Identify Trojans, Steganography, Rootkits and Anti-forensics
Extend your EnCase® evidence search with Cyber-Threat Analytics Knowledgebase (C-TAK). This technology provides examiners with high performance and accurate identification of cyber threats such as Trojans, Steganography, Rootkits and Anti-forensics that may directly impact investigations. Not only can the presence and classification of these programs allow examiners to view suspects from a new perspective but paranoia level, suspect sophistication and covert behaviors can also be derived in searching for applications with a common theme. These behaviors can assist in assessing suspect capability, activities, intent, threat or “consciousness of guilt.”
C-TAK is an EnCase Application developed specifically for EnCase® AppCentral. C-TAK Version 2.0 has been tested with EnCase Forensic 7.1.