CYBER FORENSICS

CSI Linux was developed by Computer Forensics, Incident Response, and Competitive Intelligence professionals to meet the current needs of the government agencies and the industry.

CSI Linux is a multi-purpose, all inclusive, Operating System focused on online investigations of social media, domain recon, dark web, malware analysis, and more. It offers investigators the ability to do their job using a software package that is centrally managed and updatable without having to go out of your way doing the daunting task of updating individual applications. 

CYBER FORENSICS

CSI Linux was developed by Computer Forensics, Incident Response, and Competitive Intelligence professionals to meet the current needs of the government agencies and the industry.

CSI Linux is a multi-purpose, all inclusive, Operating System focused on online investigations of social media, domain recon, dark web, malware analysis, and more. IT offers investigators the ability to do their job using a software package that is centrally managed and updatable without having to go out of your way doing the daunting task of updating individual applications. 

THE NEXT FRONTIER IN CYBER FORENSICS

ONLINE INVESTIGATIONS

The first challenge that we focus on is the ability to minimize the time and effort it usually takes for reconnaissance and Open Source Intelligence (OSINT) analysis. There is a plethora of information on the Internet and a LOT of it is useful during investigations. Tracking a suspect? Want to know what a future hacker will know about you? Need to link user accounts to prove collusion? These are some of the many challenges many of us face every day. We are making this easier and, in many cases, cheaper than ever before. CSI Linux ties together Social Media accounts, Website Info, Domain Recon, OSINT, and more.

INCIDENT RESPONSE

The second challenge the organisations are facing is the cyber crime case. If a hacker or even an Advanced Persistent Threat (APT) is inside, how do you catch them? What do you do once you identify the threat? Welcome to the world of incident response and network forensics. With a combination or state of the art technology and good old-fashioned investigative know-how, we are working on a low budget solution for making your cyber triage and emergency response easier and more streamlined. This capability includes: Intrusion Detection/Prevention, Log Monitoring, Network Analysis, Reporting, and more.

MALWARE ANALYSIS

The third challenge is malware analysis. You may never need this, but if you come across an application or process that seems malicious and none of your security solutions are catching the activity, we have you covered with solutions including radare2 and the NSA released tool Ghidra. CSI Linux gives the possibility to perform both Static and Dynamic Malware Reverse Engineering.

WANT TO TRY IT?

The download has been packaged in a VirtualBox appliance. You must download and install VirtualBox first, install the VirtualBox Extension Pack, then run the downloaded OVA file. This will take a few minutes to build. The current appliance comes with both CSI Linux and Whonix Gateway.

OPEN SOURCE FEATURES

Bleachbit
GoBuster
Guymager
HTTrack
(x)Hydra

Ghidra
Keepass
LibreOffice
Locator
Maltego CE

CherryTree
Metagoofil
NMap
OphCrack
OSINTFramework

CS-QuickTunnel
OSINT-Search
Radare2
Recon-NG
RecordMyDesktop

EyeWitness
Skiptrace
StegoSuite
Sublist3r
theHarvester

GIMP
Tor Browser
Whonix Gateway

* Bleachbit
* CherryTree
* CS-QuickTunnel
* EyeWitness
* Ghidra
* GIMP
* GoBuster
* Guymager
* HTTrack
* (x)Hydra
* Keepass
* LibreOffice
* Locator
* Maltego CE
* Metagoofil
* NMap
* OphCrack
* OSINTFramework
* OSINT-Search
* Radare2
* Recon-NG
* RecordMyDesktop
* Skiptrace
* StegoSuite
* Sublist3r
* theHarvester
* Tor Browser
* Whonix Gateway

CONTACT US

FOR MORE INFORMATION

13 + 10 =