Maltego is different in that it works within a digital forensics sphere. Maltego is a platform that was designed to deliver an overall cyber threat picture to the enterprise or local environment in which an organization operates. \

One of the awesome things about Maltego which likely makes it so popular (and included in the Kali Linux Top Ten) is its’s unique perspective in offering both network and resource based entities is the aggregation of information sourced throughout the web – whether it’s the current configuration of a vulnerable router within a network or the current whereabouts of your staff members on their international visits, Maltego can locate, aggregate and visualize this data!

7. HELIX3 PRO – Forensics Tools

What is Helix3 Pro?
Just like the previous tools, Helix3 Pro is a unique tool customized for computer forensics. It has been created very carefully to avoid touching the host computer in any way and it is forensically sound. Good thing is that Helix will not automatically mount swap space nor auto mount any devices attached.

Does Helix3 Pro Work on all Operating Systems?
This tool works natively on Linux operating systems, MAC OS X and Windows.

What are the Typical Uses for Helix3 Pro?
Helix3 Pro focuses on forensics tools and incident response techniques. It is designed to be used by individuals who have an understanding of these techniques. With this tool, users can create forensic images of all intenal devices, search for specific file types like document files, graphic files etc.

8. ENCASE – Forensics Tools

What is EnCase?
Commonly used by law enforcement, EnCase is forensics software and its use has made it one of the de-facto standard in forensics.

Does EnCase Work on all Operating Systems?
EnCase is a Windows-only tool.

What are the Typical Uses for EnCase?
EnCase is primarily used in collecting information from a computer system by employing checksums to aid in detect tampering to evidences. It can collect information from different types of devices and produce concise forensic reports.

Ethical Hacking Tools 6-8

You May Also Like

Leave a Reply

Your email address will not be published. Required fields are marked *