SlideShare a Scribd company logo
GLOBALWEBTUTORS.COM
GLOBALWEBTUTORS.COM
DIGITAL FORENSIC
ASSIGNMENTHELP
Forensics Tools
for Mac and Linux
Operating
Systems
GLOBALWEBTUTORS.COM
OBJECTIVE
 The objective of this power point presentation is to understand the
different Mac OS and Linux Digital Forensic Tools. This also
explains how to explore files in Hex Workshop
 Comparing the similarity of these tools with Hex workshop and
validating them on the basis of software validation and
verification.
 Brief explanation of Mac OS and Linux tools.
 These slides cover a process of exploring 5 different formats in
Hex Editor Hxd.
GLOBALWEBTUTORS.COM
Part 1: Forensics Tools for Mac and Linux Operating Systems
The federal rule of evidence has control the use of digital evidence, thus we need to
obtain the evidence in the digital media . The process of obtaining evidence from these
computer is known as computer forensic. Most of the forensic works on windows but
there are some that works on Mac OS and Linux.
Comparing Mac And Linux Tools With Hex Workshop
The tools are compared in terms of physical data , logical data, command line , hashing
filtration , data viewing , decrypting.
Network Miner and Network Mapper with Hex Workshop. Both the tools are similar to
Hex Workshop.
GLOBALWEBTUTORS.COM
Validation Of Tools
 Software verification :- It provides objective evidence that the design
outputs of a particular phase of the software development life cycle meet all of the
specified requirements for that phase.
 Software verification looks for consistency, completeness, and correctness of the
software and its supporting documentation, as it is being developed, and provides
support for a subsequent software is being validated.
 Software testing is one of many verification activities intended to confirm that
software development output meets its input requirements. Other verification
activities include various static and dynamic analyses, code and document
inspections, walkthroughs, and other techniques.
GLOBALWEBTUTORS.COM
Validation Of Tools
 It is a part of the design validation for a finished device and considers software
validation to be ‘confirmation by examination and provision of objective
evidence.
 software validation activities may occur both during, as well as at the end of
the software development life cycle to ensure that all requirements have been
fulfilled.
 The validation of software typically includes evidence that all software
requirements have been implemented correctly and completely and are
traceable to system requirements.
 A conclusion that software is validated is highly dependent upon
comprehensive software testing, inspections, analyses, and other verification
tasks performed at each stage of the software development life cycle.
GLOBALWEBTUTORS.COM
Mac OS and Linux Tool
 Network Miner
 An interesting network forensic analyzer for Linux & MAC OS
X to detect OS, hostname, sessions and open ports through packet
sniffing or by PCAP file. Network Miner provide extracted
artifacts in an intuitive user interface.
 NMAP
 NMAP(Network Mapper) is one of the most popular networks
and security auditing tools. NMAP is supported on most of the
operating systems Linux, SMAC OS, etc. It’s open source so free.
GLOBALWEBTUTORS.COM
Part2: Hex Workshop to Explore Files
 To explore files using Hxd Hex Editor 5 different file format are
explored such as :- Excel file(.els) Microsoft Word (.doc and
.docx), .gif, .jpg and movie format (.mov)
1. The above 5 files samples are created.
2. HxD Hex Editor Launched.
3. The above sample files are being imported into Hex Editor.
GLOBALWEBTUTORS.COM
9. JPEG file type.
GLOBALWEBTUTORS.COM
10. GIF file type.
GLOBALWEBTUTORS.COM
https://globalwebtutors.com/
 The forensic examination of tools has undoubtedly been a
huge success in the identification of cyber and computer-
assisted crime. Organizations are placing an increasing
importance on the need to be equipped with appropriate
incident management capabilities to handle misuse of
systems. HxD hex editor is an invaluable tool in the process.
GLOBALWEBTUTORS.COM

More Related Content

Similar to Digital Forensic Assignment Help

Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
Pooja Bhojwani
 
Project in malware analysis:C2C
Project in malware analysis:C2CProject in malware analysis:C2C
Project in malware analysis:C2C
Fabrizio Farinacci
 
Respond to the following by writing at least one paragraph for each .pdf
Respond to the following by writing at least one paragraph for each .pdfRespond to the following by writing at least one paragraph for each .pdf
Respond to the following by writing at least one paragraph for each .pdf
trishacolsyn25353
 
