- Incident Response
- Anti-Forensics
- General Forensics - Agnostic
- Browser Forensics
- Cloud Foreniscs
- Firmware Forensics
- Linux Forensics
- Memory Forensics
- Mobile Device Forensics
- Network Forensics
- OS X Forensics
- Windows Forensics
- PDF Forensics
- Image Forensics
- Sort sections alphabetically
- Update ToC
- 101
- Better security --> Mean time to detect & Mean time to respond
- Introduction to DFIR
- Computer Security Incident Handling Guide - NIST
- AboutDFIR.com
- The Definitive Compendium Project Digital Forensics & Incident Response
- Basics of Incident Handling - Josh Rickard
- Introduction to DFIR - Scott J Roberts
- The Incident Response Hierarchy of Needs
- The Incident Response Hierarchy is modeled after Maslow's Hierarchy of Needs. It describes the capabilities that organizations must build to defend their business assets.
- SCORE: Law Enforcement FAQ - SANS(2004)
- If we are going to turn the tide against computer attacks, the entire information security community must cooperate more effectively than ever before. The private sector, government agencies, and law enforcement must cooperate in responding to computer attacks. Yet, many security personnel aren't familiar with how to engage law enforcement effectively. For example, when should you call local or national law enforcement to help handle a case? How can you develop communication channels with law enforcement? This FAQ addresses these questions and more, with the goal of helping to foster communication with the law enforcement community. This project was developed as part of the SANS Institute's Cyber Defense Initiative ® (CDI). Each year, SANS polls the security community for ideas about CDI collaborative projects we can all use to help improve our security. Volunteers from around the world pour enormous amounts of effort to bring these projects to fruition, including this FAQ.
- General/Agnostic
- Articles/Blogposts/Writeups
- No Easy Breach: Challenges and Lessons Learned from an Epic Investigation
- Handler Diaries - Another Hunting Post(DFIR)
- Good post on not only knowing the layout, but knowing expected behaviours.
- Triaging Malware Incidents
- Good writeup/blogpost from Journey into Incidence Response
- SANS Institute Security Consensus Operational Readiness Evaluation
- Security Breach 101 - Ryan McGeehan
- Security Breach 102 - Ryan McGeehan
- Learning From A Year of Security Breaches - Ryan McGeehan
- VirusTotal is not an Incident Responder - Matt Benton
- This post is designed for both Defenders and fellow Red Teamers. For Defenders, I hope to shed some light on how attackers can manipulate VirusTotal’s URL link scanning to provide clean responses. For Red Teamers, this is just information to add to the toolkit on how to emulate an adversary and challenge Defenders to not make all decisions based on a VirusTotal response.
- Talks/Presentations/Videos
- Articles/Blogposts/Writeups
- Cloud
- AWS
- Articles/Blogposts/Writeups
- Scalable infrastructure for investigations and incident response - MSRC Team(2019)
- Digital Forensic Analysis of Amazon Linux EC2 Instances - Ken Hartman(2018)
- Incident Response in Amazon EC2: First Responders Guide to Security Incidents in the Cloud - Tom Arnold(2016)
- As Head of Digital Forensics for Payment Software Company Inc. (“PSC”), a company that focuses exclusively on Clients that accept or process payments,1 we’ve responded to sites operating within cloud environments, most notably Amazon EC2.
- Hardening AWS Environments and Automating Incident Response for AWS Compromises - Andrew Krug, Alex McCormack, Joel Ferrier, Jeff Parr
- Talks/Presentations/Videos
- Logging in the Cloud: From Zero to (Incident Response) Hero - Jonathon Poling(2020)
- Slides
- So many logs, so little time. What logs even exist? Which are enabled by default? Which are the most critical to enable and configure for effective incident response? AWS. Azure. GCP. My. Dear. God. Send help! And, help you this presentation shall. This session will walk through the most important logging to enable (and how) in each cloud provider to take you from zero to incident response hero!Pre-Requisites: Basic familiarity operating with the three major Cloud providers: AWS, Azure, and GCP.
- A Planned Methodology for Forensically Sound IR in Office 365 - Devon Ackerman(SANS DFIR Summit2018)
- A planned methodology for developing and implementing a forensically sound incident response plan in Microsoft’s Office 365 cloud environment must be thoroughly researched and re-evaluated over time as the system evolves, new features are introduced, and older capabilities are deprecated. This presentation will walk through the numerous forensic, incident response, and evidentiary aspects of Office 365. The presentation is based on two years’ worth of collection of forensics and incident response data in Microsoft’s Office 365 and Azure environments. It combines knowledge from more than a hundred Office 365 investigations, primarily centered around Business Email Compromise (BEC) and insider threat cases.
- Incident Response in the Cloud - Jim Jennis, Conrad Fernandes(re:Invent 2017)
- In this session, we walk you through a hypothetical incident response managed on AWS. Learn how to apply existing best practices as well as how to leverage the unique security visibility, control, and automation that AWS provides. We cover how to set up your AWS environment to prevent a security event and how to build a cloud-specific incident response plan so that your organization is prepared before a security event occurs. This session also covers specific environment recovery steps available on AWS.
- Logging in the Cloud: From Zero to (Incident Response) Hero - Jonathon Poling(2020)
- Tools
- aws_ir
- Python installable command line utility for mitigation of instance and key compromises.
- aws_ir
- Articles/Blogposts/Writeups
- Azure
- Articles/Blogposts/Writeups
- Talks/Presentations/Videos
- GCP
- Articles/Blogposts/Writeups
- Talks/Presentations/Videos
- O365
- See O365
- AWS
- Containers
- Articles/Blogposts/Writeups
- Talks/Presentations/Videos
- Container Forensics: What to Do When Your Cluster is a Cluster - Maya Kaczorowski & Ann Wallace(CloudNativeConEU19)
- When responding to an incident in your containers, you don’t necessarily have the same tools at your disposal that you do with VMs - and so your incident investigation process and forensics are different. In a best case scenario, you have access to application logs, orchestrator logs, node snapshots, and more. In this talk, we’ll go over where to get information about what’s happening in your cluster, including logs and open source tools you can install, and how to tie this information together to get a better idea of what’s happening in your infrastructure. Armed with this info, we’ll review the common mitigation options such as to alert, isolate, pause, restart, or kill a container. For common types of container attacks, we'll discuss what options are best and why. Lastly, we’ll talk about restoring services after an incident, and the best steps to take to prevent the next one.
- Container Forensics: What to Do When Your Cluster is a Cluster - Maya Kaczorowski & Ann Wallace(CloudNativeConEU19)
- Linux
- Articles/Blogposts/Writeups
- Talks/Presentations/Videos
- OS X
- Articles/Blogposts/Writeups
- Talks/Presentations/Videos
- Incident response on macOS - Thomas Reed
- This talk will provide details about how to do incident response on macOS, which is something that is not well-understood except by a relatively small number of Mac-knowledgeable experts. Examples will be given using real-world malware and tools.
- Learn Incident Response for Mac - Thomas Reed(Derbycon2019)
- Slides
- All too often, admins simply reimage an infected Mac, losing vital information in the process. Learn how to analyze a Mac that you suspect has been infected: what artifacts to collect, and how to parse out what happened. You'll learn about the techniques malware is currently using, with concrete examples, as well as some things that malware could do in the future but hasn't yet. Suspicious behaviors that can help identify processes as malicious will also be discussed. These lessons will be illustrated with examples from real-world malware.
- Cleaning the Apple Orchard - Using Venator to Detect macOS Compromise - Richie Cyrus(BSides Charm2019)
- Various solutions exist to detect malicious activity on macOS. However, they are not intended for enterprise use or involve installation of an agent. This session will introduce and demonstrate how to detect malicious macOS activity using the tool Venator. Venator is a python based macOS tool designed to provide defenders with the data to proactively identify malicious macOS activity at scale.
