ºñ¹Ð¹øÈ£ È®ÀÎ ´Ý±â


 
 
»óÇ° »ó¼¼ ¼³¸í
 
   ¹é½Å/º¸¾È > º¸¾È > OSForensics v11
 
 
 
ÀÌÀü»óÇ° OSForensics v11 ´ÙÀ½»óÇ°
 
 
 
Á¦Á¶È¸»ç : PassMark
ÆǸŰ¡°Ý : 1,485,000¿ø (VAT Æ÷ÇÔ)
°ø±Þ¹æ½Ä : ESD
¼ö·® EA
¿É¼ÇÀû¿ë°¡ : 1,485,000¿ø
License_¼±Åà :
 
 
»óÇ° »ó¼¼ ¼³¸í
 
 
 

License Comparison

There are subscription, perpetual licenses of OSForensics available.


License

Perpetual

Subscription

License Validity

Software never expires

Software valid for length of subscription

Major and Minor Upgrades

Yes, for length of purchased support period

Yes, for length of subscription

Support and Maintenance

Phone, E-mail, Forum support for length

Phone, E-mail, Forum support

¡¡

of purchased support period

¡¡

Installs per License

Allows for 2 machine installs

Allows for 2 machine installs

¡¡

(typically a lab machine and a laptop)

(typically a lab machine and a laptop)

¡¡

and 1 USB install, all controlled by the same user

and 1 USB install, all controlled by the same user

Auto-Renewal

No

Yes, if paying by credit card.


OSForensics lets you extract forensic evidence from computers quickly with high performance file searches and indexing. Identify suspicious files and activity with hash matching, drive signature comparisons, e-mails, memory and binary data. Manage your digital investigation and create reports from collected forensic data. 


Digital investigations for a new era For Windows

  • Identify suspicious files and activity

  • Extract evidence from computers quickly

  • Manage your investigation




Search files fast
OSF provides one of the fastest and most powerful ways to locate files on a Windows computer or Forensic image.

Search within the contents of files with the use of our acclaimed indexing engine providing industry leading relevance ranking, date range searching, exact phrase matching, ¡°Google-like¡± context results and more.



Extensive file type support
Investigate and search within hundreds of file types including Office and Acrobat documents, image files (with OCR), e-mails</a> (Outlook, Thunderbird, Mozilla and more), attachments, ZIP files, and even binary files and unallocated clusters.



Recover deleted evidence
Search and recover files that a user may have attempted to destroy or have been removed from the Recycle Bin.


Uncover user activity
Scan the computer for evidence of recent activity, including accessed websites, USB drives that have been connected, wireless networks, recent downloads, website logins and website passwords.


Password recovery
OSF provide powerful tools to uncover and crack passwords on a live system or forensic image.

These include:

  • Web site logins and passwords (used in Chrome, Edge, IE, Firefox and Opera)
  • Outlook and Windows Live passwords
  • Saved Wifi passwords
  • Windows autologon password
  • Windows and other Microsoft product keys
  • Ports (Serial/Parallel)
  • Network adapters
  • Physical and optical drives
  • Bitlocker detection

OSF also provide tools to crack hashes with the use of rainbow tables, and dictionary attacks.



Reveal hidden areas on a hard disk
OSF can expose the HPA and DCO hidden areas of a hard disk which can be used for malicious intent, including hiding illegal data.


Browse Volume Shadow copies
Use OSF to access Volume Shadow Copies. This allows you to look at how a disk appeared at a point of in time in the past and see what has changed. Discover changes to files and even view deleted files.



System requirements

Win 7, Win 8, Win 10, Win 11

Windows Server 2012, 2016, 2019, 2022

64-bit support, 32-bit deprecated

Minimum 2GB of RAM. (16GB+ recommended)

500MB of free disk space, or can be run from USB drive


Recommended System Requirements

When it comes to setting up a system for OSForensics, there is a huge range of PC hardware on the market. Below are some suggested guidelines, but many other setups will also work fine.


Bare Minimum Hardware:

  • 2GB RAM

  • Any x86 CPU (e.g. Intel Core i3)

  • Win7 or above

  • Any hard drive with 2GB free space

  • Any video card


Suggested mid range cost effective hardware for lab machine:

  • 32GB DDR4 or DDR5 RAM

  • 64bit x86 CPU released in last 3 years with 6+ cores (e.g. Intel i5-12600K)

  • Win11

  • 2TB Boot & data drive. M2 NVME SSD (e.g. Samsung 980 PRO M.2 PCI-E Gen4 2TB)

  • Optional ¡®cold¡¯ storage (e.g. Seagate Ironwolf 10TB HDD)

  • Video card (e.g. nVidia 3060)

  • Power supply Gold class 650W.


High end workstation:

  • Off the shelf solutions: PowerEdge T440 Tower Server, or HPE ML350 Gen11

  • 64GB+ ECC DDR5 RAM

  • Xeon CPU with 10+ cores (Gen11 or later)

  • Win11

  • 4TB Boot and data drive. M2 NVME SSD (e.g. Samsung 980 PRO M.2 PCI-E Gen4 4TB)

  • 4 x 8TB SATA SSD storage. (e.g. Samsung 870 QVO 2.5in SATA SSD 8TB)

  • Optional RAID 0 data mirroring on SSD storage

  • Video card: nVidia 4080 (if password cracking is envisaged, otherwise 3060 class)

  • Power supply Gold class 850W+.