Torrent X-ways Forensics

  1. Torrent X-ways Forensics Training
  2. Torrent X-ways Forensics Download
  3. Torrent X-ways Forensics Training
  4. Torrent X-ways Forensics Jobs

X-Ways Forensics is fully portable and runs off a USB stick on any given Windows system without installation if you want. Downloads and installs within seconds (just a few MB in size, not GB). X-Ways Forensics is based on the WinHex hex and disk editor and part of an efficient workflow model where computer forensic examiners share data. Dec 20, 2020 X Ways WinHex Forensics v20 x64-x86 full Torrent Download. See crack folder for instructions. Aug 02, 2020 X-Ways Forensics is fully portable and runs off a USB stick on any given Windows system without installation if you want. Downloads and installs within seconds (just a few MB in size, not GB). X-Ways Forensics is based on the WinHex hex and disk editor and part of an efficient workflow model where computer forensic examiners share data.

  • X-Ways Forensics is a 4-Day training course focused on the systematic and efficient examination of computer media using the integrated computer forensics software X-Ways Forensics. Students will learn complete andsystematic methods of the computer forensics features in both WinHex and X-Ways Forensics.
  • X-Ways Forensics X-Ways Forensics comprises all the general and specialist features known from WinHex, such as Disk cloning and imaging Ability to read partitioning and file system structures.

A bit about hashing

In digital forensics, hashing is generally used as a method of verifying the integrity of a forensic image or file. The MD5 algorithm has become the accepted standard and used worldwide. Without getting into a long conversational piece about hash collisions and other more reliable and faster methods, MD5 for most purposes is still sufficient.

X-Ways Forensics: Integrated computer forensics environment. Our flagship product, based on WinHex. X-Ways Investigator: Reduced, simplified version of X-Ways Forensics for police investigators.

File hashing has had a long grounding in Law Enforcement cases to identify known good and known bad sets of image file hashes.

Known good hash sets allow an analyst to reduce their data set within their forensic evidence dramatically by removing any files/images related to software and operating systems. NIST has kept the NSRL hash sets updated for a number of years and these among others are widely used to perform this function.

Known bad hashes of images, particularly for indecent image cases are more controversial and have led to many a late-night discussion over how these should be used, managed and categorised.

The major benefit of generating known bad hash set(s) for indecent image cases, is that you are minimising the exposure of the material to the analyst. I believe having a centralised (accurate) hash database to be of utmost importance for the sanity of all those individuals who spend their time categorising images.

X-ways Forensics Software Review

Complete and systematic coverage of all computer forensics features in WinHex and X-Ways Forensics. Hands-on exercises, simulating most aspects of the complete computer forensics process. X-Ways is a type of software application utilized by forensic examiners to perform specific duties with greater speed and efficiency. An X-Ways Investigator has received extensive training on the advanced methods of retrieving, storing and remitting data.

Torrent

The other knock-on effect of using hash sets is that it decreases the analysts time to complete their work, which for overburdened Cybercrime units can only be a blessing.

File hashing can also be used to differentiate files across multiple sources, identifying specific files across evidence sources and assisting with identifying malware (although this is not a full proof approach for malware analysis).

Anyway, on to how we can utilise hashing in X-Ways Forensics.

Hashing in X-Ways Forensics

X Ways Forensics Download Free

I’ll start off by making the assumption that you have a basic understanding of how to use X-Ways.

First, you will need to establish a storage location for your hash database(s). X-Ways comes with the option to configure two different databases, this can be useful if you have hashes using different algorithms such as MD5 or SHA1.

X Ways Forensics Cost

Another consideration when configuring the storage location is speed, configuring your databases on an internal SSD RAID would be optimal if you are going to run this locally.

To configure your hash database locations select the following in X-Ways

Torrent X-ways Forensics

Tools > Hash Database

Torrent x-ways forensics training

Once you have created the databases in your desired locations. You can start to import your hash sets.

You could also create your own hash sets from known good or bad sources, I tend to install fresh offline copies of Windows and create sets from these as I know I can thereafter speak to their integrity. You can also assign a category or hash set name during import, this can be extremely useful when performing differentials.

Please note that if you create any sets from your evidence after your initial hashing you will need to rehash the evidence in order for the new results from these sets to appear.

As you can see from the screenshot below we already have a couple of hash sets added to our database.

Once you have your database configured you can proceed and hash your evidence using the refine volume snapshot feature. This can be done across an entire volume or selected files only.

To perform this function select the following options:

Specialist > Refine Volume Snapshot > Compute Hash + Match against hash database

Once hashing has completed, files which have matched a set can be identified by the light green colour of the file icons.

Torrent x-ways forensics training

Torrent X-ways Forensics Training

You now need to configure the directory browser to see the hashes, sets and categories.

This can be done by selecting:

Torrent X-ways Forensics Download

Options > Directory Browser

You will now need to set the directory column size, once this has been set you can adjust by dragging the columns wider or narrower to suit your needs.

After these views have been enabled through the directory browser we can start filtering within X-Ways. From the hash set column, we can enable or disable the ‘NOT’ function to exclude particular hash sets…

.. and from the category column, we can show or hide irrelevant, relevant, notable or uncategorised hash categories.

Torrent X-ways Forensics Training

This approach combined with the other filtering functions in X-Ways allow the examiner to cut and dice their output quite extensively. Outputting the directory browser view including the hash sets and categories to csv can allow further review in Excel if that tends to be your tool of choice. This can then quite easily be delivered as a product in your casework.

That’s really it for how I tend to uses hashes in X-Ways.

Torrent X-ways Forensics Jobs

Useful links and videos for further reference on hashing: