Digital Forensics Tools I Use For My Cyber Crime Investigation Part-II🔵

AJAK Cyber Academy
5 min readJan 18, 2024

--

Hi, Ajak Amico’s welcome back to another blog. so Today, I will share all the Digital forensics tools I use for cybercrime investigation part-II. All tools are used by professionals all over the world. Before starting, if you haven’t subscribed to our channel, do subscribe, guys. Contents related to cyber security, Bug Bounty, and Digital Forensics Investigation.👇

PART-1 link 👇

https://ajaksecurity.medium.com/digital-forensics-tools-i-use-for-my-cyber-crime-investigation-4800d650d4f5

Follow our Youtube Channel: @ajakcybersecurity (36Videos)

Follow on Instagram: @ajakcybersecurity

Follow on Medium: @medium (38 Articles)

1) Cellebrite

As mentioned in a previous blog, XRY and this tool “Cellebrite” holds the same power. This tool is a mobile forensics tool, especially designed for iOS forensics. It can unlock a phone, extract data from a device, and view it. This tool is widely used by police professionals worldwide, and it is also utilized in live forensics. Additionally, it is a user-friendly tool. If you want training, you can apply for the Cellebrite Certified Operator provided by Cellebrite organization. Upon completion you will receive a certification which will be useful when you apply for jobs. Below is the example for Cellebrite tool phone extraction.

2. Aid4Mail Forensic

Okay, Aid4Mail Forensics. As you can see from the name of the tool, it’s an email forensics tool used to investigate emails. When working with police professionals, you encounter a lot of email crimes. Despite having Autopsy and other tools available, especially when dealing with email crimes, I believe this would be a perfect tool. I have used this tool in my investigations a couple of times, and it proved to be worthwhile for email forensics. However, it’s important to note that you need a license to use this tool, and it is admissible in court. Below is an example of filtering emails for investigations.

3) Belkasoft

Belkasoft X, all in one tool designed for computer, mobile, and cloud forensics. This powerful tool facilitates the acquisition and analysis of diverse computer and mobile devices, execution of various analytical tasks, conducting comprehensive case-wide searches, marking artifacts for reference, and generating detailed reports. Belkasoft provides various training, including mobile forensics. Upon completion, you will receive certification from Belkasoft. Trust me, as I mentioned in my previous blog. I am applying for jobs, and I can see many job descriptions stating, “Must have hands-on experience with Belkasoft and Cellebrite. Certification cost around $999(as of my knowledge). Below is the example of belkasoft software.

4) Bulk Extractor

This tool is not used by many professionals, but when the case comes to my investigation, I use the tool Bulk Extractor. This tool is generally used when you need to extract any sensitive information from the drive, such as emails, passwords, images, videos, credit card numbers, and many more pieces of information. This tool is actually a free tool and doesn’t need a license. It is a command-line tool available on GitHub and pre-installed in Kali Linux. Before using the EnCase tool, I create a duplicate image copy of drive and scan it with Bulk Extractor for my case investigation. Below is the example for bulk extractor help page.

5) Maltego

Yes! You heard it right, it’s Maltego, one of my favorite tools when it comes to OSINT (Open-Source Intelligence) investigation. As of my knowledge, there is no other best tool to date for OSINT. There is a free version available bundled in Kali Linux, and maltego also has a professional version. Maltego can be used to determine the relationships between the following Entities:

  • People.
  • Names.
  • Email addresses.
  • Aliases.
  • Groups of people (social networks).
  • Companies.
  • Organizations.
  • Websites
  • Internet infrastructure such as:
  • Domains.
  • DNS names.
  • Netblocks.
  • IP addresses.
  • Affiliations.
  • Documents and files.

Connections between these pieces of information are found using open source intelligence (OSINT) techniques by querying sources such as DNS records, whois records, search engines, social networks, various online APIs and extracting meta data.

PS: 100 likes For this blog, I will post Part 3🙌

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

Hope you would have learned some information from this blog If so, kindly press the follow button for further updates. If you have any queries regarding cybersecurity, bug bounty, and digital forensics, kindly ping me on my Instagram. The link is pinned below: @ajak_cybersecurity_official. Best wishes from Ajak Cybersecurity.❤️

“கற்றவை பற்றவை🔥”

Learn Everyday, Happy Hacking 😁🙌

https://www.buymeacoffee.com/Ajak

— — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

Follow our Youtube Channel: @ajakcybersecurity

Follow on Instagram: @ajakcybersecurity.

--

--

AJAK Cyber Academy
AJAK Cyber Academy

Written by AJAK Cyber Academy

🚀 E-Learning Cybersecurity Platform🚀 Security Researcher @UK|| DFIR Consultant||Youtuber|| Instructor|| Blogger || https://ajakcyberacademy.com/

No responses yet