UJ...

Digital Forensic Project List

Project Specially designed for corporate / students

dns redundant

MALWARE ANALYSIS & THREAT IDENTIFICATION

Analyze malwares which arrives over the Email, USB media. By examining the file content and meta data, using Sandboxing and online file reverse engineering techniques.

Learn more

FILE SHREDDING - ANTI FORENSIC SOLUTION

Permanently remove important and critical files from your Computer storage, USB and SD card in such a way that the those files and data should not be recoverable by using any data recoverysoftware.

Learn more

static and dynamic malware analysis

STATIC & DYNAMIC MALWARE ANALYSIS

This project is divided into two phases Static and Dynamic, here we will be using malware analysis with advanced static analysis tools PEstudio, EXEinfope, PEid and CFF Explorer are capable of providing more complete information about characteristics of malware, such as the information of malware to infect another programs, as well as modifying the registry and create new files and folders. Whereas on basic methods of malware dynamic analysis can discover DLL of malware, the process of malware inside the system, as well as the network connection performed by malware against the server.

Learn more

SECURING SYSTEM FROM RANSOMWARE ATTACK

Using Automated tool and backing up the last good known configuration of the system. The solution potentially help an OS environment to recover if it is being hit by a Ransomware attack. Here we have proposed the solution called Deep Freeze.

Learn more

memory forensic

MEMORY FORENSIC & ANALYSIS- LIVE ACQUISITION OF MEMORY

Memory forensics is forensic analysis of a computer's memory dump. Its primary application is investigation of advanced computer attacks which are stealthy enough to avoid leaving data on the computer's hard drive. Consequently, the memory must be analyzed for forensic information. We follow following steps which include Acquisition of memory, Analyzing the acquired data, Recovering the evidence for which we use tools like Magnet RAM Capture v1.2, Dump IT, Redline v2.0, Magnet AXIOM v4.10, Hexeditor.

Learn more

LIVE FORENSIC OF SYSTEM (Laptop, Desktop)

Live Forensic includes assessing a system without performing imaging on it, whenever the live forensic activity is conducted it doesn't incllude recovering of Deleted files, Deleted history, Uninstalled softwares, Removed Registry Keys. While conducting Live forensic, we will be utilizing couple of tools including Process Hacker, SysInternal Tools, Autopsy.

Learn more

data compromise assessment

DATA COMPROMISE ASSESSMENT

Compromise assessments are high-level investigations where skilled teams utilize advanced tools to dig more deeply into their environment to identify ongoing or past attacker activity in addition to identifying existing weaknesses in controls and practices. The tools which may conduct compromise assessment of an operating system includes Crowdinspect tool, Network Miner, Wireshark, Netstat timestamp for data compromise assessment and after performing actions we are able to gather information and vulnerabilities

Learn more

MOBILE APPLICATION FORENSIC

To analyze the Contacts , Call logs, Messages, Social Media data (WhatsApp, Facebook, Telegram, etc.), Bluetooth devices, Wi-Fi connections, system information, Web information and there are also some restrictions that to gather complete mobile data, device must be rooted and without rooting only limited data such as contacts, call logs, text-messages, camera photos and videos can be recovered

Learn more

data compromise assessment

REMOTE IMAGING OF A SYSTEM

The objective is to acquire an image of a system remotely via an agent. Two (02) Windows 10 machine deployed. One Windows 10 machine act as a management server (Belka Soft Evidence Center 9.9) and Second windows 10 machines used for imaging.

Learn more

INVESTIGATING OF AN ABANDON TABLET

Forensic Examiner will be provided an .E01 image of an abandon tablet, from that tablet he will have to extract information which will be around 40 questions related to OS, Registry, Network, and Deleted Files.

Learn more

data compromise assessment

VOICE PITCH ANALYZER

In this project your task is to analyze different voices and compare them, all these voices will be compared using Pitch Spectrum analysis technique.

