Explore the cutting-edge capabilities of ForensiX, a robust digital forensics tool designed for deep analysis of Google Chrome data.
From preserving data integrity to detailed suspect profiling, ForensiX utilizes advanced machine learning models to enhance investigative processes.
This guide covers installation, features, and operational insights for effective data examination.
Requirements:
Clone repository:
git clone https://github.com/ChmaraX/forensix.git Note: ML model need to be pulled using since its size is ~700MB. This model is already included in pre-built Docker image.
git lfs pull Put directory with Google Chrome artifacts to analyze into default project directory. Data folder will me mounted as a volume on server startup.
The directory name must be named /data .
cp -r /Default/. /forensix/data To download prebuild images (recommended): Note: If there is error, you may need to use sudo or set docker to not need a sudo prompt.
./install Note: to build images from local source use -b:
./install -b
Wait for images to download and then start them with:
./startup If you want to use HTTPS for communication between on UI or Server side, place key and certificate into /certificates directory in either /server or /client directory.
To generate self-signed keys:
openssl req -nodes -new -x509 -keyout server.key -out server.cert Change baseURL protocol to https in /client/src/axios-api.js, then rebuild the specific changed image:
docker-compose build <client|server> Setting up a Static IP on Ubuntu configuration is essential for servers, remote access systems,…
Keeping the correct system clock is important for servers, desktop systems, scheduled tasks, and application…
An Ubuntu Hostname Change is a common administrative task used to rename Linux servers, desktops,…
Ubuntu Swap Space helps Linux systems stay responsive when physical RAM starts running low. Instead…
If you need secure remote desktop access on Linux, learning how to Install TeamViewer on…
If you want to test operating systems, build development labs, or safely run isolated environments,…