- Detecting macOS Compromise with Venator - Richie Cyrus(Objective by the Sea v2.0)
- Slides
- Various solutions exist to detect malicious activity on macOS. However, they are not intended for enterprise use or involve installation of an agent. This session will introduce and demonstrate how to detect malicious macOS activity using the tool Venator. Venator is a python based macOS tool designed to provide defenders with the data to proactively identify malicious macOS activity at scale. This data can then be imported into a SIEM for the purpose of building robust analytics during hunting engagements.
- Blogpost
- Incident response on macOS - Thomas Reed
- Windows
- Articles/Blogposts/Writeups
- Planning for Compromise - docs.ms
- Alerting and Detection Strategy Framework - palantir
- Know your Windows Processes or Die Trying
- Excellent quick reference on Windows proccesses with a focus on Win7. Good resource.
- License to Kill: Malware Hunting with the Sysinternals Tools
- Windows Program Automatic Startup Locations
- Collection of Windows Autostart locations
- Spotting the Adversary with Windows Event Log Monitoring - NSA
- NSA 70-page writeup on windows event log monitoring
- Ways to Identify Malware on a System Ryan Irving
- Talks/Presentations/Videos
- Malicious payloads vs. deep visibility: a PowerShell story - Daniel Bohannon(PSConEU19)
- This talk draws from over four years of Incident Response experience to lay out a technical buffet of in-the-wild malicious PowerShell payloads and techniques. In addition to diving deep into the mechanics of each malicious example, this presentation will highlight forensic artifacts, detection approaches and the deep visibility that the latest versions of PowerShell provides security practitioners to defend their organizations against the latest attacks that utilize PowerShell.
- Investigating PowerShell Attacks - Ryan Kazanciyan and Matt Hastings - DEFCON22
- This presentation will focus on common attack patterns performed through PowerShell - such as lateral movement, remote command execution, reconnaissance, file transfer, etc. - and the sources of evidence they leave behind. We'll demonstrate how to collect and interpret these forensic artifacts, both on individual hosts and at scale across the enterprise. Throughout the presentation, we'll include examples from real-world incidents and recommendations on how to limit exposure to these attacks.
- Incident Response is HARRRRRD: But It Doesn't Have to Be - Michael Gough(WWHF2019)
- So your EDR, AV, or other fancy shiny blinky lights security tools alerted you that Bobs Windows box has some suspicious activity. Do you have the details you need to investigate or remediate the system? Can you quickly and easily investigate it? You can enable a lot of things you already have for FREE to help you with your investigations, no matter the tools used. Let’s take a look at how we do Incident Response on Windows systems and what you can do to prepare for an inevitable event. How is your logging? Is it enabled? Configured to some best practice? (hopefully better than an industry standard that is seriously lacking). Have you enabled some critical logs that by default Microsoft does NOT enable? Do you have a way to run a command, script, or a favorite tool across one or all your systems and retrieve the results? Do you block some well-known exploitable file types so users do not initiate the scripting engine when they double click, rather just open good ol’ Notepad? Everything mentioned here is FREE and you already have it! This talk will describe these things and how to prepare, and be PREPARED to do incident Response on Windows systems. A few tools will be discussed as well that you can use to speed things up. The attendee can take the information from this talk and immediately start improving their environment to prepare for the… inevitable, an incident.
- Malicious payloads vs. deep visibility: a PowerShell story - Daniel Bohannon(PSConEU19)
- Articles/Blogposts/Writeups
- Talks & Videos
- General/Unsorted
- Lend me your IR's! - Matt Scheurer(Hack3rCon X)
- Have you ever felt compelled to tip your cap to a malicious threat actor? Protecting systems and networks as a tech defender means withstanding a constant barrage of unsophisticated attacks from automated tools, botnets, crawlers, exploit kits, phish kits, and script kiddies; oh my! Once in a while we encounter attacks worthy of style points for creativity or new twists on old attack techniques. This talk features live demo reenactments from some advanced attacks the presenter investigated. These live demos showcase technical deep dives of the underpinnings from both the attacker and investigator sides of these attacks. Attendee key takeaways are strategies, freely available tools, and techniques helpful during incident response investigations.
