Update: Evidence Collector has been discontinued. It is no longer maintained but the most recent release can still be downloaded from the developer website linked below.
Have you ever asked yourself what law enforcement agencies would find when they analyze your computer?
How their tools look like and what they are scanning and checking for?
If you answered at least one of the questions with yes you may want to try out Evidence Collector (via Techtrends) which is a forensic computer program. Evidence Collectors main purpose is to help with IT incidents but it can give a solid impression on how such tools work generally.
It's a standalone tool which means it can be run from external devices connected to the computer which is definitely a prerequisite for all forensic tools.
It analyses the user level at startup and displays information like the local IP and hostname. A click on Start Collecting processes 14 sequences, some with subsequences, that collect data and write that data to logfiles in the Evidence Collector directory.
The software did write 25 different log files into the log directory including a list of opened files, installed applications and processes during a trial run.
Evidence Collector concentrates on hardware and software only while law enforcement agencies would definitely scan the computer for files as well, probably using a software like Locate to find information in filenames and contents.
A detailed list of what is analyzed:
Note that you need to process the accumulated data using other tools or manually as it does not offer any options in this regard.
Evidence Collector is a free software currently in beta. There is no information on the homepage about compatibility, it ran fine on my Windows XP Service Pack 3 system.Advertisement
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.