from mobile backups for many popular applications Parses and analyzes evidence GPS coordinates and geolocation information Evidence from mobile devices automatically added to the Timeline SQLite analysis recovers cleared histories with freelist support Industry standard dumps UFED dumps Chip-off dumps

Jumplists and Thumbnails Looking for Evidence in Obscure Places Jumplists: little known, rarely cleaned, kept forever Information on files being viewed, opened, or launched Even for deleted files or data stored on remote or external devices Definite proof of access: information contains full file name, path and meta data Thumbnails: not just pictures Cached preview images of many file formats JPEG, GIF, DOC/DOCX, XLS/XLSX, PDF, and hundreds of others

Destroyed Evidence Discover Destroyed Evidence with Data Carving Finds destroyed evidence on hard drives and Live RAM Recovers evidence from formatted volumes and repartitioned hard drives Allocated/unallocated disk space analysis Carving for physical disks, forensic drive images, memory dumps, hibernation and page files Fully automated operation requires no special skills

Analyzing Ephemeral Evidence Live RAM Analysis Evidence Center analyzes Belkasoft and third-party RAM dumps Hibernation and page file also supported Instant access to TrueCrypt, PGP, BitLocker and other encrypted volumes with binary encryption keys Recent social network communications Data from browsing sessions with enforced privacy settings Registries and pictures BelkaCarving™ recovers fragmented data from memory dumps

Convenient Presentation Present and Share Evidence. Create and Submit Reports All events during a certain time period displayed in single visual timeline Printable reports admissible as court evidence Collected evidence can be exported and shared with others

Sharing and Archiving Evidence Evidence can be shared with colleagues and coworkers Free tool available for viewing shared evidence Case Management enables long-term archiving Unlimited database size Easy management Sharing and Archiving Evidence What You Get: Evidence presented to colleagues or archived for future use

Sharing Evidence Evidence Reader: Share Collected Evidence Evidence collected with Evidence Center can be saved or shared Offers extra value at no extra charge Export to Evidence Reader Free to all licensed users

Integrate with EnCase Full EnCase Integration Integrated with EnCase 7 Launches via EnScript module Processes E01s & Ex01s Imports discovered evidence back into EnCase Guidance approved for EnCase AppCentral Available in EnCase AppCentral

Our Customers

Hands On Experience Free Demo Version Downloadable evaluation version belkasoft.com/get Request your FREE LE demo at belkasoft.com/trial