Learn more

REMOTE CLONING OF A SYSTEM

In this project investigator will need to clone/snapshot a Windows machines. Investigator would require to perform Physical to Virtual Cloning of a system, the tool currently has a capability to clone

  • Remote System (Linux, Windows)
  • Local System (Windows, Linux)
  • over the network.

    Learn more

    data compromise assessment

    USER THREAT INTELLIGENCE GATHERING

    We will use Maltego which will search and capture as much information of user by crawling through different websites and social media networks and it will be based on (email address/username/phone number) etc. There are other tools which also gathers threat intelligence like (OSINT, SHERLOCK) etc.

    Learn more

    ANDROID MALWARE ANALYSIS

    In this project, investigator will need to assess Static and Dynamic malware analysis using

  • APK reversing
  • Searching for Malicious Code using Dex2Jar
  • JD-GUI
  • Learn more

    data compromise assessment

    NETWORK FORENSIC OF A CELL PHONE

    In this project we will perform an experimental forensic study on multiple applications for the Android mobile phone operating system. We investigated Android applications through network traffic analysis and server/device storage analysis. This was performed in order to examine the digital evidence that could be of value to forensic examiners and also to evaluate application security in sending/receiving data and application privacy in storing data .

    Learn more

    READ COMMAND HISTORY

    This project is specifically designed to Windows based operating system, This project requires to identify how many commands a user ran in windows machine. Task is to identify which commands were executed earlier in the machine.

    Learn more

    data compromise assessment

    PACKET CAPTURING USING SDR (SOFTWARE DEFINED RADIO)

    In this project we have used HACK-RF ONE which captures 10 MHZ to 5 Ghz of frequency signals, the objective is to capture the unencrypted frequencies and identify the vulnerability in the communication channel.

    Learn more

    OPEN EDR DEPLOYMENT AND CUSTOMIZATION USING DIGITAL FORENSIC INVESTIGATIVE PROCEDURE

    In this project we have used OPEN EDR project i.e. an open source project of EDR, it helps investigator to get the complete Triage of an incident, analyze it and also assess for damages encountered by other machine over the network. This project helps to display a comprehensive dashboard of all the threats related to Ransomware, Viruses, Spywares, Lateral Movement, Priviledge Esclation, Enumeration etc.

    Learn more

    Frequently Asked Questions Hosting

    Get your Frequent Queries Answered Here.

    What is the purpose of these publications?
    • To Get candidates aware about Digital Forensic and its ongoing achievements, the field has a very huge diversification portfolio

      These Projects not only allow cyber security organisations to develop technologies that can prevent hackers from accessing devices, websites and networks but can lead businesses in the direction of understanding exactly what data is compromised. Digital forensics experts are able to explore networks and probe security event logs, network traffic, and access credentials to offer closure on a cyber attack.

    Does All the mentioned projects are open sourced?
    • No, Not all the projects hosted in Digital Forensic Projects section are open sourced, most of them are self prepared and most of them requires programming and script writing which we did by own own.

      For Every project, I found the best workaround and the ease solution which could help investigator to solve the puzzle as quickly as possible.

    Can We Receive Update against the Mentioned projects or Future Projects?
    • Yes, invividuals can subscribe over the email to get theirselves registered.

      We Appreciate comments which we receive in the form of improvement and modifications. we encourage inviduals to provide their input against any of the project by Refering Project Name, Suggested Area of Improvement to info@ubaidjafri.com

    Is there any privacy issue for the user?
    • We have scrutinizedall the mentioned projects and also assess their communication, project and tools used in the mentioned projects are not vulrable to breach user privacy as of July 2022.

      Please Note: User / Individual also need to make sure to double check the statement by their own.

    Endorsements

    The Projects got endorsement from Pakistan, UAE, US, Netherlands, Australia, Moscow, Sri Lanka, Bahrain, Oman, Egypt.

    Learn more

    Total number of uploaded projects of Digital Forensic for the year 2022.

    Total Number of Upcoming Digital Forensic Projects.

    Total number of Paid Digital Forensic Projects which requires discussion for your University Thesis, Corporate Submission, PHD, Research and Development