SlideShare a Scribd company logo
1 of 7
Name: Kartikey Chaturvedi
Requirements:
This tool was created in UNIX environment using g++ compiler it can
also be used in windows using minGW compiler bundle from
http://www.codeblocks.org/downloads/26 . Different classes are defined
for Partition information, Volume information, Directory information and
deleted file information under header files where function declarations
are made. Cpp files are created where functions definitions are provided
and are implemented in the Toolmain cpp file which contains the main
method. Program reads from the image file supplied by the user stores the
binary information in an array and then read from it to perform the
features.
Features implemented:
The following are the features that are represented in this program:
 The number of partitions on the disk .
 The start sectorof the partition.
 The file system type of the partition.
 The size of the partition in sectors in MB.
 The number of sectors per cluster.
 The size of FAT area.
 The size of RootDirectory.
 The sectoraddress of cluster2.
 The deleted file name.
 The deleted file size.
 The number of the first cluster in deleted file.
 The contents of the deleted file.
Instructions for running the program :
The program contains different header, cpp and main file which needs to
be complied together in order to run the program. Follow the steps to run
the program:-
1. The 14116367.rar contains all the required files to run the
program.
2. Open command promptand move to the directory where the tool
files are stored.
3. Folder contains a file name makefile1.txt open it copy the
command and paste it in the command prompt.
4. It will create an executable file named “forensics.exe”. Type
forensics.exe in the command promptto run the program. It will
display the output.
C:UsersKartikeyDesktopDataForensicstool14116367>forens
ics.exe Sample_1.dd
Note:- Please make sure the image file is also in the
destinationfolder or the path enteredis correctorthe exe file
can be moved to the folder containing the image file.
Testing the program using (Sample_1.dd):
1- The sourcecode forensics.exe was created and implemented.
2- The makefile1 was used to create the exe file.
3- The executed file in the in the folder was supplied by the
destination of the image file
4- The Sample_1.dd image file was used in 14116367 folder.
5- Program is implemented in a command promptby going to the
right path.(might need to run cmd promptas an administrator)
The output of Sample_1.dd:
Testing the program using (Test.001):
1- The sourcecode forensics.exe was created and implemented.
2- The makefile1 was used to create the exe file.
3- The executed file in the in the folder was supplied by the
destination of the image file
4- The Test.001 image file was used in Dataforensicstool folder.
5- Program is implemented in a command promptby going to the
right path. (might need to run cmd prompt as an administrator)
The output of Test.001:
Drawback:
 Format of information have to be changed to big_endian
format because it is given in little_endian format.
 Contains many number of files but it makes it reusable to be
used in other codes as well.

More Related Content

What's hot

Linux file commands and shell scripts
Linux file commands and shell scriptsLinux file commands and shell scripts
Linux file commands and shell scriptsPrashantTechment
 
System call (Fork +Exec)
System call (Fork +Exec)System call (Fork +Exec)
System call (Fork +Exec)Amit Ghosh
 
50 most frequently used unix linux commands (with examples)
50 most frequently used unix   linux commands (with examples)50 most frequently used unix   linux commands (with examples)
50 most frequently used unix linux commands (with examples)Rodrigo Maia
 
Command line for the beginner - Using the command line in developing for the...
Command line for the beginner -  Using the command line in developing for the...Command line for the beginner -  Using the command line in developing for the...
Command line for the beginner - Using the command line in developing for the...Jim Birch
 
Unix Linux Commands Presentation 2013
Unix Linux Commands Presentation 2013Unix Linux Commands Presentation 2013
Unix Linux Commands Presentation 2013Wave Digitech
 
Introduction to System Calls
Introduction to System CallsIntroduction to System Calls
Introduction to System CallsVandana Salve
 
Unix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell ScriptUnix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell Scriptsbmguys
 
Unix OS & Commands
Unix OS & CommandsUnix OS & Commands
Unix OS & CommandsMohit Belwal
 
Corporate Secret Challenge - CyberDefenders.org by Azad
Corporate Secret Challenge - CyberDefenders.org by AzadCorporate Secret Challenge - CyberDefenders.org by Azad
Corporate Secret Challenge - CyberDefenders.org by AzadAzad Mzuri
 

What's hot (20)

The Galaxy toolshed
The Galaxy toolshedThe Galaxy toolshed
The Galaxy toolshed
 
Os notes
Os notesOs notes
Os notes
 
Experimentos lab
Experimentos labExperimentos lab
Experimentos lab
 
Autotools
AutotoolsAutotools
Autotools
 
Linux file commands and shell scripts
Linux file commands and shell scriptsLinux file commands and shell scripts
Linux file commands and shell scripts
 
