fbpx

Computer Forensic Framework-PTK

Computer forensic is a branch of digital forensic science and an act to investigate, analyze, identify and collect evidence or information which is encoded or store.
Computer forensic science is a growing field and different colleges offers variety of degree in this field, however there are different tools and tricks available to do the job done. In backtrack 5 there is a separate section for forensic tools.

Beside tools and tricks there are numerous training available on Internet.
PTK forensics is a computer forensic framework for the command line tools in the SleuthKit plus much more software modules. This makes it usable and easy to investigate a system.
PTK forensics is more than just a new graphic and highly professional interface based on Ajax and other advanced technologies; it offers numerous features such as analysis, search and management of complex digital investigation cases.

Key Features
  • Efficient File Analysis 
  • Easier to use, PTK is based on Ajax
  • PTK is a dynamic web application with centralised -Database. More investigatots can work on the same case at te same time
  • PTK is a forensic analysis framework; in fact, PTK does not address incident response issues
  • Its main aim is to help small groups of investigators execute complex consultancy quickly and efficiently
  • A log of all operations performed by the investigators is kept
  • Case features shared by: Multiple investigators and case lock
It is available on both free and pro version. It has been tested on various Linux distribution includes:
If you are using backtrack 5, than there is no need to download PTK because it is available on backtrack5.

Requiremnt
  • Linux
  • MySQL server 5 or higher 
  • Apache web server 2 or higher
  • PHP 5
  • Web browser (Mozilla, Safari)
  • SleuthKit
Tutorial

 After downloading, move to your apache www directory and extract the package. Open browser and use the URL to start installer page.

http://localhost/ptk/install.php

Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...