forensic tools sleuthkit wireshark and e detective
Description of the tool
Usages and merits
Your own demonstration screenshots (if possible)
Drawbacks or liabilities
Methods of circumvention
Language in which tool written
OS targeted / limitations
Reference to the source code as available
I need it after 3 hours from now it should nor exceed 4 or 5 pages but coverring all of the above.