Computer Forensic Framework-PTK

Computer forensic is a branch of digital forensic science and an act to investigate, analyze, identify and collect evidence or information which is encoded or store.
Computer forensic science is a growing field and different colleges offers variety of degree in this field, however there are different tools and tricks available to do the job done. In backtrack 5 there is a separate section for forensic tools.

Beside tools and tricks there are numerous training available on Internet.
PTK forensics is a computer forensic framework for the command line tools in the SleuthKit plus much more software modules. This makes it usable and easy to investigate a system.
PTK forensics is more than just a new graphic and highly professional interface based on Ajax and other advanced technologies; it offers numerous features such as analysis, search and management of complex digital investigation cases.

Key Features
  • Efficient File Analysis 
  • Easier to use, PTK is based on Ajax
  • PTK is a dynamic web application with centralised -Database. More investigatots can work on the same case at te same time
  • PTK is a forensic analysis framework; in fact, PTK does not address incident response issues
  • Its main aim is to help small groups of investigators execute complex consultancy quickly and efficiently
  • A log of all operations performed by the investigators is kept
  • Case features shared by: Multiple investigators and case lock
It is available on both free and pro version. It has been tested on various Linux distribution includes:
If you are using backtrack 5, than there is no need to download PTK because it is available on backtrack5.

Requiremnt
  • Linux
  • MySQL server 5 or higher 
  • Apache web server 2 or higher
  • PHP 5
  • Web browser (Mozilla, Safari)
  • SleuthKit
Tutorial

 After downloading, move to your apache www directory and extract the package. Open browser and use the URL to start installer page.

http://localhost/ptk/install.php

Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Blind SQL Injection Tutorial to Hack a Website

In the previous article, we have the basics of SQL Injection; what SQLi is and what are the types of SQL injection. And, In...

What is SQL Injection? Tutorial: Type and Example

What is SQL injection, and what are the types of SQL injection? These are the common questions, and we will seek the answer to...

Are Cisco 300-410 Exam and Its Related Certification Your Pathway to Career Success? Find Out about This

Introduction Career success can mean different things to different people. For some, it could mean having a prestigious title and for others, it could be...

How to Hack Windows 10 Password Using FakeLogonScreen in Kali Linux

This article demonstrates an in-depth guide on how to hack Windows 10 Passwords using FakeLogonScreen. Hacking Windows 10 password is an exciting topic and...

LOOKING FOR HACKING RECIPES FORM THE PRO?

Then sign up for FREE to the ehacking’s exclusive group. You will get the exclusive tips/tricks, tutorials, webinars & courses that I ONLY share with my fellow on this exclusive newsletter.