- Slides
- Fraud detection and forensics on telco networks - Hack.lu 2016
- Lend me your IR's! - Matt Scheurer(Hack3rCon X)
- Spyware
- General/Unsorted
- Red Team/Pentest/Purple Teaming
- CheatSheets/Checklists
- Documents
- Methodologies/Playbooks
- Examples of:
- incidentresponse.com playbooks
- Univeristy of Florida IR Playbooks
- pagerduty Incident Response
- This documentation covers parts of the PagerDuty Incident Response process. It is a cut-down version of our internal documentation, used at PagerDuty for any major incidents, and to prepare new employees for on-call responsibilities. It provides information not only on preparing for an incident, but also what to do during and after. It is intended to be used by on-call practitioners and those involved in an operational incident response process (or those wishing to enact a formal incident response process). See the about page for more information on what this documentation is and why it exists.
- Strategies to Mitigate Cyber Security Incidents - Mitigation Details - Australian Cyber Security Center
- National Incident Management System -USA
- IRM (Incident Response Methodologies)
- CERT Societe Generale provides easy to use operational incident best practices. These cheat sheets are dedicated to incident handling and cover multiple fields in which a CERT team can be involved. One IRM exists for each security incident we're used to dealing with.
- Security Incident Response Guide - Cloud.gov
- This document outlines cloud.gov’s internal process for responding to security incidents. It outlines roles and responsibilities during and after incidents, and it lays out the steps we’ll take to resolve them.
- RE&CT
- The RE&CT Framework is designed for accumulating, describing and classification actionable Incident Response techniques.
- Building
- Using a “Playbook” Model to Organize Your Information Security Monitoring Strategy - cisco
- Building a Cloud-Specific Incident Response Plan - AWS Security Team(2017)
- Collaborative Open Playbook Standard(COPS)
- This repository contains schema definitions for a DFIR (Digital Forensics Incident Response) Playbook. The scheme is based on YAML (http://yaml.org/), and describes an incident response runbook (aka. playbook, “use case”) that is a written guidance for identifying, containing, eradicating and recovering from cyber security incidents.
- Examples of:
- On-Call
- Articles/Blogposts/Writeups
- Ask an expert: How should startups approach on-call and incident response? - Increment(2017)
- Increment asked several industry experts if they had any advice for small companies who are just starting to set up their on-call and incident response processes, and here’s what they said.
- On-call at any size - Increment(2017)
- We take a close look at how to make on-call work at any scale, sharing industry best practices that apply to companies at any size, from tiny startups in garages to companies the size of Amazon, Facebook, and Google.
- Ask an expert: How should startups approach on-call and incident response? - Increment(2017)
- Articles/Blogposts/Writeups
- Papers
- Platforms
- Building one
- Built
- TheHive
- TheHive is a scalable 4-in-1 open source and free Security Incident Response Platform designed to make life easier for SOCs, CSIRTs, CERTs and any information security practitioner dealing with security incidents that need to be investigated and acted upon swiftly. It is the perfect companion for MISP. You can synchronize it with one or multiple MISP instances to start investigations out of MISP events. You can also export an investigation's results as a MISP event to help your peers and partners detect and react to attacks you've dealt with. Additionally, when TheHive is used in conjunction with Cortex, security analysts and researchers can easily analyze hundred of observables at once using more than 100 analyzers, contain an incident or eradicate malware thanks to Cortex responders.
- INCIDENTS
- INCIDENTS is a web-based, actively maintained case management tool for incident response, just like TheHive. You can use INCIDENTS whether you're investigating a malware infection, a phishing campaign, insider abuse, an application vulnerability, a denial-of-service attempt, or any other kind of security incident.
- MIG: Mozilla InvestiGator
- Mozilla's real-time digital forensics and investigation platform.