Completeosnotes
CompleteosnotesCompleteosnotes
Completeosnotes
 
Os lab final
Os lab finalOs lab final
Os lab final
 
System call (Fork +Exec)
System call (Fork +Exec)System call (Fork +Exec)
System call (Fork +Exec)
 
50 most frequently used unix linux commands (with examples)
50 most frequently used unix   linux commands (with examples)50 most frequently used unix   linux commands (with examples)
50 most frequently used unix linux commands (with examples)
 
Command line for the beginner - Using the command line in developing for the...
Command line for the beginner -  Using the command line in developing for the...Command line for the beginner -  Using the command line in developing for the...
Command line for the beginner - Using the command line in developing for the...
 
Unix Linux Commands Presentation 2013
Unix Linux Commands Presentation 2013Unix Linux Commands Presentation 2013
Unix Linux Commands Presentation 2013
 
Introduction to System Calls
Introduction to System CallsIntroduction to System Calls
Introduction to System Calls
 
POS 433 Entire Course NEW
POS 433 Entire Course NEWPOS 433 Entire Course NEW
POS 433 Entire Course NEW
 
Unix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell ScriptUnix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell Script
 
Unix OS & Commands
Unix OS & CommandsUnix OS & Commands
Unix OS & Commands
 
Corporate Secret Challenge - CyberDefenders.org by Azad
Corporate Secret Challenge - CyberDefenders.org by AzadCorporate Secret Challenge - CyberDefenders.org by Azad
Corporate Secret Challenge - CyberDefenders.org by Azad
 
System calls
System callsSystem calls
System calls
 
Linux day 1
Linux day 1Linux day 1
Linux day 1
 
Read me
Read meRead me
Read me
 
Linux commands
Linux commandsLinux commands
Linux commands
 

Similar to Data Forensics Tool

Assignment unix & shell programming
Assignment  unix  & shell programmingAssignment  unix  & shell programming
Assignment unix & shell programmingMohit Aggarwal
 
CSO Laboratory Manual
CSO Laboratory ManualCSO Laboratory Manual
CSO Laboratory ManualDwight Sabio
 
Lab3Lab3steps.docxScenario    The university has caught a .docx
Lab3Lab3steps.docxScenario    The university has caught a .docxLab3Lab3steps.docxScenario    The university has caught a .docx
Lab3Lab3steps.docxScenario    The university has caught a .docxsmile790243
 
fileop report
fileop reportfileop report
fileop reportJason Lu
 
Batch File Virus Project Technical Paper
Batch File Virus Project Technical PaperBatch File Virus Project Technical Paper
Batch File Virus Project Technical PaperStephen Whisman
 
Windows batch scripting
Windows batch scriptingWindows batch scripting
Windows batch scriptingArghodeepPaul
 
Window xp by nishant raghav
Window xp by nishant raghavWindow xp by nishant raghav
Window xp by nishant raghavNishant Raghav
 
FTK report PART I Familiar with FTK ImagerBonus Exerc.docx
FTK report PART I Familiar with FTK ImagerBonus Exerc.docxFTK report PART I Familiar with FTK ImagerBonus Exerc.docx
FTK report PART I Familiar with FTK ImagerBonus Exerc.docxbudbarber38650
 
CDS Filtering Program - User Manual
CDS Filtering Program - User ManualCDS Filtering Program - User Manual
CDS Filtering Program - User ManualYoann Pageaud
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating SystemKunalKewat1
 
exp-7-pig installation.pptx
exp-7-pig installation.pptxexp-7-pig installation.pptx
exp-7-pig installation.pptxvishal choudhary
 
Programming in c_in_7_days
Programming in c_in_7_daysProgramming in c_in_7_days
Programming in c_in_7_daysAnkit Dubey
 

Similar to Data Forensics Tool (20)

Assignment unix & shell programming
Assignment  unix  & shell programmingAssignment  unix  & shell programming
Assignment unix & shell programming
 
CSO Laboratory Manual
CSO Laboratory ManualCSO Laboratory Manual
CSO Laboratory Manual
 
