SlideShare a Scribd company logo
A
PRESENTATION
ON
FORENSICS
TOOL
1
FACEBOOK
FORENSICS
TOOLKIT(FFT)
2
Objectives
• Introduction to the forensics Kit
• Facebook Forensic Toolkit v2.9.4
• Installation
• Test Run
• The Report
• Analysis, discussion
• References/ Sources
• FAQs
3
Introduction
Facebook Forensic Toolkit(FFT)
It’s a eDiscovery Software used to Conduct online
investigations that includes:-
Identify suspect or illegal content
Preserve digital evidence
instantly download full profiles
Create profile public/private screenshots
Obtain account suspension or profile information
Create clear expert reports with a single click.
4
Facebook Forensic Toolkit v2.9.4
Marketed by Afentis Forensics
Leading scientific support investigation practice
with expert witnesses providing DNA analysis,
fingerprint evaluations, firearm evidence, cell site
analysis - from crime scene to court.
Developed by
Mr Patel, Director at Afentis Forensics, to assist
digital evidence and e-Discovery analysts.
5
Service Provided by FFT
• Profile Clone
Download complete Facebook profiles - incl personal
information, groups, associations, friends, media/photos, and
status updates
• ACPO Compliant
Association of Chief Police Officers (ACPO) evidence guidelines
compliant - verifiable audit logs for Court or procedural
requirements
• Save Casefiles
Save investigation progress and casefiles in open data format
(XML) - share files with other investigators or resume a previous
assessment
• Expert Report
Production in HTML detailing the investigation conducted, search
parameters, results of filters or data mining operations
6
The Popular users of the FFT
7
Installation
• Step-1
Go to the website of
http://www.facebookforensics.com/index.html
And click the download button on Home page.
8
Installation
• Step-2
Fill up the form that appears to the console.
9
Installation
• Step-3
A protected link will be sent to the email used.
10
Installation
• Step-4
Using the given link, the
zip file of 11.1 MB named
facebook_
forensics_toolkit
will be downloaded.
By extracting the zip-file a
FFT setup file will be
seen. Clicking it we will
find a installation &
Prerequisites wizard.
11
Installation
• Step-5
The software has two
pre-requisites:-
• MS .NET Framework
4.5
• Google Chrome
Browser
These has to be
downloaded before
using the tool.
12
Test Run
• Step-1
After the
completion of
download, run the
FFT icon on the
desktop.
This Home page
will appear.
Choose the
“Examine Profile
and Clone Data”
13
Test Run
• Step-2
Fill up the required
field that includes:-
-Case No
-Evidence No.
-Unique
Description,
-Examiner
-Notes
which will be
appeared in the
Final Report .
14
Test Run
• Step 3
Activate the All (Up-
right) button of this
page so that u may
get most of the
information of the
target Facebook
account.
15
Test Run
• Step 4
The target account
can be accessed
through –
 The account holder
 Friend
Selected any of them.
16
Test Run
• Step 5
The forensics
officer has to have
a valid Facebook
account to access
the target account.
Fill the User name
& password and
click the button
“Authenticate”
17
Test Run
• Step 6
www.facebook.com
will be automatically
opened on the
Google chrome and
user name &
password will be set
by the FFT .
Facebook data
provider apps will be
generated by which
FFT will extract the
information.
18
Test Run
• Step 7
After the completion
of data extraction on
FFT, this page will
appear having there
tabs-
• Investigate
• Results
• Report
19
Test Run
• Step 8
Specific search option is enabled in the friend list option on
the targeted account.
20
Test Run
• Step 9
A complete profile
investigation can be
performed as follows.
21
Test Run
• Step 10
A XML doc file will
be automatically
generated for the
further use of the
forensics officer.
22
• Step 11
All the sent and
received massages
can be extracted by
FFT .
23
Test Run
• Step 12
The groups in which
the target account
holder is attached to
can be seen through
FFT .
24
Test Run
• Step 13
A detailed list on
the friends can be
extracted as well.
25
Test Run
• Step 14
FFT provides a
screenshot for the
target profile for
future use.
26
Test Run
• Step 15
A mapping of all the
contacts of the
targeted account can
be executed through
FFT .
27
Test Run
The Report
28
Analysis
The tool analyzed the following points in much detail:
• Case Number
• Evidence Number
• Unique Description
• Examiner
• Notes
• User Profile ID or URL
• Output Directory
• Current Time/Date
• Profile Details
• Profile Image
• Cover Image
• Name
29
• Profile URL
• Hometown
• Location
• Email
• Website
• Birth Day
• Relationship Status
• Significant Other
• Interested In
• About Me
• Biography
• Education
Discussion
Through these details discussions, a forensics may be able
to track the followings of the suspected target :-
• Personal info of the profile
• Likes & Pages of the suspect
• Friends of the target profile
• Groups of the suspect
• Day to day sent & received massages of the profile
• Selective profiling of the suspect
• Inspect any doubt behavior on Facebook of the suspect
• Apps & games used by the target profile.
• Any suspected events participated by the suspect.
30
References
• 5 tools for digital forensics. (2010, march 16). Retrieved
October 23, 2015, from linkedin.com:
www.linkedin.com
• WikiForenscis. (2010, June 21). Retrieved October 21,
2015, from wikipedia.com:
http://forensicswiki.org/wiki/Tools
• Facebook Forensics. (2011, January 25). Retrieved
October 22, 2015, from Facebookforensics.com:
http://www.facebookforensics.com/index.html
• Anthony C. T. Lai, W. L. (2011). Facebook Forensics.
Tokyo, Japan: Valkyrie-X Security Research Group (VXRL).
31

