Tuesday, February 24, 2026

Digital Forensics in Kali Linux – Tools and Investigation Overview

 

Digital Forensics in Kali Linux – Tools and Investigation Overview

What is Digital Forensics?

Digital Forensics is the process of identifying, collecting, preserving, analyzing, and presenting digital evidence from computers, storage devices, and networks.

It is used in:

  • Cybercrime investigations

  • Incident response

  • Data recovery

  • Malware analysis

  • Legal proceedings

In Kali Linux, forensic tools are available under:

Applications → Forensics

These tools help forensic specialists recover and analyze data in a legally sound manner.


Goals of Digital Forensics

  1. Preserve original evidence

  2. Maintain chain of custody

  3. Recover deleted data

  4. Analyze memory and disk artifacts

  5. Generate legally admissible reports


Common Digital Forensics Tools in Kali Linux


1️⃣ Autopsy

About

Autopsy is one of the most widely used digital forensic tools.

It is a graphical interface for The Sleuth Kit and is used by:

  • Law enforcement agencies

  • Judicial investigators

  • Incident response teams


Key Features:

  • Disk image analysis

  • Deleted file recovery

  • Timeline analysis

  • Keyword searching

  • Email extraction

  • Web history recovery


Autopsy Interface

Image

Image

Image

Image


How It Works (Basic Steps)

  1. Create New Case

  2. Add Data Source (Disk Image / Drive)

  3. Select analysis modules

  4. Review extracted artifacts

  5. Generate report

Autopsy is often the first tool used in disk-based forensic investigations.


2️⃣ Binwalk

About

Binwalk is used for analyzing firmware images.

It helps in:

  • Extracting embedded files

  • Reverse engineering firmware

  • Identifying hidden data


Example Usage:

binwalk firmware.bin

To extract contents:

binwalk -e firmware.bin

Commonly used in IoT device investigations.


3️⃣ Galleta

About

Galleta is used to analyze Internet Explorer cookie files.

It helps investigators:

  • Identify browsing behavior

  • Extract timestamps

  • Recover user activity

Used in browser-based forensic investigations.


4️⃣ Hashdeep

About

Hashdeep is used for computing and verifying file hashes.

Hashing ensures:

  • Evidence integrity

  • No tampering

  • Authenticity verification


Example Usage:

hashdeep -r /evidence_folder > hashes.txt

It generates hash values for files recursively.

This is critical in maintaining legal credibility of evidence.


5️⃣ Volafox

About

Volafox is used for analyzing memory dumps from macOS systems.

It helps in:

  • Extracting running processes

  • Identifying malware

  • Analyzing memory artifacts

Primarily used for macOS forensic investigations.


6️⃣ Volatility

About

Volatility is one of the most powerful memory forensic tools.

It analyzes RAM dumps to detect:

  • Running processes

  • Hidden malware

  • Network connections

  • Injected code

  • Rootkits


Example Usage:

volatility -f memory.dmp imageinfo

List processes:

volatility -f memory.dmp --profile=Win7SP1x64 pslist

Memory forensics is crucial because attackers often leave traces in RAM.


Types of Digital Evidence

Digital forensic tools can analyze:

  • Hard disks

  • USB drives

  • SSDs

  • Mobile devices

  • Memory dumps

  • Log files

  • Email archives


Digital Forensics Investigation Workflow

  1. Identify and secure device

  2. Create forensic image (bit-by-bit copy)

  3. Calculate hash value

  4. Analyze using forensic tools

  5. Recover deleted artifacts

  6. Document findings

  7. Prepare forensic report


Real-World Example

In a cybercrime case:

  • A suspect's laptop is seized

  • Forensic image is created

  • Hash value is calculated

  • Autopsy analyzes disk image

  • Volatility analyzes RAM dump

  • Deleted emails and browser history are recovered

  • Evidence is presented in court


Comparison of Forensic Tools

ToolPurposeType
AutopsyDisk analysisGUI
BinwalkFirmware analysisCLI
GalletaCookie analysisCLI
HashdeepHash verificationCLI
VolafoxmacOS memory analysisCLI
VolatilityRAM forensic analysisCLI

Importance of Forensics in Cybersecurity

Digital forensics helps in:

  • Incident response

  • Insider threat investigation

  • Malware analysis

  • Legal compliance

  • Cybercrime prosecution

It bridges cybersecurity and law enforcement.


Legal & Ethical Considerations

Forensic analysis must:

  • Follow proper legal procedures

  • Maintain chain of custody

  • Preserve evidence integrity

  • Avoid evidence contamination

Improper handling can invalidate evidence in court.

Wireless Attacks in Kali Linux – Tools and Security Testing Guide

Wireless Attacks in Kali Linux – Tools and Security Testing Guide

What Are Wireless Attacks?

