
27
Chapter 2
Cyber Forensic Tools
and Utilities
Introduction
Today’s cyber forensic investigator has literally hundreds of specifi c and unique application
software packages and hardware devices that could qualify as cyber forensic tools. Added to that,
the hundreds of utilities available for the same task, the job of identifying and examining the best
and most utilized tools are daunting and overwhelming to say the least.
e information contained within this chapter is intended to be used as a reference and not as
an endorsement, of the included providers, vendors, and informational resources. Reference herein
to any specifi c commercial product ...