More Related Content

PPT
Malware forensics
PDF
Email Forensics
PPTX
Beginner's Guide to SIEM
PDF
Cloud-forensics
PDF
Microsoft Office 365 Advanced Threat Protection
PPTX
Endpoint Protection
PDF
IBM QRadar Security Intelligence Overview
PPSX
Next-Gen security operation center
Malware forensics
Email Forensics
Beginner's Guide to SIEM
Cloud-forensics
Microsoft Office 365 Advanced Threat Protection
Endpoint Protection
IBM QRadar Security Intelligence Overview
Next-Gen security operation center

What's hot (20)

PPT
Computer Worms
PPTX
Bsides 2019 - Intelligent Threat Hunting
PPTX
Data Acquisition
PPTX
Vapt life cycle
PPT
Linux forensics
PDF
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
PDF
Lecture #31 : Windows Forensics
PPTX
Security Information and Event Management (SIEM)
PPTX
Incident response process
PDF
2021/0/15 - Solarwinds supply chain attack: why we should take it sereously
PPTX
Virtual Machine Forensics
PPTX
Memory forensics
PDF
Cybersecurity Roadmap Development for Executives
PPTX
Cyber Threat Hunting Workshop
PPT
Introduction to computer forensic
PDF
QRadar Architecture.pdf
PPTX
Broken Authentication and Authorization(1).pptx
PPTX
SIEM presentation final
PDF
IBM Qradar & resilient
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
Computer Worms
Bsides 2019 - Intelligent Threat Hunting
Data Acquisition
Vapt life cycle
Linux forensics
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Lecture #31 : Windows Forensics
Security Information and Event Management (SIEM)
Incident response process
2021/0/15 - Solarwinds supply chain attack: why we should take it sereously
Virtual Machine Forensics
Memory forensics
Cybersecurity Roadmap Development for Executives
Cyber Threat Hunting Workshop
Introduction to computer forensic
QRadar Architecture.pdf
Broken Authentication and Authorization(1).pptx
SIEM presentation final
IBM Qradar & resilient
Security operations center-SOC Presentation-مرکز عملیات امنیت
Ad

Viewers also liked (20)

PPTX
Windows nt istallation
PPTX
NTFS vs FAT
PPT
Anti-Forensics: Real world identification, analysis and prevention
PDF
Windows 7-cheat-sheet
PPTX
Files and Folders in Windows 7
PDF
The Future of Digital Forensics
PPT
G Infomgnt
PPT
Part6 Private Sector Concerns
PDF
Digital forensic upload
PPT
Computer Forensics & Windows Registry
PPTX
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
PDF
Sadfe2007
PPT
Level1 Part8 End Of The Day
PPT
File Management Presentation
PDF
NTFS Forensics
PDF
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
PDF
Disk forensics
PDF
Forensic Anaysis on Twitter
PPTX
Windows 10 Forensics: OS Evidentiary Artefacts
Windows nt istallation
NTFS vs FAT
Anti-Forensics: Real world identification, analysis and prevention
Windows 7-cheat-sheet
Files and Folders in Windows 7
The Future of Digital Forensics
G Infomgnt
Part6 Private Sector Concerns
Digital forensic upload
Computer Forensics & Windows Registry
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Sadfe2007
Level1 Part8 End Of The Day
File Management Presentation
NTFS Forensics
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
Disk forensics
Forensic Anaysis on Twitter
Windows 10 Forensics: OS Evidentiary Artefacts
Ad