Intrusion Discovery on Windows
Intrusion Discovery on WindowsIntrusion Discovery on Windows
Intrusion Discovery on Windows
dkaya
 
Lec 01_Linux System Administration (1).pptx
Lec 01_Linux System Administration (1).pptxLec 01_Linux System Administration (1).pptx
Lec 01_Linux System Administration (1).pptx
ShabanaShafi3
 
Thing to understand about software
Thing to understand about softwareThing to understand about software
Thing to understand about software
dfghjrtyuj
 
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"EPAM Systems
 
Documentation
DocumentationDocumentation
Documentation
Rajesh Seendripu
 
Computer software and computer network
Computer software and computer networkComputer software and computer network
Computer software and computer network
Infinity Tech Solutions
 
Handy penetration testing tools
Handy penetration testing toolsHandy penetration testing tools
Handy penetration testing tools
Mindfire LLC
 
Software Compatibility testing
Software Compatibility testingSoftware Compatibility testing
Software Compatibility testing
Abdul Basit
 
Windows 7 – Application Compatibility Toolkit 5.5 Overview
Windows 7 – Application Compatibility Toolkit 5.5 OverviewWindows 7 – Application Compatibility Toolkit 5.5 Overview
Windows 7 – Application Compatibility Toolkit 5.5 Overview
Vijay Raj
 
An isas presentation on .net framework 2.0 by vikash chandra das
An isas presentation on .net framework 2.0 by vikash chandra dasAn isas presentation on .net framework 2.0 by vikash chandra das
An isas presentation on .net framework 2.0 by vikash chandra das
Vikash Chandra Das
 
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat DasNull Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
nullowaspmumbai
 
Online lg prodect
Online lg prodectOnline lg prodect
Online lg prodect
Yesu Raj
 
Shamsa altayer
Shamsa altayerShamsa altayer
Shamsa altayer
shamsaot
 
Mohammed Kharma - A flexible framework for quality assurance and testing of s...
Mohammed Kharma - A flexible framework for quality assurance and testing of s...Mohammed Kharma - A flexible framework for quality assurance and testing of s...
Mohammed Kharma - A flexible framework for quality assurance and testing of s...
Mohammed Kharma
 
Find Out What's New With WhiteSource May 2018- A WhiteSource Webinar
Find Out What's New With WhiteSource May 2018- A WhiteSource WebinarFind Out What's New With WhiteSource May 2018- A WhiteSource Webinar
Find Out What's New With WhiteSource May 2018- A WhiteSource Webinar
WhiteSource
 
Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the Endpoint
Ivanti
 

Similar to Digital Forensic Assignment Help (20)

Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
 
Project in malware analysis:C2C
Project in malware analysis:C2CProject in malware analysis:C2C
Project in malware analysis:C2C
 
Respond to the following by writing at least one paragraph for each .pdf
Respond to the following by writing at least one paragraph for each .pdfRespond to the following by writing at least one paragraph for each .pdf
Respond to the following by writing at least one paragraph for each .pdf
 
Intrusion Discovery on Windows
Intrusion Discovery on WindowsIntrusion Discovery on Windows
Intrusion Discovery on Windows
 
Lec 01_Linux System Administration (1).pptx
Lec 01_Linux System Administration (1).pptxLec 01_Linux System Administration (1).pptx
Lec 01_Linux System Administration (1).pptx
 
Thing to understand about software
Thing to understand about softwareThing to understand about software
Thing to understand about software
 
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
 
Documentation
DocumentationDocumentation
Documentation
 
Computer software and computer network
Computer software and computer networkComputer software and computer network
Computer software and computer network
 
Handy penetration testing tools
Handy penetration testing toolsHandy penetration testing tools
Handy penetration testing tools
 
Software Compatibility testing
Software Compatibility testingSoftware Compatibility testing
Software Compatibility testing
 
Final viva
Final vivaFinal viva
Final viva
 
Windows 7 – Application Compatibility Toolkit 5.5 Overview
Windows 7 – Application Compatibility Toolkit 5.5 OverviewWindows 7 – Application Compatibility Toolkit 5.5 Overview
Windows 7 – Application Compatibility Toolkit 5.5 Overview
 
