{"id":175,"date":"2016-04-13T16:20:23","date_gmt":"2016-04-13T16:20:23","guid":{"rendered":"http:\/\/eventlogxp.com\/blog\/?p=175"},"modified":"2016-04-13T16:31:13","modified_gmt":"2016-04-13T16:31:13","slug":"9-vendors-of-digital-forensics-you-may-have-missed-part-2","status":"publish","type":"post","link":"https:\/\/eventlogxp.com\/blog\/9-vendors-of-digital-forensics-you-may-have-missed-part-2\/","title":{"rendered":"9 Vendors of Digital Forensics You May Have Missed. Part 2"},"content":{"rendered":"<p>In the previous <a href=\"http:\/\/eventlogxp.com\/blog\/9-vendors-of-digital-forensics-you-may-have-missed-part-1\/\">post<\/a> we talked about 010 Editor, Event Log Explorer, ElcomSoft and Oxygen forensic solutions.\u00a0In this blog post, we continue the brief review of prominent forensic tools.<\/p>\n<p>Next on our list is Belkasoft.<\/p>\n<h2>Belkasoft Evidence Center 2016<\/h2>\n<p><a href=\"https:\/\/belkasoft.com\/ec\" target=\"_blank\">Belkasoft Evidence Center<\/a> is an all-around forensic solution to pinpoint, extract and review digital evidence stored on desktop computers, laptops and mobile devices.<\/p>\n<p><a href=\"http:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/belcasoft-ec.jpg\" rel=\"attachment wp-att-176\" data-rel=\"lightbox-gallery-rb91QafV\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" class=\"size-medium wp-image-176 alignleft\" src=\"http:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/belcasoft-ec-300x276.jpg\" alt=\"Belkasoft Evidence Center 2016\" width=\"300\" height=\"276\" srcset=\"https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/belcasoft-ec-300x276.jpg 300w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/belcasoft-ec-768x707.jpg 768w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/belcasoft-ec-660x608.jpg 660w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/belcasoft-ec.jpg 960w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>The Belkasoft product supports a wide range of devices. It can parse physical and logical drives, virtual machines, mobile device backups, JTAG, UFED images and chip-off dumps. Belkasoft Evidence Center performs an automated search for evidence and seamlessly identifies 700+ types of digital artifacts. Once the search is over, you can apply various filters for more granular results.<\/p>\n<p>Belkasoft restores damaged or incomplete SQLite databases, and retrieves removed records and cleared history. It can glean crucial information from online chats and social networks, private browsing sessions, cleared browser history, cloud usage history, and more.<\/p>\n<p>SQLite, Registry, and PList viewers enable the user to target specific data types and, ultimately, get more evidence than an automatic search would unveil. Other in-built analysis tools include File System Explorer, Hex Viewer and Type Converter for multi-aspect low-level examination of the content.<\/p>\n<p>Belkasoft Evidence Center is deeply integrated with EnCase Version 7. This enables forensic investigators to obtain a multitude of evidence types supported by Evidence Center through the familiar EnCase interface. The integration is made possible with the free \u201cBelkasoftDataImport\u201d plugin.<\/p>\n<h2>Rusolut\u2019s Visual Nand Reconstructor<\/h2>\n<p>Rusolut is a manufacturer of <a href=\"http:\/\/rusolut.com\/\" target=\"_blank\">Visual Nand Reconstructor<\/a> (VNR), a comprehensive hardware and software data recovery and forensic analysis solution for damaged flash devices. The Reconstructor allows you to retrieve data from a multitude of Flash memory formats. The unique feature of Rusolut\u2019s product is the ability to automate data structure recognition and dramatically speed up the recovery process.<\/p>\n<p><a href=\"http:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/Rusolut.jpg\" rel=\"attachment wp-att-177\" data-rel=\"lightbox-gallery-rb91QafV\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" class=\"size-medium wp-image-177 alignleft\" src=\"http:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/Rusolut-300x245.jpg\" alt=\"Rusolut Visual Nand Reconstructor\" width=\"300\" height=\"245\" srcset=\"https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/Rusolut-300x245.jpg 300w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/Rusolut.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>The embedded base of NAND chips and controller configurations caters to most known chips. The database is subject to regular updates by the Rusolut team and their tech partners. A built-in file system viewer operates with the most commonly used file systems \u2013 FAT and NTFS.<\/p>\n<p>VNR makes reverse engineering easy with special modes of data visualization and multi-tier descriptions of image structure. The special scrambler extraction mode enables successful data decryption even with new devices.<\/p>\n<p>Despite its complex functionality, VNR offers a user-friendly interface with unified controls to help restore and analyze data in a more efficient manner. These include automatic analysis features that facilitate image reconstruction and data recovery. Check out the elaborate <a href=\"http:\/\/rusolut.com\/visual-nand-reconstructor\/documentation\/\" target=\"_blank\">documentation<\/a> to see if your investigation finds the right solution with Rusolut.<\/p>\n<h2>Passware Kit Forensic<\/h2>\n<p><a href=\"https:\/\/www.passware.com\/kit-forensic\/\" target=\"_blank\">Passware<\/a> focuses on password recovery and caters to numerous use cases. Its Kit Forensic is a comprehensive evidence discovery solution that detects and decrypts all password-protected items on a computer.