

- #Prodiscover basic report compared to ftk demo report windows 10
- #Prodiscover basic report compared to ftk demo report software
The advantage of this method is that the system works in secret and can be combined with other digital evidence applications that already exist, so that the accuracy and completeness of the resulting digital evidence can be improved. This paper proposes the development of a new method for the retrieval of digital evidence called theTwo-StepInjection method (TSI).It focuses on the prevention of the loss of digital evidence through the deletion of data by suspects or other parties. Most data can only be recovered partially and sometimes not perfectly, so that some or all files cannot be opened.

Unfortunately, such methods cannot guarantee that all data will be recovered. A lot of research has been done with the goal of retrieving data from flash memory or other digital storagemediafromwhich the content has been deleted. There are many complications when a suspect or related person does not want to cooperate orhas removed digital evidence. In digital forensicinvestigations, the investigators take digital evidence from computers, laptops or other electronic goods. The results of the research have successfully shown that the live forensics technique in RAM is able to obtain digital evidence in the form of an attacker's IP, evidence of exploits/Trojans, processes running on RAM, operating system profiles used and the location of the exploits/Trojan when executed by the victim. This research will use FTK Imager, Dumpit, and Magnet RAM Capture as the RAM acquisition tool and Volatility as the analysis tool. The live forensic technique is important because information on RAM will be lost if the computer is off. Then the digital forensics process uses live forensics techniques on computer RAM, where the computer RAM contains information about the processes running on the computer.
#Prodiscover basic report compared to ftk demo report windows 10
In this study, a simulation of attacks on Windows 10 will be carried out with Metasploit. For this reason, it is necessary to carry out a digital forensic process to uncover these crimes. Metasploit is one of the frameworks commonly used by penetration testers to audit or test the security of a computer system legally, but it does not rule out the possibility that Metasploit can also be used for crime. With the support of computer networks, information technology is used as a medium for exchanging data and information. Information technology has become an essential thing in the digital era as it is today.
#Prodiscover basic report compared to ftk demo report software
Software acquisition with many artefacts, namely Capture RAM Magnet and FTK Imager, while for the fastest time is DumpIt and Capture RAM Magnet for software that takes a long time Magnet RAM Capture the most artefacts, 4 times more than Belkasot RAM Capturer. Results of this study showed that FTK Imager left about 10 times more artefacts than DumpIt and Memoryze. This research presents five acquisition software such as FTK Imager, Belkasoft RAM Capturer, Memoryze, DumpIt, Magnet RAM Capturer.

This study shows the difference in software for the acquisition of the best Random Access Memory (RAM) such as processing time, memory usage, registry key, DLL. Software acquisition will affect the abandoned artefacts and even overwrite important evidence by the software, therefore investigators must use the best software for the acquisition stage. The acquisition phase is very important because it will affect the level of difficulty and ease in investigating cybercrime. The initial stage in digital forensics is an acquisition. The process for uncovering cybercrime is called digital forensics. Cybercrime is a criminal activity with digital media as a tool for committing crimes. Digital Forensics, a term that is increasingly popular with internet needs and increasing cybercrime activity.