Similar to Facebook Forensics Toolkit(FFT) (20)

PPTX
DFS____________________Presentation.pptx
PPTX
Module 6 - Insider Risk.pptx
PPT
Presentation-DFI
KEY
Enterprise Open Source Intelligence Gathering
PPT
computer forensicsPPT4-SESI4-20220406071621.ppt
PDF
Advanced Research Investigations for SIU Investigators
PDF
CyberSecurity Series Malware slides
PPTX
CIE AS Level Applied ICT Unit 4 - Systems Life Cycle
PDF
4 Getting Started & 5 Leads
PDF
AppInspect: Large-scale Evaluation of Social Networking Apps
PPTX
A brief of Osint and its uses in cyber crime.pptx
PPT
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your Risk
PDF
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
PDF
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
PDF
Enterprise Architecture Surveys with LeanIX
PDF
Digital toolbox researchanddevelopment_slides
PDF
Digital toolbox researchanddevelopment_slides
PDF
Digital toolbox researchanddevelopment_slides
PDF
Taking the Share out of Sharepoint: SharePoint Application Security.
PPTX
Employee Turnover And Computer Forensic Analysis Best Practices
DFS____________________Presentation.pptx
Module 6 - Insider Risk.pptx
Presentation-DFI
Enterprise Open Source Intelligence Gathering
computer forensicsPPT4-SESI4-20220406071621.ppt
Advanced Research Investigations for SIU Investigators
CyberSecurity Series Malware slides
CIE AS Level Applied ICT Unit 4 - Systems Life Cycle
4 Getting Started & 5 Leads
AppInspect: Large-scale Evaluation of Social Networking Apps
A brief of Osint and its uses in cyber crime.pptx
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your Risk
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
Enterprise Architecture Surveys with LeanIX
Digital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slides
Taking the Share out of Sharepoint: SharePoint Application Security.
Employee Turnover And Computer Forensic Analysis Best Practices

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation theory and applications.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Cloud computing and distributed systems.
PPTX
Programs and apps: productivity, graphics, security and other tools
PPT
Teaching material agriculture food technology
PPTX
Spectroscopy.pptx food analysis technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
MYSQL Presentation for SQL database connectivity
PDF
KodekX | Application Modernization Development
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
Encapsulation theory and applications.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Digital-Transformation-Roadmap-for-Companies.pptx
Cloud computing and distributed systems.
Programs and apps: productivity, graphics, security and other tools
Teaching material agriculture food technology
Spectroscopy.pptx food analysis technology
Reach Out and Touch Someone: Haptics and Empathic Computing
MYSQL Presentation for SQL database connectivity
KodekX | Application Modernization Development
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Understanding_Digital_Forensics_Presentation.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
MIND Revenue Release Quarter 2 2025 Press Release
Per capita expenditure prediction using model stacking based on satellite ima...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Chapter 3 Spatial Domain Image Processing.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

Facebook Forensics Toolkit(FFT)

  • 3. Objectives • Introduction to the forensics Kit • Facebook Forensic Toolkit v2.9.4 • Installation • Test Run • The Report • Analysis, discussion • References/ Sources • FAQs 3
  • 4. Introduction Facebook Forensic Toolkit(FFT) It’s a eDiscovery Software used to Conduct online investigations that includes:- Identify suspect or illegal content Preserve digital evidence instantly download full profiles Create profile public/private screenshots Obtain account suspension or profile information Create clear expert reports with a single click. 4
  • 5. Facebook Forensic Toolkit v2.9.4 Marketed by Afentis Forensics Leading scientific support investigation practice with expert witnesses providing DNA analysis, fingerprint evaluations, firearm evidence, cell site analysis - from crime scene to court. Developed by Mr Patel, Director at Afentis Forensics, to assist digital evidence and e-Discovery analysts. 5
  • 6. Service Provided by FFT • Profile Clone Download complete Facebook profiles - incl personal information, groups, associations, friends, media/photos, and status updates • ACPO Compliant Association of Chief Police Officers (ACPO) evidence guidelines compliant - verifiable audit logs for Court or procedural requirements • Save Casefiles Save investigation progress and casefiles in open data format (XML) - share files with other investigators or resume a previous assessment • Expert Report Production in HTML detailing the investigation conducted, search parameters, results of filters or data mining operations 6
  • 7. The Popular users of the FFT 7
  • 8. Installation • Step-1 Go to the website of http://www.facebookforensics.com/index.html And click the download button on Home page. 8
  • 9. Installation • Step-2 Fill up the form that appears to the console. 9
  • 10. Installation • Step-3 A protected link will be sent to the email used. 10
  • 11. Installation • Step-4 Using the given link, the zip file of 11.1 MB named facebook_ forensics_toolkit will be downloaded. By extracting the zip-file a FFT setup file will be seen. Clicking it we will find a installation & Prerequisites wizard. 11
  • 12. Installation • Step-5 The software has two pre-requisites:- • MS .NET Framework 4.5 • Google Chrome Browser These has to be downloaded before using the tool. 12
  • 13. Test Run • Step-1 After the completion of download, run the FFT icon on the desktop. This Home page will appear. Choose the “Examine Profile and Clone Data” 13
  • 14. Test Run • Step-2 Fill up the required field that includes:- -Case No -Evidence No. -Unique Description, -Examiner -Notes which will be appeared in the Final Report . 14
  • 15. Test Run • Step 3 Activate the All (Up- right) button of this page so that u may get most of the information of the target Facebook account. 15
  • 16. Test Run • Step 4 The target account can be accessed through –  The account holder  Friend Selected any of them. 16
  • 17. Test Run • Step 5 The forensics officer has to have a valid Facebook account to access the target account. Fill the User name & password and click the button “Authenticate” 17
  • 18. Test Run • Step 6 www.facebook.com will be automatically opened on the Google chrome and user name & password will be set by the FFT . Facebook data provider apps will be generated by which FFT will extract the information. 18
  • 19. Test Run • Step 7 After the completion of data extraction on FFT, this page will appear having there tabs- • Investigate • Results • Report 19
  • 20. Test Run • Step 8 Specific search option is enabled in the friend list option on the targeted account. 20
  • 21. Test Run • Step 9 A complete profile investigation can be performed as follows. 21
  • 22. Test Run • Step 10 A XML doc file will be automatically generated for the further use of the forensics officer. 22
  • 23. • Step 11 All the sent and received massages can be extracted by FFT . 23 Test Run
  • 24. • Step 12 The groups in which the target account holder is attached to can be seen through FFT . 24 Test Run
  • 25. • Step 13 A detailed list on the friends can be extracted as well. 25 Test Run
  • 26. • Step 14 FFT provides a screenshot for the target profile for future use. 26 Test Run
  • 27. • Step 15 A mapping of all the contacts of the targeted account can be executed through FFT . 27 Test Run
  • 29. Analysis The tool analyzed the following points in much detail: • Case Number • Evidence Number • Unique Description • Examiner • Notes • User Profile ID or URL • Output Directory • Current Time/Date • Profile Details • Profile Image • Cover Image • Name 29 • Profile URL • Hometown • Location • Email • Website • Birth Day • Relationship Status • Significant Other • Interested In • About Me • Biography • Education
  • 30. Discussion Through these details discussions, a forensics may be able to track the followings of the suspected target :- • Personal info of the profile • Likes & Pages of the suspect • Friends of the target profile • Groups of the suspect • Day to day sent & received massages of the profile • Selective profiling of the suspect • Inspect any doubt behavior on Facebook of the suspect • Apps & games used by the target profile. • Any suspected events participated by the suspect. 30
  • 31. References • 5 tools for digital forensics. (2010, march 16). Retrieved October 23, 2015, from linkedin.com: www.linkedin.com • WikiForenscis. (2010, June 21). Retrieved October 21, 2015, from wikipedia.com: http://forensicswiki.org/wiki/Tools • Facebook Forensics. (2011, January 25). Retrieved October 22, 2015, from Facebookforensics.com: http://www.facebookforensics.com/index.html • Anthony C. T. Lai, W. L. (2011). Facebook Forensics. Tokyo, Japan: Valkyrie-X Security Research Group (VXRL). 31