Preview

Forensic Tool

Good Essays
Open Document
Open Document
1128 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Forensic Tool
Forensic Tools: Redline Vs. Volatility
One of the hardest choices to make when dealing with a problem is, what tool will resolve this issue? There are hundreds of tools that deal with the different aspects and approaches to memory forensics and incident response. Failing to choose a tool, leaves a hole in mission related capabilities. The two that are discussed within this paper are Redline and Volatility. These tools address the issue of memory forensics and incident response; however, they take different approaches to accomplish that goal. Redline is a Windows specific, GUI based program with minimal functionality, but a streamlined approach to giving you the important data up front. Volatility is compatible with Windows, Linux, Mac, and
…show more content…
It pulls out information based on its’ designed indicators, without the user needing to dive too deep searching for signs of compromise. The tool then takes all the important information and organizes it into a visual timeline. This is important to analysts because without knowledge of when events took place, it is hard to grasp the full impact of what took place. Giving a user as much information in as simple a form as possible is the main goal of Redline. The main drawback of Redline is that in most cases that a 35Q deals with, a general simplified overview isn’t going to be enough. A 35Q is an advanced user and will not need to rely so heavily on a GUI based explanation of events. Having only capabilities of performing forensics on Windows based systems is another problem with Redline that is not suitable for an everchanging mission field. Redline is a tool that has a role to fulfill, it does not, however, align with the responsibilities and technical level of a …show more content…
The plugins available cover everything that needed while conducting forensics. If a capability is discovered that Volatility does not include, it is open source so you are able to develop plugins to fit that need. The tool also covers many different memory formats, therefore no matter what is encountered during an investigation, volatility can handle it. The biggest pro to Volatility is how adaptable and versatile it is, however it comes at a price. Since volatility is command line based, it is more difficult to learn than a GUI based software. Volatility does not provide the information needed right up front. Customizing and knowing how to utilize the toolkit is required. It will also take much longer to train a new user on how to navigate the toolkit over a GUI based software. Though Volatility does have its’ drawbacks, the pros far outweigh the cons. (“Volatility,”

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Forensic 10.07

    • 842 Words
    • 3 Pages

    What is a questioned document? Describe at least one example of something that might be a questioned document.…

    • 842 Words
    • 3 Pages
    Good Essays
  • Good Essays

    6.07 Forensics

    • 287 Words
    • 2 Pages

    2. It is important because it is society that scientists can out together, they have what they need.…

    • 287 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    1. Why is the unallocated space of a Windows system so important to a forensic…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    As a system forensics specialist I am here to help your business achieve goals based on security and confidentiality. Some of my basic tasks and high level investigation process is to use evidence to reconstruct past events and activities. Forensic specialist also use evidence to gain a better understanding of a crime (John R. Vacca & K Rudolph, 2011). I will also use this evidence to show possession and handling of digital data.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Forensics Lab

    • 289 Words
    • 2 Pages

    1) There are many things that can make a dental pattern unique, but reality is everyones teeth markings are different. After biting into the Styrofoam cup you could identify whos impression was who’s by looking at the width and length or the marking, also the deepness.…

    • 289 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    forensics

    • 449 Words
    • 2 Pages

    What physical evidence did you find at the victim’s home? A box of matches, a space heater, beer bottles, Natalie’s wallet, a V-shaped burn pattern, burned outlet, a protected surface on the ground, crazed glass, and a puddle-shaped burn pattern.…

    • 449 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Forensic Science

    • 567 Words
    • 3 Pages

    preserving soil samples, if soil is found on the bottom of a shoe for example…

    • 567 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    These tools have many helpful uses and should be able to be utilized by police and detectives to help unearth the most accurate information. Today, devices that could only have been dreamt about 20 years ago are a reality. Drones, Smartphones, and Biometric information (fingerprints and retina scanning) are just a few of the many leaps and bounds we have made in terms of technology. This means that cases from long ago have not been examined with the full potential they could be. The world and the way we use technology is changing and expanding, and i believe that the law system should grow with it. With the double jeopardy law still being implicated, it is not possible for this to…

    • 666 Words
    • 3 Pages
    Good Essays
  • Good Essays

    With the establishment of the Prohibition Movement in America, alcohol was banned from recreational consumption throughout the country. The establishment of Prohibition catalyzed various changes and forever changed the face of American society. The passing of the 18th amendment and the establishment of the Prohibition movement ultimately led to drastic societal and political changes such as revolutionary advancements regarding the freedom of women, the development of speakeasies, and the formation of gangs which often feuded over territory to promote and sell various vices that opposed the ideals found in the Prohibition movement. One of the greatest changes in society associated with the prohibition of alcohol was the increased protests and freedom for women. Initially, many women came out in protest for…

    • 1058 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Digital Forensics

    • 672 Words
    • 3 Pages

    Digital forensics is a branch of forensic science involving the recovery and investigation of material found in digital devices used in crimes or by criminals. In the past 15 years it has expanded greatly with all the advances in technology but much of the new technology has not been studied yet. The research I am doing is important because if the study is successful in the future many forensic departments could use my research to solve crimes.…

    • 672 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The forensic workstation that is going to be installed on the lab is the Forensic Tower III i7. This workstation is compatible with all commercial forensic acquisition and analysis software such as older MS-DOS based tools, ProDiscover, Forensic Tool Kit, P2 Commander, and EnCase. The reason why the Forensic Tower III i7 would be used and not any other forensic workstation is because is not very expensive compared to…

    • 1157 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Bay Raif Sarıca

    • 7918 Words
    • 41 Pages

    well as loss of proprietary information costing millions of dollars. All of this has led to an…

    • 7918 Words
    • 41 Pages
    Good Essays