Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

ProDiscover Basic

Name : Shubham S Borhade

College : Ramnarain Ruia College

Class : MSC-CS-P2

Roll No : 160105

About

About

Company : ARC Group

Software Version : 7.0.0.3

Open Source

Download

https://www.arcgroupny.com/products/prodiscover-basic/

1

Company

What is ProDiscover Basic?

What?

ProDiscover Basic is a forensic tool best used for analysis of an entire system. It includes utilities for viewing the registry, event log and internet activity from a captured image. Everything needed for forensic analysis is included in one clean interface, which resembles Windows Explorer.

2

Remote Acquisition with ProDiscover

Remote Acquisition with ProDiscover

With ProDiscover Investigator you can:

  • Preview a suspect’s drive remotely while it’s in use
  • Perform a live acquisition
  • Encrypt the connection
  • Copy the suspect computer’s RAM
  • Use the optional stealth mode

ProDiscover Incident Response additional functions

  • Capture volatile system state information
  • Analyze current running processes
  • Locate unseen files and processes
  • Remotely view and listen to IP ports
  • Run hash comparisons
  • Create a hash inventory of all files remotely

Capturing an Image with ProDiscover Basic

Capturing an Image with ProDiscover Basic

Connecting the suspect’s drive to your workstation

  • Document the chain of evidence for the drive
  • Remove the drive from the suspect’s computer
  • Configure the suspect drive’s jumpers as needed
  • Connect the suspect drive to write-blocker device
  • Create a storage folder on the target drive

Functions

Functions

Image

Conversion

Clustering

Content Search

3

Advantages

Advantages

  • View Deleted files.
  • Search for contents of a disk.
  • Retrieve a file that was accidentally deleted.
  • The product combines features for computer forensics with tools for complete incident response.
  • It features all the basic IT forensic capabilities – full disk imaging, an ability to find hidden data, file metadata information, and hash-keeping, as well as gather data on disks across an entire network.
  • All its features are built into one main interface that is quite task-efficient with all functionality in one place.

4

END

End

NOT YET

5

Learn more about creating dynamic, engaging presentations with Prezi