FAW or Forensics Acquisition of Websites

FAW is the first browser that has been designed to acquire websites for Forensics purposes from any web site on the Internet.faw

The FAW or Forensics Acquisition of Websites program allows the overall δηλαδή την πλήρη ανάλυση της or just a part of it by the user choosing quickly and simply what he wants to use. Having as tools the scroll bar and the horizontal cursor it is easy for the user to decide which web area of ​​the page he wants to analyze.

Additionally, the application can analyze all pages that contain feeds. The software automatically acquires videos or pages with the help of plug in (JavaScript, jQuery, Flash, etc.).

The program is also designed to work with web pages that contain frames, that is, websites that consist of separate sections, independent of each other. The side scroll bars allow you to navigate between different frames to decide what needs to be acquired by the user.

In addition, you can obtain all types of files on the web page, including: images, files, documents, executables and Scripts. The data of all scanned files is placed in the Acquisition.xml folder.

Obtaining the objects linked to the page is configured by the user from the menu Configuration> Linked Objects. It is also important that the HTML code of the web pages can be obtained.

-User with WireShark. To Wireshark είναι ένα δικτυακό πρωτόκολλο αναλυτή, που χρησιμοποιείται ευρέως σε forensic δίκτυα, το οποίο έχει σημείο αναφοράς την ευελιξία. Χάρη σε ειδικούς κανόνες για την ταξινόμηση και το φιλτράρισμα του ερευνητή μπορεί να προεκτείνει και να αναλύσει τα δεδομένα γρήγορα. Το FAW χρησιμοποιεί τις δυνατότητες του Wireshark για να συλλάβει το σύνολο της κυκλοφορίας σε όλες τις διασυνδέσεις σε ενεργά δίκτυα. Κατά τη διάρκεια της απόκτησης της ιστοσελίδας, ο ερευνητής μπορεί να κάνει μια ανάλυση του συνόλου της ς του δικτύου που διήλθε για να φτάσει στη σελίδα Web. Η ολοκλήρωση σας επιτρέπει να έχετε ένα αρχείο καταγραφής σε μορφή pcap.

-Automatically calculate the MD5 and SHA1 fragmentation of all acquired files. The application automatically executes the MD5 hash and the SHA1 calculation for all the obtained files. Hash algorithms, especially SHA1 and MD5, are widely used in IT forensics to validate and digitally sign the acquired data. The recent legislation imposes a guarding chain that allows information technology to be preserved mainly by potential post-takeover changes.

-Verification of integrity of the acquisition. This feature enables you to verify the integrity of your market by using a proprietary algorithm to check if all the files that are recorded are not altered.

It is important to mention that there have been 9 versions of the proτος με την τελευταία να είναι στις 8/1/2014 πράγμα που σημαίνει ότι το πρόγραμμα ανανεώνεται συνεχώς, επίσης είναι ένα freeware program το οποίο μπορεί οποιοσδήποτε να το κατεβάσει από το download of the site. Finally, for anyone interested in downloading the specific program on the Site page there are specific steps that make navigating the program very easy!

Paraphrastanitis Konstantinos and Papapaschos Nikos @Wikibook

Download

http://www.fawproject.com/en/download.aspx

 

 

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).