This article provides insufficient context for those unfamiliar with the subject.(February 2014) |
Digital Forensics Framework (DFF) is a discontinued computer forensics open-source software package. It is used by professionals and non-experts to collect, preserve and reveal digital evidence without compromising systems and data.[2]
Original author(s) | Frédéric Baguelin, Solal Jacob, Christophe Malinge, Jérémy Mounier |
---|---|
Developer(s) | Frédéric Baguelin, Solal Jacob, Jérémy Mounier |
Stable release | 1.3.0[1]
/ February 28, 2013 |
Written in | C++, Python, PyQt4 |
Operating system | Unix-like, Windows |
Available in | 7 languages |
Type | Computer forensics |
License | GPL |
Website | www |
User interfaces
editDigital Forensics Framework offers a graphical user interface (GUI) developed in PyQt and a classical tree view. Features such as recursive view, tagging, live search and bookmarking are available. Its command line interface allows the user to remotely perform digital investigation. It comes with common shell functions such as completion, task management, globing and keyboard shortcuts. DFF can run batch scripts at startup to automate repetitive tasks. Advanced users and developers can use DFF directly from a Python interpreter to script their investigation.
Distribution methods
editIn addition to the source code package and binary installers for Linux and Windows,[3] Digital Forensics Framework is available in operating system distributions as is typical in free and open-source software (FOSS), including Debian,[4] Fedora and[5] Ubuntu.
Other Digital Forensics Framework methods available are digital forensics oriented distribution and live cd:
- DEFT Linux Live CD[6]
- Kali Linux[7]
Publications
edit- "Scriptez vos analyses forensiques avec Python et DFF" in the French magazine MISC[8]
- Several presentations about DFF in conferences: "Digital Forensics Framework" at ESGI Security Day[9] "An introduction to digital forensics" at RMLL 2013[10]
Published books that mention Digital Forensics Framework are:
- Digital Forensics with Open Source Tools (Syngress, 2011)[11]
- Computer Forensik Hacks (O'Reilly, 2012)[12]
- Malwares - Identification, analyse et éradication (Epsilon, 2013)[13]
- Digital Forensics for Handheld Devices (CRC Press Inc, 2012)[14]
In literature
edit- Saving Rain: The First Novel in The Rain Trilogy[15]
White papers
edit- Selective Imaging Revisited[16]
- A survey of main memory acquisition and analysis techniques for the windows operating system[17]
- Uforia : Universal forensic indexer and analyzer[18]
- Visualizing Indicators of Rootkit Infections in Memory Forensics[19]
- EM-DMKM Case Study Computer and Network Forensics[20]
- OV-chipcard DFF Extension[21]
- L'investigation numérique « libre »[22]
- Malware analysis method based on reverse technology (恶意 口序分析方法 耐)[23]
Prize
editDFF was used to solve the 2010 Digital Forensic Research Workshop (DFRWS) challenge consisting of the reconstructing a physical dump of a NAND flash memory.[24]
References
edit- ^ "[dff] Digital Forensics Framework 1.3.0 released". Lists.digital-forensic.org. Archived from the original on 2014-02-04. Retrieved 2014-02-16.
- ^ "Welcome to S.B. Jain Institute of Technology Management and Research". ArxSys. Retrieved 28 May 2014.
- ^ "Open Source digital forensics & incident response software". Digital-forensic.org. Archived from the original on 2014-02-04. Retrieved 2014-02-16.
- ^ "DFF accepted into Debian - Pollux's blog". Wzdftpd.net. Archived from the original on 2014-02-19. Retrieved 2014-02-16.
- ^ "Linux Forensics Tools Repository". Archived from the original on November 4, 2013. Retrieved January 24, 2014.
- ^ "DEFT 8 Roadmap and features | DEFT Linux - Computer Forensics live CD". DEFT Linux. Archived from the original on 2013-11-03. Retrieved 2014-02-16.
- ^ "Packages Summary". Git.kali.org. 2013-02-02. Retrieved 2014-02-16.
- ^ "Misc 70 - LES EDITIONS DIAMOND". Boutique.ed-diamond.com. Retrieved 2014-02-16.
- ^ "Security Day". Archived from the original on February 2, 2014. Retrieved January 24, 2014.
- ^ [1][dead link ]
- ^ Altheide, Cory; Carvey, Harlan (2011-04-28). Digital Forensics with Open Source Tools: Cory Altheide, Harlan Carvey: 9781597495868: Amazon.com: Books. ISBN 978-1597495868.
- ^ Computer-Forensik Hacks: Amazon.de: Lorenz Kuhlee, Victor Völzow: Bücher. 2009-09-09. ASIN 3868991212.
- ^ Malwares - Identification, analyse et éradication: Amazon.fr: Paul Rascagneres: Livres. 2009-09-09. ASIN 2746079658.
- ^ Digital Forensics for Handheld Devices: Amazon.fr: Eamon P. Doherty: Livres anglais et étrangers. 2009-09-09. ASIN 1439898774.
- ^ "Saving Rain: The First Novel in The Rain Trilogy eBook: Karen-Anne Stewart: Kindle Store". Amazon. Retrieved 2014-02-16.
- ^ Stuttgen, Johannes; Dewald, Andreas; Freiling, Felix C. (2013-03-14). "Selective Imaging Revisited". 2013 Seventh International Conference on IT Security Incident Management and IT Forensics. IEEE. pp. 45–58. doi:10.1109/IMF.2013.16. ISBN 978-1-4673-6307-5. S2CID 17356972.
- ^ Vömel, Stefan; Freiling, Felix C. (2011-07-31). "A survey of main memory acquisition and analysis techniques for the windows operating system" (PDF). Digital Investigation. 8: 3–22. doi:10.1016/j.diin.2011.06.002. Retrieved 2014-02-16.
- ^ Eijkhoudt, Arnim; Suerink, Tristan (2013). "Uforia: Universal forensic indexer and analyzer". Journal of Computer Virology and Hacking Techniques. 9 (2): 59–63. doi:10.1007/s11416-013-0177-4. S2CID 29814904.
- ^ Vomel, Stefan; Lenz, Hermann (2013-03-14). "Visualizing Indicators of Rootkit Infections in Memory Forensics". 2013 Seventh International Conference on IT Security Incident Management and IT Forensics. IEEE. pp. 122–139. doi:10.1109/IMF.2013.12. ISBN 978-1-4673-6307-5. S2CID 11765652.
- ^ "EM-DMKM Case Study Computer and Network Forensics" (PDF). Cygalski.pl. Retrieved 2014-02-16.[permanent dead link ]
- ^ [2] [dead link ]
- ^ "L'investigation numerique" (PDF) (in French). Agence-nationale-recherche.fr. Retrieved 2014-02-16.
- ^ "Journal of Computer Applications : Vol.31 No.11". Joca.cn. November 2011. Retrieved 2014-02-16.
- ^ "DFRWS 2010 Forensics Challenge Results". Dfrws.org. Archived from the original on 2014-02-03. Retrieved 2014-02-16.