IPED : Digital Forensic Tool – Process And Analyze Digital Evidence

IPED is an open source software that can be used to process and analyze digital evidence, often seized at crime scenes by law enforcement or in a corporate investigation by private examiners.

Introduction

Digital Evidence Processor and Indexer (translated from Portuguese) is a tool implemented in java and originally and still developed by digital forensic experts from Brazilian Federal Police since 2012. Although it was always open source, only in 2019 its code was officially published.

Since the beginning, the goal of the tool was efficient data processing and stability. Some key characteristics of the tool are:

  • Command line data processing for batch case creation
  • Multiplatform support, tested on Windows and Linux systems
  • Portable cases without installation, you can run them from removable drives
  • Integrated and intuitive analysis interface
  • High multithread performance and support for large cases: up to 135 million items as of 12/12/2019

Currently IPED uses the Sleuthkit Library only to decode disk images and file systems, so the same image formats are supported: RAW/DD, E01, ISO9660, AFF, VHD, VMDK. Also there is support for UDF(ISO), AD1 (AccessData) and UFDR (Cellebrite) formats. Recently support for APFS was added, thanks to BlackBag implementation for Sleuthkit.

If you are new to the tool, please refer to the Beginner’s Start Guide.

Building

To build from source, you need git, maven and java 8 (Oracle or OpenJDK+JFX) installed. Run:

git clone https://github.com/sepinf-inc/IPED.git
cd IPED
mvn install

It will generate a snapshot version of IPED in target/release folder.

On Linux you also must build The Sleuthkit and additional dependencies. Please refer to Linux Section

If you want to contribute to the project, refer to Contributing

Features

Some of IPED several features are listed below:

  • Supported hashes: md5, sha-1, sha-256, sha-512 and edonkey. PhotoDNA is also available for law enforcement (please contact iped@dpf.gov.br)
  • Fast hash deduplication, NIST NSRL, ProjectVIC and LED hashset lookup
  • Signature analysis
  • Categorization by file type and properties
  • Recursive container expansion of dozens of file formats
  • Image and video gallery for hundreds of formats
  • Georeferencing of GPS data (needs Google Maps Javascript API key)
  • Regex searches with optional script validation for credit cards, emails, urls, money values, bitcoin, ethereum, ripple wallets…
  • Embedded hex, unicode text, metadata and native viewers
  • File content and metadata indexing and fast searching, including unknown files and unallocated space
  • Efficient data carving engine (takes < 10% processing time) that scans much more than unallocated, with support for +40 file formats, including videos, extensible by scripting
  • Optical Character Recognition powered by tesseract 4
  • Encryption detection for known formats and using entropy test
  • Processing profiles: forensic, pedo (csam), triage, fastmode (preview) and blind (for automatic data extraction)
  • Detection for +70 languages
  • Named Entity Recognition (needs Stanford CoreNLP models to be downloaded)
  • Customizable filters based on any file metadata
  • Similar document search with configurable threshold
  • Similar image search, using internal or external image
  • Powerful file grouping (clustering) based on ANY metadata
  • Support for multicases up to 135 million items
  • Extensible with javascript and python (including cpython extensions) scripts
  • External command line tools integration for file decoding
  • Browser history for Edge, Firefox, Chrome and Safari
  • Custom parsers for Emule, Shareaza, Ares, WhatsApp, Skype, Telegram, Bittorrent, ActivitiesCache, and more…
  • Fast nudity detection for images and videos using random forests algorithm (thanks to its author Wladimir Leite)
  • Nudity detection using Yahoo open-nsfw deeplearning model (needs keras and jep)
  • Audio Transcription, implementations with Azure and Google Cloud services
  • Graph analysis for communications (calls, emails, instant messages…)
  • Stable processing with out-of-process file system decoding and file parsing
  • Resuming or restarting of stopped or aborted processing (–continue/–restart options)
  • Web API for searching remote cases, get file metadata, raw content, decoded text, thumbnails and posting bookmarks
  • Creation of bookmarks/tags for interesting data
  • HTML, CSV reports and portable cases with tagged data
R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago