FAW or Forensics Acquisition of Websites

FAW is the first browser that has been designed to acquire websites for Forensics purposes from any web site on the Internet.faw

The FAW or Forensics Acquisition of Websites program allows the total acquisition, i.e. the complete analysis of the website or just a part of it, with the user quickly and simply choosing what they want to use. Having the bar as tools and the horizontal cursor it is easy for the user to decide which web area of ​​the page he wants to analyze.

Additionally, the application can analyze all pages that contain feeds. The software automatically acquires videos or pages with the help of plug in (JavaScript, jQuery, Flash, etc.).

The program is also designed to work with web pages that contain frames, that is, websites that consist of separate sections, independent of each other. The side scroll bars allow you to navigate between different frames to decide what needs to be acquired by the user.

Plus you can get all types of the website, including: , , documents, executables and Scripts. The details of all scanned files are placed in the Acquisition.xml folder.

Obtaining the objects linked to the page is configured by the user from the menu Configuration> Linked Objects. It is also important that the HTML code of the web pages can be obtained.

-User with WireShark. Wireshark is a network protocol analyzer, widely used in forensics , which has flexibility as a reference point. Thanks to special rules for sorting and filtering the researcher can extrapolate and analyze the data quickly. FAW uses the capabilities of Wireshark to capture all traffic on all interfaces in active networks. During the acquisition of the web page, the researcher can make an analysis of all the network traffic that went through to reach the web page. Completion allows you to have a log file in pcap format.

-Automatically calculate the MD5 and SHA1 fragmentation of all acquired files. The application automatically executes the MD5 hash and the SHA1 calculation for all the obtained files. Hash algorithms, especially SHA1 and MD5, are widely used in IT forensics to validate and digitally sign the acquired data. The recent legislation imposes a guarding chain that allows information technology to be preserved mainly by potential post-takeover changes.

-Verification of integrity of the acquisition. This feature enables you to verify the integrity of your market by using a proprietary algorithm to check if all the files that are recorded are not altered.

It is important to note that 9 versions of the program have come out with 8 / 1 / 2014 which means that the program is constantly updated, it is also a freeware program that anyone can download from the download center of the site. Finally, for anyone interested in downloading this program on the Site page, there are specific steps that make navigating the program very easy!

Paraphrastanitis Konstantinos and Papapaschos Nikos @Wikibook

Download

http://www.fawproject.com/en/download.aspx

 

 

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).