Explore the cutting-edge capabilities of ForensiX, a robust digital forensics tool designed for deep analysis of Google Chrome data.
From preserving data integrity to detailed suspect profiling, ForensiX utilizes advanced machine learning models to enhance investigative processes.
This guide covers installation, features, and operational insights for effective data examination.
Requirements:
Clone repository:
git clone https://github.com/ChmaraX/forensix.git Note: ML model need to be pulled using since its size is ~700MB. This model is already included in pre-built Docker image.
git lfs pull Put directory with Google Chrome artifacts to analyze into default project directory. Data folder will me mounted as a volume on server startup.
The directory name must be named /data .
cp -r /Default/. /forensix/data To download prebuild images (recommended): Note: If there is error, you may need to use sudo or set docker to not need a sudo prompt.
./install Note: to build images from local source use -b:
./install -b
Wait for images to download and then start them with:
./startup If you want to use HTTPS for communication between on UI or Server side, place key and certificate into /certificates directory in either /server or /client directory.
To generate self-signed keys:
openssl req -nodes -new -x509 -keyout server.key -out server.cert Change baseURL protocol to https in /client/src/axios-api.js, then rebuild the specific changed image:
docker-compose build <client|server> General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…
If you are a Linux user, you have probably seen commands like chmod 777 while…
Vim and Vi are among the most powerful text editors in the Linux world. They…
Working with compressed files is a common task for any Linux user. Whether you are…
In the digital era, an email address can reveal much more than just a contact…