Need help with your Assignment?

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

Cyber Investigation Tools

Cyber Investigation Tools

Ways of tracking an attacker

Trace-routing – This technique shows the computers that are within the range of the user and the target machine. Resolving the host-name address of the devices to which the attacker connected gives an estimate of their location.

Reverse DNS Query – this is the most effective, it locates the hacker’s country. However, the exact location requires getting into the servers of their ISP (SPAM Fighter, 2006).

DNS – Domain name servers connect a device to the internet and track the IP addresses and domain names. It can be used

Types of Tools

The tools used in network investigation can be hardware software or a combination of both. The tools can help in information gathering, reporting, and analysis. The goals can be open-source or proprietary. Some of the tools may come with hardware and software packages, yet some are just applications (Bhandari, 2011). Some of the tools require a connection to the internet yet others may work offline. Some of the tools include CAIN, autopsy, ExifTool, and Hashdeep.

Information that can be learned using the tools

Some of the information that can be gathered using these tools include the actions that an attacker did on the device and the events that occurred on that machine. For instance, when running an application, such information generally proves that a user (or account) performed some actions. Some data such as deleted files and metadata about file systems can be retrieved.

Tools for Investigators

The tools every investigation should have included are comprehensive software tools such as Linux DD, Forensic ToolKit (FTK), X-ways, and CAIN. For special tasks such as network investigation, a forensic expert will need packet analyzer tools or sniffers such as Wireshark which can intercept traffic and log it for further analysis (Infosec Institute, 2018). Another tool in network forensics is the NetworkMiner which can extract and recover files.

References

Infosec Institute. (2018). Computer Crime Investigation Using Forensic Tools and Technology. Retrieved from https://resources.infosecinstitute.com/computer-crime-investigation-using-forensic-tools-and-technology/#gref

Bhandari, D. (2011). Forensic Tools Used in Digital Investigation. Indian Journal of Applied Research (5):278-283. DOI:10.15373/2249555X/MAY2014/82

SPAM Fighter. (2006). A Computer Hacker Can Be Traced. Retrieved from https://www.spamfighter.com/News-6280-A-Computer-Hacker-Can-Be-Traced.htm

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Cyber Investigation Tools

Cyber Investigation Tools

What are 3 ways to track an offender? Give an example of each.
What types of tools are used in the process of a digital or network investigation?
What information can be learned through these tools about intrusion or other cybercrime?
What are the main investigative tools that all cyber crime investigators should have? What are some of the specialty tools that investigators would require for specific types of investigation such as network intrusion or mobile investigation?

Order Solution Now