Passware Kit Forensic 9.7

Passware Kit Forensic 9.7

Passware Kit Forensic 9.7 Product Image

Passware, Inc.'s Passware Kit Forensic has become the first commercially available software to break TrueCrypt hard drive encryption without applying a time-consuming brute-force attack. It was also the first product to decrypt BitLocker drives. In response to customer requests, especially from law enforcement organizations, Passware has enhanced Passware Kit Forensic to allow for memory acquisition of a seized computer over FireWire port, even if the computer is locked. When a target computer is seized and turned on with the encryption disk accessible, the software scans its memory image and extracts the encryption keys, so law enforcement personnel can access the stored data.

Passware Kit Forensic 9.7 is a complete encrypted evidence discovery solution that reports all password-protected items on a computer and gains access to these items using the advanced decryption and password recovery algorithms. The software, which can also run in portable mode from a USB drive, is capable of finding encrypted data and recovering file and website passwords without making any changes to the target computer. Passware Kit Forensic 9.7 supports over 180 different file types and features recovery of passwords for PGP archives and virtual disks. The software supports Windows 7, Vista, 2003, XP, and 2008 Server, and now works with Guidance EnCase E01 disk image files – the de-facto standard for computer forensics.

Long believed unbreakable, TrueCrypt is a free open-source full-disk encryption software for Windows 7/Vista/XP, Mac OS X and Linux, that creates virtual hard disks with real-time encryption.

 

 

 

 

Expand for more details on this Product

SPEKTOR Drive Litigation Support and Forensic Incident Response Tool

Product From Evidence Talks

UK digital forensic experts Evidence Talks released SPEKTOR Drive. It is the latest powerful e-discovery, litigation support and forensic incident response tool designed for non-expert users, and will reduce the need for outsourced expertise, which will lower the cost of responding to litigation, digital incidents and forensic investigations.

Get Info Now

Forensic Toolkit (FTK) Version 5.1

Product From Accessdata Group LLC

The big challenges digital investigators face is the time and effort required to sift through the sheer volume of case data across their devices. They use several third party solutions to handle specific tasks which add greater complexity and resources.  

Get Info Now

MiniDAS

Product From CyanLine

CyanLine's free software grants law enforcement agencies the power to capture and unlock never-before-seen bonus data. Inspired by CyanLine’s Fast Disk Acquisition System (FDAS), MiniDAS allows investigators to obtain critical metadata, also known as “data about the data,” and collect a forensic image, and is available for free to all law enforcement agencies worldwide.

Get Info Now

Mobile Examiner Trainnig Certification Program

Product From Cellebrite

Cellebrite, the leading developer and provider of mobile forensic solutions, today announced the launch of a new training and certification program. The new program delivers a higher quality, standardized mobile forensics training curriculum, culminating in a formal Cellebrite Certified Mobile Examiner (CCME) credential. The program empowers mobile forensic, investigative, and intelligence professionals in law enforcement, military, and corporate environments to employ mobile forensics best practices in their everyday work, and when applicable, to defend their practices with confidence in a court of law.

Get Info Now

Shadow 3

Product From VOOM Technologies Inc.

To access a suspect’s computer, traditional procedure involves removing the hard drive, creating a forensic image (a duplicate copy) and then analyzing that copy using sophisticated industry-specific software. 

Get Info Now

Steganography Analyzer Signature Scanner (StegAlyzerSS)

Product From Steganography Analysis and Research Center

StegAlyzerSS is a steganalysis tool designed to extend the scope of traditional computer forensic examinations by allowing the examiner to scan suspect media or forensic images of suspect media for uniquely identifiable byte patterns, or known signatures, left inside files when particular steganography applications are used to embed hidden information within them. Automated extraction algorithms unique to StegAlyzerSS can be used to recover hidden information.

Get Info Now

Steganography Analyzer Artifact Scanner (StegAlyzerAS)

Product From Steganography Analysis and Research Center

StegAlyzerAS is a steganalysis tool designed to extend the scope of traditional computer forensic examinations by allowing the examiner to scan suspect media or forensic images of suspect media for known artifacts of steganography applications.

Get Info Now

Mem Marshal

Product From ARCHITECTURE TECHNOLOGY CORP. (ATC-NY)

ATC-NY's new forensics tool - Mem Marshal 1.0 - is a user-friendly, automated memory analysis system that assists and automates computer forensic investigations of volatile memory (RAM) images. Mem Marshal enables computer forensic investigators to analyze and effectively make use of information contained in volatile memory. Memory analysis produces important, case-relevant data for investigators that cannot be obtained from disk analysis, such as running applications, open files, and active network connections.

Get Info Now

RTX Secure Tower Enclosure with Encryption

Product From WIEBETECH, A BRAND OF CRU-DATAPORT

Protecting sensitive data from security breaches is easy with CRU-DataPort’s new line of RTX Secure encrypted storage towers. Specifically designed for government agencies with top-secret data, these units are now available for anyone that needs to prevent unauthorized access to confidential files. RTX Secure high performance tower enclosures, with AES 256-bit (FIPS 140-2) hardware based encryption, offer TrayFree™ removable bays for easy hot swapping and offsite data backup scalable to the amount of storage needed. Units are available with 4, 6 or 8 TrayFree bays and multiple interface options (Multilane, eSATA (point to point), eSATA (port multiplier), iSCSI and Quad (eSATA, FireWire 400/800 or USB 2.0).  The units support any capacity 3.5” SATA drive.

Get Info Now

UFED CHINEX

Product From Cellebrite

Cellebrite announced the launch of UFED CHINEX, an end-to-end solution for extraction and decoding of data and content from thousands of Chinese mobile phones. UFED CHINEX will enable law enforcement agencies to support the full forensic analysis of Chinese mobile phones.

Get Info Now