An isas presentation on .net framework 2.0 by vikash chandra das
An isas presentation on .net framework 2.0 by vikash chandra dasAn isas presentation on .net framework 2.0 by vikash chandra das
An isas presentation on .net framework 2.0 by vikash chandra das
 
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat DasNull Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
 
Online lg prodect
Online lg prodectOnline lg prodect
Online lg prodect
 
Shamsa altayer
Shamsa altayerShamsa altayer
Shamsa altayer
 
Mohammed Kharma - A flexible framework for quality assurance and testing of s...
Mohammed Kharma - A flexible framework for quality assurance and testing of s...Mohammed Kharma - A flexible framework for quality assurance and testing of s...
Mohammed Kharma - A flexible framework for quality assurance and testing of s...
 
Find Out What's New With WhiteSource May 2018- A WhiteSource Webinar
Find Out What's New With WhiteSource May 2018- A WhiteSource WebinarFind Out What's New With WhiteSource May 2018- A WhiteSource Webinar
Find Out What's New With WhiteSource May 2018- A WhiteSource Webinar
 
Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the Endpoint
 

More from Global Web Tutors

Osi model assignment help globalwebtutors
Osi model assignment help globalwebtutorsOsi model assignment help globalwebtutors
Osi model assignment help globalwebtutors
Global Web Tutors
 
Raster gis assignment help
Raster gis assignment helpRaster gis assignment help
Raster gis assignment help
Global Web Tutors
 
Biochemistry Assignment Help
Biochemistry Assignment HelpBiochemistry Assignment Help
Biochemistry Assignment Help
Global Web Tutors
 
Raster gis assignment help
Raster gis assignment helpRaster gis assignment help
Raster gis assignment help
Global Web Tutors
 
Gantt template ws Assignment Help
Gantt template ws Assignment HelpGantt template ws Assignment Help
Gantt template ws Assignment Help
Global Web Tutors
 
Computation theory Assignment Help
Computation theory Assignment HelpComputation theory Assignment Help
Computation theory Assignment Help
Global Web Tutors
 
Economics assignment help global web tutors
Economics assignment help global web tutorsEconomics assignment help global web tutors
Economics assignment help global web tutors
Global Web Tutors
 
Civil Engineering Assignment Help by Globalwebtutors
Civil Engineering Assignment Help by GlobalwebtutorsCivil Engineering Assignment Help by Globalwebtutors
Civil Engineering Assignment Help by Globalwebtutors
Global Web Tutors
 
Programming assignment help
Programming assignment helpProgramming assignment help
Programming assignment help
Global Web Tutors
 
Computer network Assignment help
Computer network Assignment helpComputer network Assignment help
Computer network Assignment help
Global Web Tutors
 
Cloud computing Assignment Help
Cloud computing Assignment HelpCloud computing Assignment Help
Cloud computing Assignment Help
Global Web Tutors
 

More from Global Web Tutors (11)

Osi model assignment help globalwebtutors
Osi model assignment help globalwebtutorsOsi model assignment help globalwebtutors
Osi model assignment help globalwebtutors
 
Raster gis assignment help
Raster gis assignment helpRaster gis assignment help
Raster gis assignment help
 
Biochemistry Assignment Help
Biochemistry Assignment HelpBiochemistry Assignment Help
Biochemistry Assignment Help
 
Raster gis assignment help
Raster gis assignment helpRaster gis assignment help
Raster gis assignment help
 
Gantt template ws Assignment Help
Gantt template ws Assignment HelpGantt template ws Assignment Help
Gantt template ws Assignment Help
 
Computation theory Assignment Help
Computation theory Assignment HelpComputation theory Assignment Help
Computation theory Assignment Help
 
Economics assignment help global web tutors
Economics assignment help global web tutorsEconomics assignment help global web tutors
Economics assignment help global web tutors
 
Civil Engineering Assignment Help by Globalwebtutors
Civil Engineering Assignment Help by GlobalwebtutorsCivil Engineering Assignment Help by Globalwebtutors
Civil Engineering Assignment Help by Globalwebtutors
 
Programming assignment help
Programming assignment helpProgramming assignment help
Programming assignment help
 
