Forensic Sciences


A Study of Digital Forensic Tools, Hacktivism Phenom and Challenges

Article Number: CAK338317 Volume 04 | Issue 02 | October - 2021 ISSN: 2581-4273
18th Aug, 2021
22nd Sep, 2021
30th Sep, 2021
14th Oct, 2021

Authors

N. Ashwini, Dr. Syed Umarhathab

Abstract

Hacktivism is the greatest test being looked at by the Cyberworld. Numerous advanced digital forensic tools are being created to manage this test however at a similar pace programmers are building up the counter procedures. This paper incorporates the advanced crime scene investigation fundamentals alongside the ongoing patterns of hacktivism in long-range informal communication locales, distributed computing, sites and phishing. The different devices of legal sciences with the stage bolstered, the ongoing variants and permitting subtleties are talked about. The paper stretches out the present difficulties being faced by digital forensics. Keywords: Hacktivism; Digital forensics tools, Anti digital forensics (ADF)

Introduction

Perhaps the greatest test in late time is the examination of PC wrongdoing. With the advancement of computerized crime scene investigation new development apparatuses are appearing yet the programmers are likewise getting similarly outfitted with hostile to criminology devices to delete those computerized confirmations or to deliver delay in the advanced proof age process. Right now audit of business related to computerized legal sciences and hacktivism is talked about in segment II. The ongoing patterns of hacktivism are examined in segment III. Advanced crime scene investigation and its groupings are examined in area IV. An all-out clarification of advanced crime scene investigation instruments with stage upheld, forming and authorizing subtleties is clarified in area V. The different difficulties of Digital criminology are examined in area VI. The work is finished up in segment VII.

Audit of work related to Digital Forensics & Hacktivism trends

Paper (Hunt and Zeadally, 2012) talks about system crime scene investigation, its connection to computerized legal sciences and system security alongside the conversation of the use of system legal sciences to key security territories, for example, malware, IP traceback, organize assault legal sciences and so forth. It additionally examines the wide assortment of system crime scene investigation devices and strategies.

Paper (Mahmood and Desmedt, 2012) depicts a technique to recoup advanced proof from a framework's RAM as data about the latest perusing session of the client. Four distinct applications are picked for a try reason.

In paper (Nero et al., 2011) multi-day security escape clause in Facebook (Social Networking Website) called deactivated companion assault is identified. The idea of this assault is fundamentally the same as shrouding in Star Trek. In the event that the aggressor is a companion of the person in question, he has boundless access to the unfortunate casualties’ individual data in a shrouded manner.

Paper (Hibshi et al., 2011) examines Email phishing alongside the useful countermeasures it requires, as does any wrongdoing that outcomes in misfortunes of a large number of dollars consistently. Paper (Pilli et al., 2010) overviews the convenience part of criminology apparatuses. Criticism is gotten from experts utilizing advanced crime scene investigation instruments. Based on results some ease of use issues are discovered which are significant while planning and actualizing advanced legal sciences apparatuses.

References

Casey, Eoghan. Digital Evidence and Computer Crime. 2nd ed., Academic Press, 2004.

Garfinkel, Simson L. “Digital Forensics Research: The next 10 Years.” Digital Investigation, vol. 7, 2010, pp. S64–73. Crossref, doi:10.1016/j.diin.2010.05.009.

Guo, Yinghua, et al. “Validation and Verification of Computer Forensic Software Tools—Searching Function.” Digital Investigation, vol. 6, 2009, pp. S12–22. Crossref, doi:10.1016/j.diin.2009.06.015.

Hibshi, Hanan, et al. “Usability of Forensics Tools: A User Study.” 2011 Sixth International Conference on IT Security Incident Management and IT Forensics, 2011. Crossref, doi:10.1109/imf.2011.19.

Hunt, Ray, and Sherali Zeadally. “Network Forensics: An Analysis of Techniques, Tools, and Trends.” Computer, vol. 45, no. 12, 2012, pp. 36–43. Crossref, doi:10.1109/mc.2012.252.

Mahmood, Shah, and Yvo Desmedt. “Your Facebook Deactivated Friend or a Cloaked Spy.” 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, 2012. Crossref, doi:10.1109/percomw.2012.6197512.

Nero, Philip J., et al. “Phishing: Crime That Pays.” 2011 ECrime Researchers Summit, 2011. Crossref, doi:10.1109/ecrime.2011.6151979.

Pilli, Emmanuel S., et al. “Network Forensic Frameworks: Survey and Research Challenges.” Digital Investigation, vol. 7, no. 1–2, 2010, pp. 14–27. Crossref, doi:10.1016/j.diin.2010.02.003.

Shujun Li, and Roland Schmitz. “A Novel Anti-Phishing Framework Based on Honeypots.” 2009 ECrime Researchers Summit, 2009. Crossref, doi:10.1109/ecrime.2009.5342609.

How to cite this article?

APA StyleAshwini, N., & Umarhathab, D. S. (2021). A Study of Digital Forensic Tools, Hacktivism Phenom and Challenges. Academic Journal of Forensic Science, 04(02), 22–32. 
Chicago Style
MLA Style
DOI
URL

Create Your Password

We've sent a link to create password on your registered email, Click the link in email to start using Xournal.

Sign In

Forgot Password?
Don't have an account? Create Account

Create Account

Already have an account? Sign In

Forgot Password

Do you want to try again? Sign In

Publication Tracking