Wireless attacks target Wi-Fi networks, access points, and wireless clients to identify security weaknesses.

These attacks may include:

  • Wi-Fi password cracking

  • Rogue / Fake access points

  • Man-in-the-Middle (MITM) attacks

  • Packet sniffing

  • Wireless information gathering

In Kali Linux, wireless testing tools are available for security professionals under:

Applications → Wireless Attacks

⚠ These tools must only be used in authorized lab environments.


Common Wireless Attack Techniques

1️⃣ WEP/WPA/WPA2 Cracking
2️⃣ Evil Twin Attack (Fake Access Point)
3️⃣ Deauthentication Attack
4️⃣ Packet Sniffing
5️⃣ Man-in-the-Middle (MITM)
6️⃣ Wireless Reconnaissance


Lab Requirement for Wireless Testing

To perform wireless security testing:

  • Kali Linux machine

  • Wireless adapter supporting Monitor Mode

  • Test router (your own)

  • Isolated lab environment

Check wireless interface:

iwconfig

Enable monitor mode:

airmon-ng start wlan0

1️⃣ Aircrack-ng

About

Aircrack-ng is the most popular wireless security auditing tool suite.

It includes tools for:

  • Packet capture

  • Deauthentication

  • WPA/WPA2 handshake capture

  • Password cracking


Aircrack-ng Workflow

Step 1: Enable Monitor Mode

airmon-ng start wlan0

Step 2: Scan Networks

airodump-ng wlan0mon

Step 3: Capture Handshake

airodump-ng -c 6 --bssid <AP_MAC> -w capture wlan0mon

Step 4: Deauthentication Attack

aireplay-ng --deauth 10 -a <AP_MAC> wlan0mon

Step 5: Crack Password

aircrack-ng capture.cap -w rockyou.txt

Aircrack-ng Example Output

Image

Image

Image

Image


2️⃣ Fern WiFi Cracker

About

Fern Wifi Cracker is a GUI-based wireless cracking tool.

Features:

  • WEP/WPA cracking

  • Automated attack

  • Session hijacking

  • Brute-force & dictionary attacks

Launch:

fern-wifi-cracker

It is beginner-friendly compared to command-line tools.


3️⃣ Kismet

About

Kismet is a wireless network detector and packet sniffer.

It helps in:

  • Wireless reconnaissance

  • Detecting hidden networks

  • Identifying rogue access points

  • Monitoring wireless traffic


Kismet Interface

Image

Image

Image

Image


Launch:

kismet

Kismet is mainly used for passive information gathering.


4️⃣ Ghost Phisher

About

Ghost Phisher is used to create fake access points (Evil Twin attacks).

Capabilities:

  • Fake AP creation

  • DNS spoofing

  • Credential harvesting

  • MITM attacks

Scenario Example:

Victim connects to a fake Wi-Fi hotspot →
Attacker intercepts traffic →
Login credentials may be captured.


5️⃣ Wifite

About

Wifite is an automated wireless auditing tool.

It combines:

  • Aircrack-ng

  • Reaver

  • Handshake capture

  • WPA cracking

Launch:

wifite

Wifite automates:

  • Scanning

  • Handshake capture

  • Deauthentication

  • Password cracking

It is useful for quick lab testing.


Wireless Attack Scenario Example

Evil Twin Attack

  1. Attacker creates fake Wi-Fi named “Free_Public_Wifi”

  2. Victim connects to fake AP

  3. Attacker intercepts traffic

  4. Login credentials may be captured

This is commonly used in:

  • Airport Wi-Fi attacks

  • Coffee shop hotspots

  • Public Wi-Fi environments


Wireless Security Testing Workflow

  1. Enable monitor mode

  2. Scan wireless networks

  3. Identify encryption type

  4. Capture handshake

  5. Attempt password audit

  6. Report vulnerabilities

  7. Recommend security improvements


How to Protect Against Wireless Attacks

To secure Wi-Fi networks:

  • Use WPA3 encryption

  • Disable WPS

  • Use strong passwords

  • Hide management interfaces

  • Enable MAC filtering

  • Monitor rogue access points

  • Avoid connecting to public Wi-Fi


Comparison of Tools

ToolTypePurpose
Aircrack-ngCLIWireless cracking
Fern WiFi CrackerGUIBeginner-friendly cracking
KismetPassive ScannerWireless reconnaissance
Ghost PhisherMITM ToolFake access point
WifiteAutomatedQuick wireless audit

Legal Warning

Wireless attacks must only be performed:

  • In your own lab

  • On your own router

  • With written authorization

Unauthorized Wi-Fi attacks are illegal under cyber laws.