Computer network Assignment help
Computer network Assignment helpComputer network Assignment help
Computer network Assignment help
 
Cloud computing Assignment Help
Cloud computing Assignment HelpCloud computing Assignment Help
Cloud computing Assignment Help
 

Recently uploaded

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 

Recently uploaded (20)

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 

Digital Forensic Assignment Help

  • 2. Forensics Tools for Mac and Linux Operating Systems GLOBALWEBTUTORS.COM
  • 3. OBJECTIVE  The objective of this power point presentation is to understand the different Mac OS and Linux Digital Forensic Tools. This also explains how to explore files in Hex Workshop  Comparing the similarity of these tools with Hex workshop and validating them on the basis of software validation and verification.  Brief explanation of Mac OS and Linux tools.  These slides cover a process of exploring 5 different formats in Hex Editor Hxd. GLOBALWEBTUTORS.COM
  • 4. Part 1: Forensics Tools for Mac and Linux Operating Systems The federal rule of evidence has control the use of digital evidence, thus we need to obtain the evidence in the digital media . The process of obtaining evidence from these computer is known as computer forensic. Most of the forensic works on windows but there are some that works on Mac OS and Linux. Comparing Mac And Linux Tools With Hex Workshop The tools are compared in terms of physical data , logical data, command line , hashing filtration , data viewing , decrypting. Network Miner and Network Mapper with Hex Workshop. Both the tools are similar to Hex Workshop. GLOBALWEBTUTORS.COM
  • 5. Validation Of Tools  Software verification :- It provides objective evidence that the design outputs of a particular phase of the software development life cycle meet all of the specified requirements for that phase.  Software verification looks for consistency, completeness, and correctness of the software and its supporting documentation, as it is being developed, and provides support for a subsequent software is being validated.  Software testing is one of many verification activities intended to confirm that software development output meets its input requirements. Other verification activities include various static and dynamic analyses, code and document inspections, walkthroughs, and other techniques. GLOBALWEBTUTORS.COM
  • 6. Validation Of Tools  It is a part of the design validation for a finished device and considers software validation to be ‘confirmation by examination and provision of objective evidence.  software validation activities may occur both during, as well as at the end of the software development life cycle to ensure that all requirements have been fulfilled.  The validation of software typically includes evidence that all software requirements have been implemented correctly and completely and are traceable to system requirements.  A conclusion that software is validated is highly dependent upon comprehensive software testing, inspections, analyses, and other verification tasks performed at each stage of the software development life cycle. GLOBALWEBTUTORS.COM
  • 7. Mac OS and Linux Tool  Network Miner  An interesting network forensic analyzer for Linux & MAC OS X to detect OS, hostname, sessions and open ports through packet sniffing or by PCAP file. Network Miner provide extracted artifacts in an intuitive user interface.  NMAP  NMAP(Network Mapper) is one of the most popular networks and security auditing tools. NMAP is supported on most of the operating systems Linux, SMAC OS, etc. It’s open source so free. GLOBALWEBTUTORS.COM
  • 8. Part2: Hex Workshop to Explore Files  To explore files using Hxd Hex Editor 5 different file format are explored such as :- Excel file(.els) Microsoft Word (.doc and .docx), .gif, .jpg and movie format (.mov) 1. The above 5 files samples are created. 2. HxD Hex Editor Launched. 3. The above sample files are being imported into Hex Editor. GLOBALWEBTUTORS.COM
  • 9. 9. JPEG file type. GLOBALWEBTUTORS.COM
  • 10. 10. GIF file type. GLOBALWEBTUTORS.COM
  • 11. https://globalwebtutors.com/  The forensic examination of tools has undoubtedly been a huge success in the identification of cyber and computer- assisted crime. Organizations are placing an increasing importance on the need to be equipped with appropriate incident management capabilities to handle misuse of systems. HxD hex editor is an invaluable tool in the process. GLOBALWEBTUTORS.COM

Editor's Notes

  1. Reference Roussev, V. and Richard III, G.G. (2006). Next-generation digital forensics. Communication of ACM
  2. References Buckles, Greg. “What Went Wrong in the Casey Anthony Browser Analysis.” eDiscovery Journal. July 26, 2011.