Lab3Lab3steps.docxScenario    The university has caught a .docx
Lab3Lab3steps.docxScenario    The university has caught a .docxLab3Lab3steps.docxScenario    The university has caught a .docx
Lab3Lab3steps.docxScenario    The university has caught a .docx
 
fileop report
fileop reportfileop report
fileop report
 
Batch File Virus Project Technical Paper
Batch File Virus Project Technical PaperBatch File Virus Project Technical Paper
Batch File Virus Project Technical Paper
 
Unix_QT.ppsx
Unix_QT.ppsxUnix_QT.ppsx
Unix_QT.ppsx
 
Unix_QT.ppsx
Unix_QT.ppsxUnix_QT.ppsx
Unix_QT.ppsx
 
Windows batch scripting
Windows batch scriptingWindows batch scripting
Windows batch scripting
 
Mc7404 np final
Mc7404 np finalMc7404 np final
Mc7404 np final
 
Window xp by nishant raghav
Window xp by nishant raghavWindow xp by nishant raghav
Window xp by nishant raghav
 
FTK report PART I Familiar with FTK ImagerBonus Exerc.docx
FTK report PART I Familiar with FTK ImagerBonus Exerc.docxFTK report PART I Familiar with FTK ImagerBonus Exerc.docx
FTK report PART I Familiar with FTK ImagerBonus Exerc.docx
 
CDS Filtering Program - User Manual
CDS Filtering Program - User ManualCDS Filtering Program - User Manual
CDS Filtering Program - User Manual
 
Linux basic
Linux basicLinux basic
Linux basic
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
 
Introduction to Unix
Introduction to UnixIntroduction to Unix
Introduction to Unix
 
Project report
Project reportProject report
Project report
 
exp-7-pig installation.pptx
exp-7-pig installation.pptxexp-7-pig installation.pptx
exp-7-pig installation.pptx
 
Unix1
Unix1Unix1
Unix1
 
Programming in c_in_7_days
Programming in c_in_7_daysProgramming in c_in_7_days
Programming in c_in_7_days
 
Components lab
Components labComponents lab
Components lab
 

Data Forensics Tool

  • 1. Name: Kartikey Chaturvedi Requirements: This tool was created in UNIX environment using g++ compiler it can also be used in windows using minGW compiler bundle from http://www.codeblocks.org/downloads/26 . Different classes are defined for Partition information, Volume information, Directory information and deleted file information under header files where function declarations are made. Cpp files are created where functions definitions are provided and are implemented in the Toolmain cpp file which contains the main method. Program reads from the image file supplied by the user stores the binary information in an array and then read from it to perform the features. Features implemented: The following are the features that are represented in this program:  The number of partitions on the disk .  The start sectorof the partition.  The file system type of the partition.  The size of the partition in sectors in MB.
  • 2.  The number of sectors per cluster.  The size of FAT area.  The size of RootDirectory.  The sectoraddress of cluster2.  The deleted file name.  The deleted file size.  The number of the first cluster in deleted file.  The contents of the deleted file. Instructions for running the program : The program contains different header, cpp and main file which needs to be complied together in order to run the program. Follow the steps to run the program:- 1. The 14116367.rar contains all the required files to run the program. 2. Open command promptand move to the directory where the tool files are stored.
  • 3. 3. Folder contains a file name makefile1.txt open it copy the command and paste it in the command prompt.
  • 4. 4. It will create an executable file named “forensics.exe”. Type forensics.exe in the command promptto run the program. It will display the output. C:UsersKartikeyDesktopDataForensicstool14116367>forens ics.exe Sample_1.dd Note:- Please make sure the image file is also in the destinationfolder or the path enteredis correctorthe exe file can be moved to the folder containing the image file. Testing the program using (Sample_1.dd): 1- The sourcecode forensics.exe was created and implemented. 2- The makefile1 was used to create the exe file.
  • 5. 3- The executed file in the in the folder was supplied by the destination of the image file 4- The Sample_1.dd image file was used in 14116367 folder. 5- Program is implemented in a command promptby going to the right path.(might need to run cmd promptas an administrator) The output of Sample_1.dd: Testing the program using (Test.001):
  • 6. 1- The sourcecode forensics.exe was created and implemented. 2- The makefile1 was used to create the exe file. 3- The executed file in the in the folder was supplied by the destination of the image file 4- The Test.001 image file was used in Dataforensicstool folder. 5- Program is implemented in a command promptby going to the right path. (might need to run cmd prompt as an administrator) The output of Test.001: Drawback:
  • 7.  Format of information have to be changed to big_endian format because it is given in little_endian format.  Contains many number of files but it makes it reusable to be used in other codes as well.