Chapter 4 Evidence collection and analysis tools

DOI: 10.1201/9781003134817-4

Many evidence collection and analysis tools are commercially available. A description of several reliable ones is provided in this chapter. I’m still maintaining some of the older tools in this newer version since they are still being used in various parts of the world.

Safe back

Upon your initial arrival at a client site, obtain a bitstream backup of the compromised systems. A bitstream backup is different from the regular copy operation. During a copy operation, you are merely copying files from one medium (the hard drive, for instance) to another (e.g., a tape drive, Jaz Drive, etc.). When performing a bitstream ...

Get Cyber Crime Investigator's Field Guide, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.