Analyze malwares which arrives over the Email, USB media. By examining the file content and meta data, using Sandboxing and online file reverse engineering techniques.
Permanently remove important and critical files from your Computer storage, USB and SD card in such a way that the those files and data should not be recoverable by using any data recoverysoftware.
This project is divided into two phases Static and Dynamic, here we will be using malware analysis with advanced static analysis tools PEstudio, EXEinfope, PEid and CFF Explorer are capable of providing more complete information about characteristics of malware, such as the information of malware to infect another programs, as well as modifying the registry and create new files and folders. Whereas on basic methods of malware dynamic analysis can discover DLL of malware, the process of malware inside the system, as well as the network connection performed by malware against the server.
Using Automated tool and backing up the last good known configuration of the system. The solution potentially help an OS environment to recover if it is being hit by a Ransomware attack. Here we have proposed the solution called Deep Freeze.
Memory forensics is forensic analysis of a computer's memory dump. Its primary application is investigation of advanced computer attacks which are stealthy enough to avoid leaving data on the computer's hard drive. Consequently, the memory must be analyzed for forensic information. We follow following steps which include Acquisition of memory, Analyzing the acquired data, Recovering the evidence for which we use tools like Magnet RAM Capture v1.2, Dump IT, Redline v2.0, Magnet AXIOM v4.10, Hexeditor.
Live Forensic includes assessing a system without performing imaging on it, whenever the live forensic activity is conducted it doesn't incllude recovering of Deleted files, Deleted history, Uninstalled softwares, Removed Registry Keys. While conducting Live forensic, we will be utilizing couple of tools including Process Hacker, SysInternal Tools, Autopsy.
Compromise assessments are high-level investigations where skilled teams utilize advanced tools to dig more deeply into their environment to identify ongoing or past attacker activity in addition to identifying existing weaknesses in controls and practices. The tools which may conduct compromise assessment of an operating system includes Crowdinspect tool, Network Miner, Wireshark, Netstat timestamp for data compromise assessment and after performing actions we are able to gather information and vulnerabilities
To analyze the Contacts , Call logs, Messages, Social Media data (WhatsApp, Facebook, Telegram, etc.), Bluetooth devices, Wi-Fi connections, system information, Web information and there are also some restrictions that to gather complete mobile data, device must be rooted and without rooting only limited data such as contacts, call logs, text-messages, camera photos and videos can be recovered
The objective is to acquire an image of a system remotely via an agent. Two (02) Windows 10 machine deployed. One Windows 10 machine act as a management server (Belka Soft Evidence Center 9.9) and Second windows 10 machines used for imaging.
Forensic Examiner will be provided an .E01 image of an abandon tablet, from that tablet he will have to extract information which will be around 40 questions related to OS, Registry, Network, and Deleted Files.
In this project your task is to analyze different voices and compare them, all these voices will be compared using Pitch Spectrum analysis technique.
In this project investigator will need to clone/snapshot a Windows machines. Investigator would require to perform Physical to Virtual Cloning of a system, the tool currently has a capability to clone
We will use Maltego which will search and capture as much information of user by crawling through different websites and social media networks and it will be based on (email address/username/phone number) etc. There are other tools which also gathers threat intelligence like (OSINT, SHERLOCK) etc.
In this project, investigator will need to assess Static and Dynamic malware analysis using
In this project we will perform an experimental forensic study on multiple applications for the Android mobile phone operating system. We investigated Android applications through network traffic analysis and server/device storage analysis. This was performed in order to examine the digital evidence that could be of value to forensic examiners and also to evaluate application security in sending/receiving data and application privacy in storing data .
This project is specifically designed to Windows based operating system, This project requires to identify how many commands a user ran in windows machine. Task is to identify which commands were executed earlier in the machine.
In this project we have used HACK-RF ONE which captures 10 MHZ to 5 Ghz of frequency signals, the objective is to capture the unencrypted frequencies and identify the vulnerability in the communication channel.
In this project we have used OPEN EDR project i.e. an open source project of EDR, it helps investigator to get the complete Triage of an incident, analyze it and also assess for damages encountered by other machine over the network. This project helps to display a comprehensive dashboard of all the threats related to Ransomware, Viruses, Spywares, Lateral Movement, Priviledge Esclation, Enumeration etc.
Get your Frequent Queries Answered Here.
To Get candidates aware about Digital Forensic and its ongoing achievements, the field has a very huge diversification portfolio
These Projects not only allow cyber security organisations to develop technologies that can prevent hackers from accessing devices, websites and networks but can lead businesses in the direction of understanding exactly what data is compromised. Digital forensics experts are able to explore networks and probe security event logs, network traffic, and access credentials to offer closure on a cyber attack.
No, Not all the projects hosted in Digital Forensic Projects section are open sourced, most of them are self prepared and most of them requires programming and script writing which we did by own own.
For Every project, I found the best workaround and the ease solution which could help investigator to solve the puzzle as quickly as possible.
Yes, invividuals can subscribe over the email to get theirselves registered.
We Appreciate comments which we receive in the form of improvement and modifications. we encourage inviduals to provide their input against any of the project by Refering Project Name, Suggested Area of Improvement to info@ubaidjafri.com
We have scrutinizedall the mentioned projects and also assess their communication, project and tools used in the mentioned projects are not vulrable to breach user privacy as of July 2022.
Please Note: User / Individual also need to make sure to double check the statement by their own.
The Projects got endorsement from Pakistan, UAE, US, Netherlands, Australia, Moscow, Sri Lanka, Bahrain, Oman, Egypt.
Learn moreTotal number of uploaded projects of Digital Forensic for the year 2022.
Total Number of Upcoming Digital Forensic Projects.
Total number of Paid Digital Forensic Projects which requires discussion for your University Thesis, Corporate Submission, PHD, Research and Development