词条 | Digital Forensics Framework |
释义 |
| name = Digital Forensics Framework (DFF) | logo = | screenshot = | caption = | collapsible = | author = Frédéric Baguelin, Solal Jacob, Christophe Malinge, Jérémy Mounier | developer = Frédéric Baguelin, Solal Jacob, Jérémy Mounier | released = | latest release version = 1.3.0[1] | latest release date = {{Start date and age|2013|02|28}} | latest preview version = | latest preview date = | programming language = C++, Python, PyQt4 | operating system = Unix-like, Windows | platform = | size = | language count = 7 | status = Active | genre = Computer forensics | license = GPL | website = {{URL|www.digital-forensic.org}} }}Digital Forensics Framework (DFF) is computer forensics open-source software. It is used by professionals and non-experts to collect, preserve and reveal digital evidence without compromising systems and data.[2] User interfacesDigital Forensics Framework offers a graphical user interface (GUI) developed in PyQt and a classical tree view. Features such as recursive view, tagging, live search and bookmarking are available. Its command line interface allows the user to remotely perform digital investigation. It comes with common shell functions such as completion, task management, globing and keyboard shortcuts. DFF can run batch scripts at startup to automate repetitive tasks. Advanced users and developers can use DFF directly from a Python interpreter to script their investigation. Distribution methodsIn addition to the source code package and binary installers for GNU/Linux and Windows,[3] Digital Forensics Framework is available in operating system distributions as is typical in free and open-source software (FOSS), including Debian,[4] Fedora and[5] Ubuntu. Other Digital Forensics Framework methods available are digital forensics oriented distribution and live cd:
Publications
Published books that mention Digital Forensics Framework are:
In literature
White papers
PrizeDFF was used to solve the 2010 Digital Forensic Research Workshop (DFRWS) challenge consisting of the reconstructing a physical dump of a NAND flash memory.[24] References1. ^{{cite web|url=http://lists.digital-forensic.org/pipermail/dff/2013-February/000117.html |title=[dff] Digital Forensics Framework 1.3.0 released |publisher=Lists.digital-forensic.org |date= |accessdate=2014-02-16}} 2. ^{{cite web|title= Welcome to S.B. Jain Institute of Technology Management and Research|url=http://www.sbjit.edu.in/|publisher=ArxSys|accessdate=28 May 2014}} 3. ^{{cite web|url=http://www.digital-forensic.org/downloads/dff |title=Open Source digital forensics & incident response software |publisher=Digital-forensic.org |date= |accessdate=2014-02-16}} 4. ^{{cite web|url=https://www.wzdftpd.net/blog/index.php?post/2011/10/18/DFF-accepted-into-Debian |title=DFF accepted into Debian - Pollux's blog |publisher=Wzdftpd.net |date= |accessdate=2014-02-16}} 5. ^{{cite web|url=https://www.cert.org/forensics/tools |accessdate=January 24, 2014 |deadurl=yes |archiveurl=https://web.archive.org/web/20131104091132/http://www.cert.org/forensics/tools/ |archivedate=November 4, 2013 }} 6. ^{{cite web|url=http://www.deftlinux.net/2013/02/20/deft-8-roadmap-and-features/ |title=DEFT 8 Roadmap and features | DEFT Linux - Computer Forensics live CD |publisher=DEFT Linux |date= |accessdate=2014-02-16}} 7. ^{{cite web|url=http://git.kali.org/gitweb/?p=packages/dff.git;a=summary |title=Packages Summary |publisher=Git.kali.org |date=2013-02-02 |accessdate=2014-02-16}} 8. ^{{cite web|url=http://boutique.ed-diamond.com/misc/506-misc70.html |title=Misc 70 - LES EDITIONS DIAMOND |publisher=Boutique.ed-diamond.com |date= |accessdate=2014-02-16}} 9. ^{{cite web|url=http://www.esgilab-secu.com/fiche.php |accessdate=January 24, 2014 |deadurl=yes |archiveurl=https://web.archive.org/web/20140202175327/http://www.esgilab-secu.com/fiche.php |archivedate=February 2, 2014 }} 10. ^ {{dead link|date=February 2014}} 11. ^{{cite book|title=Digital Forensics with Open Source Tools: Cory Altheide, Harlan Carvey: 9781597495868: Amazon.com: Books |date= 2011-04-28|isbn = 978-1597495868|last1 = Altheide|first1 = Cory|last2= Carvey|first2= Harlan}} 12. ^{{cite book|title=Computer-Forensik Hacks: Amazon.de: Lorenz Kuhlee, Victor Völzow: Bücher |date=2009-09-09 |id= {{ASIN|3868991212|country=de}} }} 13. ^{{cite book|title=Malwares - Identification, analyse et éradication: Amazon.fr: Paul Rascagneres: Livres |date=2009-09-09 |id= {{ASIN|2746079658|country=fr}} }} 14. ^{{cite book|title=Digital Forensics for Handheld Devices: Amazon.fr: Eamon P. Doherty: Livres anglais et étrangers |date=2009-09-09 |id= {{ASIN|1439898774|country=fr}} }} 15. ^{{cite web|url=https://www.amazon.com/Saving-Rain-First-Novel-Trilogy-ebook/dp/B00FDN3RTU |title=Saving Rain: The First Novel in The Rain Trilogy eBook: Karen-Anne Stewart: Kindle Store |date= |accessdate=2014-02-16}} 16. ^{{cite book|chapter-url=http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6568553&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6568553 |title=IEEE Xplore Abstract - Selective Imaging Revisited |pages=45–58 |doi=10.1109/IMF.2013.16 |publisher=Ieeexplore.ieee.org |date=2013-03-14 |accessdate=2014-02-16|chapter=Selective Imaging Revisited |last1=Stuttgen |first1=Johannes |last2=Dewald |first2=Andreas |last3=Freiling |first3=Felix C. |isbn=978-1-4673-6307-5 }} 17. ^{{cite journal|url=https://faui1-files.cs.fau.de/public/publications/postprint-voemel-freiling-memory-survey-2011.pdf |title=A survey of main memory acquisition and analysis techniques for the windows operating system |date=2011-07-31 |accessdate=2014-02-16 |doi=10.1016/j.diin.2011.06.002 |volume=8 |journal=Digital Investigation |pages=3–22|last1=Vömel |first1=Stefan |last2=Freiling |first2=Felix C. }} 18. ^{{cite journal|title=Uforia: Universal forensic indexer and analyzer |doi=10.1007/s11416-013-0177-4 |volume=9 |issue=2 |journal=Journal of Computer Virology and Hacking Techniques |pages=59–63|year = 2013|last1 = Eijkhoudt|first1 = Arnim|last2=Suerink |first2=Tristan }} 19. ^{{cite book|chapter-url=http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6568560&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6568560 |title=IEEE Xplore Abstract - Visualizing Indicators of Rootkit Infections in Memory Forensics |pages=122–139 |doi=10.1109/IMF.2013.12 |publisher=Ieeexplore.ieee.org |date=2013-03-14 |accessdate=2014-02-16|chapter=Visualizing Indicators of Rootkit Infections in Memory Forensics |last1=Vomel |first1=Stefan |last2=Lenz |first2=Hermann |isbn=978-1-4673-6307-5 }} 20. ^{{cite web|url=http://www.cygalski.pl/cv/files/Forensics.pdf |title=EM-DMKM Case Study Computer and Network Forensics |publisher=Cygalski.pl |accessdate=2014-02-16}} 21. ^[https://www.os3.nl/_media/2010-2011/students/jochem_van_kerkwijk/cf/cf_report.pdf] {{dead link|date=February 2014}} 22. ^{{cite web|url=http://www.agence-nationale-recherche.fr/Colloques/WISG2013/articles/Article_Larinier.pdf |title=L'investigation numerique |publisher=Agence-nationale-recherche.fr |language=fr |accessdate=2014-02-16}} 23. ^{{cite web|url=http://www.joca.cn/CN/article/downloadArticleFile.do?attachType=PDF&id=15000|title=Journal of Computer Applications : Vol.31 No.11|publisher=Joca.cn|date=November 2011|accessdate=2014-02-16}} 24. ^{{cite web|url=http://dfrws.org/2010/challenge/results.shtml |title=DFRWS 2010 Forensics Challenge Results |publisher=Dfrws.org |accessdate=2014-02-16 |deadurl=yes |archiveurl=https://web.archive.org/web/20140203144143/http://dfrws.org/2010/challenge/results.shtml |archivedate=2014-02-03 |df= }} External links
5 : Computer forensics|Digital forensics software|Free security software|Hard disk software|Unix security-related software |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。