Revealing Evidence Using DFF

Welcome to the last chapter; you've made it. The final tool we'll be using is the Digital Forensic Framework (DFF). DFF performs the automated analysis of images using a modular model all in one simple and user-friendly graphical user interface. DFF supports several image file formats including .dd, .raw, .img, .bin, E01, EWF, and AFF. Modules can be applied to view various file formats using embedded viewers for video, audio, PDFs, documents, images, and registry files.

The following are also supported by DFF:

  • Browser history analysis
  • File recovery
  • Metadata and EXIF data analysis
  • Memory/RAM analysis

Having all these features in one GUI allows for easy investigation and analysis of acquired images. For the exercises in this chapter, we'll be using images already acquired and available for download. This does not mean that we should use only one tool (such as DFF) for analysis. I recommend using at least two tools for all investigative tasks so that the results can be compared, adding to the accuracy and integrity of the investigation.

Remember, when acquiring your own images, always ensure that the integrity of the device and evidence is maintained through the use of write-blockers and the use of hashing tools. It's also important that we only work with forensic copies of the evidence unless circumstances require otherwise to again preserve the evidence.

Let's take a look at the topics we will be covering in this chapter:

  • Installing DFF
  • Starting the DFF GUI
  • Recovering deleted files with DFF
  • File analysis with DFF
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset