SlideShare a Scribd company logo
Welcome to Team Kernel
MISS (Master in Information systems Security)
Developing Portable Tool for
Digital Forensic(PTDF v1.0)
Content
•Introduction
•Objective
•Methodology
•Activity plan and timeline
•Expected Outcome
•Comments and suggestion
•Reference
Team Member
Mehedi HasanSorfaraz Uddin Rezaul Islam
Team Leader.
Al Imran Rajiv Kumar
Objective
▪Availability of Digital Forensic Tools
▪Independent Forensic Tools
▪Multi platform with user friendly DF
▪Portable DF Tools
▪Use of different DF tools
Objective
▪Availability of Digital Forensic Tools
Objective
▪Independent Forensic Tools
Objective
▪Multi platform with user friendly DF Tools
Objective
▪Portable DF Tools
Objective
▪Use of different DF tools
Methodology
▪ Modifying of Raspberry PI
▪ Installation of OS on Raspberry PI
▪ Installation of DF tools
▪Essential Hardware & Tools
▪ Make ready the system as Forensic tool
Modifying Raspberry PI
▪ What is a Raspberry PI
Modifying Raspberry PI
▪ Specification of Raspberry PI
OS Installation
▪ Kali Linux
▪ Raspberry PI Support Pidora (Fedora),
Archlinux, Raspian (Debian)
▪ Android
▪ Windows 10
Installation of DF tools
▪ Vulnerability Assessment Framework
(Matasploit)
▪ IP Scanning tools
▪ Information Gathering tools
▪ FTK, EnCase, Autospy
▪ Smartphone forensic tools
Essential Tools & Hardware
▪Raspberry PI
▪USB to SATA Converter to connect the target device.
▪Power Supply 5 volt, 2 ampere. Li-ion Battery.
▪Soldering Iron and Soldering Lead.
▪Desoldering Pump.
▪Multimeter (Analog & Digital).
▪Oscilloscope.
▪Some wire & Connector.
▪Raspberry PI Rack and Case
▪Keyboard & Mouse
▪Win32 Disk imager
Make ready the system
Expected Outcome
Limitation:
• CMOS Battery.
• Limited Storage area.
• Limited Power Backup.
Advantages:
• Integrated tool for Digital Forensic
• Low cost and portable
• Easily to maintain, available to get in local.
Activity plan and timeline
Project selection: 12 Feb, 2016
Resource studying: start date: 13 Feb,
End date: 19 Feb,
Start practical work: start date: 20 Feb,
End date: 12 Mar,
Comments and Feedback
▪ https://www.blackhat.com/presentations/bh-usa-
03/bh-us-03-willis-c/bh-us-03-willis.pdf
▪ http://www.forensicfocus.com/linux-forensics-
pitfalls-of-mounting-file-systems
▪ http://link.springer.com/chapter/10.1007%2F0-
387-31163-7_19#page-1
▪ http://www.deer-
run.com/~hal/IntroToDigitalForensics.pdf
Reference
Thank You !!

More Related Content

PPTX
Developing portale tool for digital forensic
PPTX
Kal i linux
PPTX
Linux/Unix Night - (PEN) Testing Toolkits (English)
PPTX
kali linux.pptx
PPTX
RCS Demo HackingTeam
PPT
Remote control system (rcs)
PPT
Network security
DOCX
Comparative Study of Digital Forensics Tools.docx
Developing portale tool for digital forensic
Kal i linux
Linux/Unix Night - (PEN) Testing Toolkits (English)
kali linux.pptx
RCS Demo HackingTeam
Remote control system (rcs)
Network security
Comparative Study of Digital Forensics Tools.docx

Similar to Portable tool for digital forensic (ptdf v1.0) (20)

PDF
Comparative Analysis of Digital Forensic Extraction Tools
PPTX
Digital forensics research: The next 10 years
PPTX
Digital Forensics best practices with the use of open source tools and admiss...
PPT
Forensic Lab Development
PPTX
Iot forensics
DOCX
SDOT Secure Hash, Semantic Keyword Extraction, and Dynamic Operator Pattern-B...
PPTX
Digital forensic tools
PPT
Digital Forensic Tools - Application Specific.
PPT
Digital Forensic tools - Application Specific
DOCX
Cyber&digital forensics report
PPTX
Dejuan-Green_Cyber-forensics-digital-investigation.pptx
PPTX
Forensic_Imaging_Presentationhjsksjsj.pptx
PDF
the Cyber - Forensics - Lab - Manual . pdf
DOCX
What is Digital Forensics.docx
PDF
An introduction to cyber forensics and open source tools in cyber forensics
PPT
Current Computer Forensics Tools in Cyber forensics.ppt
PDF
Debian Linux as a Forensic Workstation
PDF
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
PDF
Digital Forensic: Brief Intro & Research Challenge
PPTX
Digital Forensics introduction lab 1 2023.pptx
Comparative Analysis of Digital Forensic Extraction Tools
Digital forensics research: The next 10 years
Digital Forensics best practices with the use of open source tools and admiss...
Forensic Lab Development
Iot forensics
SDOT Secure Hash, Semantic Keyword Extraction, and Dynamic Operator Pattern-B...
Digital forensic tools
Digital Forensic Tools - Application Specific.
Digital Forensic tools - Application Specific
Cyber&digital forensics report
Dejuan-Green_Cyber-forensics-digital-investigation.pptx
Forensic_Imaging_Presentationhjsksjsj.pptx
the Cyber - Forensics - Lab - Manual . pdf
What is Digital Forensics.docx
An introduction to cyber forensics and open source tools in cyber forensics
Current Computer Forensics Tools in Cyber forensics.ppt
Debian Linux as a Forensic Workstation
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
Digital Forensic: Brief Intro & Research Challenge
Digital Forensics introduction lab 1 2023.pptx
Ad

More from Shekh Md Mehedi Hasan (20)

PPTX
Malware analysis Automatic Call Recorder.pptx
PDF
Company profile logikeye.pdf
PPTX
Hackng CPU Code through Security Fuse.pptx
PPTX
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
PDF
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
PDF
Wall Listening Devices.pdf
PDF
Smart voice security system
PDF
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
DOCX
Nuclear Powered Drones A Threat to Biodiversity.docx
PPTX
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
PPTX
Cyber Crime Awareness.pptx
PPT
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
PPTX
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
PDF
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
PPTX
Workshop on Cyber security and investigation
PPTX
Live memory forensics
PPTX
Workshop on Cyber security
PPTX
Cyber security & ethical hacking 10
PPTX
Cyber security and ethical hacking 7
PPTX
Cyber security and ethical hacking 9
Malware analysis Automatic Call Recorder.pptx
Company profile logikeye.pdf
Hackng CPU Code through Security Fuse.pptx
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
Wall Listening Devices.pdf
Smart voice security system
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
Nuclear Powered Drones A Threat to Biodiversity.docx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Cyber Crime Awareness.pptx
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
Workshop on Cyber security and investigation
Live memory forensics
Workshop on Cyber security
Cyber security & ethical hacking 10
Cyber security and ethical hacking 7
Cyber security and ethical hacking 9
Ad

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
KodekX | Application Modernization Development
PDF
Machine learning based COVID-19 study performance prediction
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
Teaching material agriculture food technology
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Approach and Philosophy of On baking technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
KodekX | Application Modernization Development
Machine learning based COVID-19 study performance prediction
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
sap open course for s4hana steps from ECC to s4
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
The AUB Centre for AI in Media Proposal.docx
Teaching material agriculture food technology
20250228 LYD VKU AI Blended-Learning.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Approach and Philosophy of On baking technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
The Rise and Fall of 3GPP – Time for a Sabbatical?
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Review of recent advances in non-invasive hemoglobin estimation

Portable tool for digital forensic (ptdf v1.0)