Upload
mehedi-hasan
View
172
Download
1
Embed Size (px)
Citation preview
Welcome to Team Kernel
MISS (Master in Information systems Security)
Developing Portable Tool for Digital Forensic(PTDF v1.0)
Content•Introduction•Objective•Methodology•Activity plan and timeline•Expected Outcome•Comments and suggestion•Reference
Team Member
Mehedi Hasan
Sorfaraz Uddin
Rezaul Islam Team Leader.
Al Imran
Rajiv Kumar
Objective
▪Availability of Digital Forensic Tools▪Independent Forensic Tools ▪Multi platform with user friendly DF ▪Portable DF Tools▪Use of different DF tools
Objective▪Availability of Digital Forensic Tools
Objective▪Independent Forensic Tools
Objective▪Multi platform with user friendly DF Tools
Objective▪Portable DF Tools
Objective▪Use of different DF tools
Methodology
▪Modifying of Raspberry PI ▪Installation of OS on Raspberry PI▪Installation of DF tools ▪Essential Hardware & Tools▪Make ready the system as Forensic
tool
Modifying Raspberry PI ▪ What is a Raspberry PI
Modifying Raspberry PI ▪ Specification of Raspberry PI
OS Installation
▪Kali Linux▪Raspberry PI
Support Pidora (Fedora), Archlinux, Raspian (Debian)▪Android ▪Windows 10
Installation of DF tools ▪Vulnerability Assessment Framework
(Matasploit)▪IP Scanning tools▪Information Gathering tools▪ FTK, EnCase, Autospy▪Smartphone forensic tools
Essential Tools & Hardware ▪Raspberry PI▪USB to SATA Converter to connect the target device.▪Power Supply 5 volt, 2 ampere. Li-ion Battery. ▪Soldering Iron and Soldering Lead.▪Desoldering Pump.▪Multimeter (Analog & Digital).▪Oscilloscope.▪Some wire & Connector.▪Raspberry PI Rack and Case▪Keyboard & Mouse▪Win32 Disk imager
Make ready the system
Expected OutcomeLimitation:• CMOS Battery. • Limited Storage area.• Limited Power Backup.
Advantages:• Integrated tool for Digital Forensic• Low cost and portable• Easily to maintain, available to get in local.
Activity plan and timeline
Project selection: 12 Feb, 2016
Resource studying: start date: 13 Feb,
End date: 19 Feb,
Start practical work: start date: 20 Feb,
End date: 12 Mar,
Comments and Feedback
▪https://www.blackhat.com/presentations/bh-usa-03/bh-us-03-willis-c/bh-us-03-willis.pdf▪http://www.forensicfocus.com/linux-f
orensics-pitfalls-of-mounting-file-systems▪http://link.springer.com/chapter/10.1
007%2F0-387-31163-7_19#page-1▪http://www.deer-run.com/~hal/IntroT
oDigitalForensics.pdf
Reference
Thank You !!