<\/p>\n<p><a href=\"http:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/passware.jpg\" rel=\"attachment wp-att-178\" data-rel=\"lightbox-gallery-rb91QafV\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" class=\"size-medium wp-image-178 alignleft\" src=\"http:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/passware-300x215.jpg\" alt=\"Passware Kit Forensic\" width=\"300\" height=\"215\" srcset=\"https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/passware-300x215.jpg 300w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/passware-768x550.jpg 768w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/passware-660x472.jpg 660w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/passware.jpg 960w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Passware helps to recover or reset passwords for 200+ document types, including Windows, Word, Excel, QuickBooks, Access, Acrobat, etc. Kit Forensic scans for encrypted evidence, and performs live memory analysis and batch processing.The software works smoothly with BitLocker, TrueCrypt, FileVault2 and PGP; it supports GPU, TACC, Distributed Computing, and Rainbow Tables. Kit Forensics integrates easily with Guidance EnCase v7 in case the user needs to match collected data across two systems.<\/p>\n<p>Check out the <a href=\"http:\/\/www.lostpassword.com\/support\/share-your-story.htm\" target=\"_blank\">references<\/a> and learn how Passware tools have resolved real situations; for instance, their operations on cracking otherwise undecipherable passwords in child pornography cases. In those projects, Passware helped investigators from the Swedish and US police forces with equally successful results.<\/p>\n<h2>Passcovery<\/h2>\n<p><a href=\"http:\/\/passcovery.com\/\" target=\"_blank\">Passcovery Co. Ltd.<\/a> offers forensics, corporate and home users performance-driven password recovery.<\/p>\n<p>Their flagship Passcovery <a href=\"http:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/passcovery.jpg\" rel=\"attachment wp-att-179\" data-rel=\"lightbox-gallery-rb91QafV\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" class=\"size-medium wp-image-179 alignleft\" src=\"http:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/passcovery-300x145.jpg\" alt=\"passcovery\" width=\"300\" height=\"145\" srcset=\"https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/passcovery-300x145.jpg 300w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/passcovery-768x370.jpg 768w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/passcovery-660x318.jpg 660w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/passcovery.jpg 966w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Suite successfully operates with Microsoft Office, OpenOffice, PDF, ZIP\/RAR, iOS\/Blackberry back-ups, TrueCrypt volumes and WPA\/WPA2 handshakes. The Suite uses an embedded macro language for sophisticated password generation assignments.\u00a0The key focus of Passcovery is fast retrieval of data. The software boasts great recovery speeds, as well as optimization for AMD\/ATI and NVIDIA video cards. Passcovery detects your CPU type and operates accordingly to deliver optimal performance. Whenever possible, it employs GPU password recovery with AMD and NVIDIA video cards.<\/p>\n<p>Plus, Passcovery can leverage multiple video cards at the same time.<\/p>\n<h2>PasswordLastic<\/h2>\n<p><a href=\"http:\/\/www.passwordlastic.com\/\" target=\"_blank\">PasswordLastic<\/a> is another password retrieval solution focused on Microsoft Windows and Office products.<\/p>\n<p>The tool offers<a href=\"http:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/passwordlastic.jpg\" rel=\"attachment wp-att-180\" data-rel=\"lightbox-gallery-rb91QafV\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" class=\"size-medium wp-image-180 alignleft\" src=\"http:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/passwordlastic-300x259.jpg\" alt=\"Office Password Recovery Lastic \" width=\"300\" height=\"259\" srcset=\"https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/passwordlastic-300x259.jpg 300w, https:\/\/eventlogxp.com\/blog\/wp-content\/uploads\/2016\/04\/passwordlastic.jpg 529w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a> an online password cracking service that helps to crack Word and Excel documents in no time. Office Password Recovery Lastic supports MS Word, Excel, PowerPoint, Outlook and Access files, as well as embedded VBA projects.<\/p>\n<p>Windows Password Recovery Lastic helps to restore access to the operating system. Run the software on an available computer and create a bootable USB stick or CD\/DVD. Boot from it on the required computer and reset the password for any of the previous accounts. Plus, the program saves password hashes for in-depth cracking and recovery of previously removed passwords.<\/p>\n<p>Other standalone versions cater to Outlook, Excel, Word and VBA projects. Easy-to-use and effective tool for average users and forensic experts alike.<\/p>\n<h2>Bottom line<\/h2>\n<p>If you are interested in professional forensic tools, make sure you research the market. Digital forensics is entering a golden era in terms of technology, and the offering is abundant, so define your goals and budget first, then determine which one addresses your particular investigative needs.<\/p>\n<a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-facebook nolightbox\" data-provider=\"facebook\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Facebook\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Feventlogxp.