Computer Forensic Framework-PTK

Computer forensic is a branch of digital forensic science and an act to investigate, analyze, identify and collect evidence or information which is encoded or store.
Computer forensic science is a growing field and different colleges offers variety of degree in this field, however there are different tools and tricks available to do the job done. In backtrack 5 there is a separate section for forensic tools.

Beside tools and tricks there are numerous training available on Internet.
PTK forensics is a computer forensic framework for the command line tools in the SleuthKit plus much more software modules. This makes it usable and easy to investigate a system.
PTK forensics is more than just a new graphic and highly professional interface based on Ajax and other advanced technologies; it offers numerous features such as analysis, search and management of complex digital investigation cases.

Key Features
  • Efficient File Analysis 
  • Easier to use, PTK is based on Ajax
  • PTK is a dynamic web application with centralised -Database. More investigatots can work on the same case at te same time
  • PTK is a forensic analysis framework; in fact, PTK does not address incident response issues
  • Its main aim is to help small groups of investigators execute complex consultancy quickly and efficiently
  • A log of all operations performed by the investigators is kept
  • Case features shared by: Multiple investigators and case lock
It is available on both free and pro version. It has been tested on various Linux distribution includes:
If you are using backtrack 5, than there is no need to download PTK because it is available on backtrack5.

Requiremnt
  • Linux
  • MySQL server 5 or higher 
  • Apache web server 2 or higher
  • PHP 5
  • Web browser (Mozilla, Safari)
  • SleuthKit
Tutorial

 After downloading, move to your apache www directory and extract the package. Open browser and use the URL to start installer page.

http://localhost/ptk/install.php

Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How to Become an Expert in Ethical Hacking

This article is mainly addressing the audience who wants to pursue their career in Cybersecurity as a professional that provides ethical hacking services, whether...

5 Cybersecurity Tips to Keep in Mind When Working From Home

  Due to the ongoing global health crisis, more and more people are being forced to work from their homes. In fact, Forbes estimates that about...

The Complete OSINT Tutorial to Find Personal Information About Anyone

This article mainly focuses on how to discover a person's digital footprint and gather personal data by using open-source intelligence (OSINT). So, in its...

How to find the password of hacked email addresses using OSINT

Open-source intelligence or OSINT is a potent technique, and it can give a lot of valuable information, if implemented correctly with the right strategy...