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F175&#038;t=9%20Vendors%20of%20Digital%20Forensics%20You%20May%20Have%20Missed.%20Part%202&#038;s=100&#038;p&#091;url&#093;=https%3A%2F%2Feventlogxp.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F175&#038;p&#091;images&#093;&#091;0&#093;=https%3A%2F%2Feventlogxp.com%2Fblog%2Fwp-content%2Fuploads%2F2016%2F04%2Fforensic-tools-part-2.jpg&#038;p&#091;title&#093;=9%20Vendors%20of%20Digital%20Forensics%20You%20May%20Have%20Missed.%20Part%202\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px;margin-right:5px\"><img alt=\"Facebook\" title=\"Share on Facebook\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none\" src=\"https:\/\/eventlogxp.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/facebook.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-twitter nolightbox\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Feventlogxp.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F175&#038;text=Check%20this%20Event%20Log%20Explorer%20blog%20post\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px;margin-right:5px\"><img alt=\"twitter\" title=\"Share on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none\" src=\"https:\/\/eventlogxp.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-reddit nolightbox\" data-provider=\"reddit\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Reddit\" href=\"https:\/\/www.reddit.com\/submit?url=https%3A%2F%2Feventlogxp.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F175&#038;title=9%20Vendors%20of%20Digital%20Forensics%20You%20May%20Have%20Missed.%20Part%202\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px;margin-right:5px\"><img alt=\"reddit\" title=\"Share on Reddit\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none\" src=\"https:\/\/eventlogxp.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/reddit.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-pinterest nolightbox\" data-provider=\"pinterest\" target=\"_blank\" rel=\"nofollow\" title=\"Pin it with Pinterest\" href=\"https:\/\/pinterest.com\/pin\/create\/button\/?url=https%3A%2F%2Feventlogxp.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F175&#038;media=https%3A%2F%2Feventlogxp.com%2Fblog%2Fwp-content%2Fuploads%2F2016%2F04%2Fforensic-tools-part-2.jpg&#038;description=9%20Vendors%20of%20Digital%20Forensics%20You%20May%20Have%20Missed.%20Part%202\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px;margin-right:5px\"><img alt=\"pinterest\" title=\"Pin it with Pinterest\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none\" src=\"https:\/\/eventlogxp.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/pinterest.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-linkedin nolightbox\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Linkedin\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https%3A%2F%2Feventlogxp.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F175&#038;title=9%20Vendors%20of%20Digital%20Forensics%20You%20May%20Have%20Missed.%20Part%202\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px;margin-right:5px\"><img alt=\"linkedin\" title=\"Share on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none\" src=\"https:\/\/eventlogxp.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/linkedin.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-mail nolightbox\" data-provider=\"mail\" rel=\"nofollow\" title=\"Share by email\" href=\"mailto:?subject=9%20Vendors%20of%20Digital%20Forensics%20You%20May%20Have%20Missed.%20Part%202&#038;body=Check%20this%20Event%20Log%20Explorer%20blog%20post:%20https%3A%2F%2Feventlogxp.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F175\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px\"><img alt=\"mail\" title=\"Share by email\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none\" src=\"https:\/\/eventlogxp.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/mail.png\" \/><\/a>","protected":false},"excerpt":{"rendered":"<p>In the previous post we talked about 010 Editor, Event Log Explorer, ElcomSoft and Oxygen forensic solutions.\u00a0In this blog post, we continue the brief review of prominent forensic tools. Next on our list is Belkasoft. Belkasoft Evidence Center 2016 Belkasoft Evidence Center is an all-around forensic solution to pinpoint, extract and review digital evidence stored on desktop computers, laptops and mobile devices. The Belkasoft product\u2026 <span class=\"read-more\"><a href=\"https:\/\/eventlogxp.com\/blog\/9-vendors-of-digital-forensics-you-may-have-missed-part-2\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":4,"featured_media":182,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[40],"tags":[51],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/posts\/175"}],"collection":[{"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/comments?post=175"}],"version-history":[{"count":4,"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/posts\/175\/revisions"}],"predecessor-version":[{"id":185,"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/posts\/175\/revisions\/185"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/media\/182"}],"wp:attachment":[{"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/media?parent=175"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/categories?post=175"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eventlogxp.com\/blog\/wp-json\/wp\/v2\/tags?post=175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}