- Fully Integrated Defense Operation (FIDO)
- FIDO is an orchestration layer used to automate the incident response process by evaluating, assessing and responding to malware. FIDO’s primary purpose is to handle the heavy manual effort needed to evaluate threats coming from today's security stack and the large number of alerts generated by them. As an orchestration platform FIDO can make using your existing security tools more efficient and accurate by heavily reducing the manual effort needed to detect, notify and respond to attacks against a network.
- TheHive
- Prioritization
- Response Automation
- Building
- Articles/Blogposts/Writeups
- Talks/Presentations/Videos
- Hardening AWS Environments and Automating Incident Response for AWS Compromises - Andrew Krug & Alex McCormack(BHUSA2016)
- Incident Response procedures differ in the cloud versus when performed in traditional, on-premise, environments. The cloud offers the ability to respond to an incident by programmatically collecting evidence and quarantining instances but with this programmatic ability comes the risk of a compromised API key. The risk of a compromised key can be mitigated but proper configuration and monitoring must be in place. The talk discusses the paradigm of Incident Response in the cloud and introduces tools to automate the collection of forensic evidence of a compromised host. It highlights the need to properly configure an AWS environment and provides a tool to aid the configuration process.
- Hardening AWS Environments and Automating Incident Response for AWS Compromises - Andrew Krug & Alex McCormack(BHUSA2016)
- Tools
- SOCless
- SOCless is a serverless framework built to help security teams easily automate their incident response and operations processes.
- Dispatch - Netflix
- Dispatch helps us effectively manage security incidents by deeply integrating with existing tools used throughout an organization (Slack, GSuite, Jira, etc.,) Dispatch is able to leverage the existing familiarity of these tools to provide orchestration instead of introducing another tool.
- SOCless
- Built
- Articles/Blogposts/Writeups
- Introducing Twilio's SOCless: Automated Security Runbooks
- Guardians of the Cloud: Automating the Response to Security Events - Alejandro Ortuno(2019)
- "How Auth0 uses security automation to respond to GuardDuty events at scale and our learnings in the process"
- Tools
- Articles/Blogposts/Writeups
- Building
- Tools
- Fuzzy Hashes
- binwally
- Binary and Directory tree comparison tool using the Fuzzy Hashing concept (ssdeep)
- binwally
- DIY VirusTotal
- IRMA - Incident Response & Malware Analysis
- IRMA intends to be an open-source platform designed to help identifying and analyzing malicious files. However, today's defense is not only about learning about a file, but it is also getting a fine overview of the incident you dealt with: where / when a malicious file has been seen, who submitted a hash, where a hash has been noticed, which anti-virus detects it, ... An important value with IRMA comes from you keep control over where goes / who gets your data. Once you install IRMA on your network, your data stays on your network. Each submitted files is analyzed in various ways. For now, we focus our efforts on multiple anti-virus engines, but we are working on other "probes" (feel free to submit your own).
- Invoke-IR
- IRMA - Incident Response & Malware Analysis
- Timeline
- plaso
- log2timeline is a tool designed to extract timestamps from various files found on a typical computer system(s) and aggregate them.
- Timesketch
- Timesketch is an open source tool for collaborative forensic timeline analysis. Using sketches you and your collaborators can easily organize your timelines and analyze them all at the same time. Add meaning to your raw data with rich annotations, comments, tags and stars.
- plaso
- Fuzzy Hashes
- Miscellaneous
- Human Hunting
- Much of what appears to be happening in information security seems to be focused on replacing humans with magic boxes and automation rather than providing tools to augment human capabilities. However, when we look at good physical security we see technology is being used to augment human capabilities rather than simply replace them. The adversary is human so we are ultimately looking for human directed behaviors. If analysts don't know how to go looking for evil without automated detection tools then they are not going to be able to effectively evaluate if the detection tools are working properly or if the deployment was properly engineered. An over reliance on automated detection also puts organizations in a position of paying protection money if they want to remain secure. We should be spending more resources on honing analyst hunting skills to find human adversaries rather than purchasing more automated defenses for human adversaries to bypass.
- Human Hunting
- Training
- ENISA CERT Exercises and Training
- ENISA CERT Exercises and training material was introduced in 2008, in 2012 and 2013 it was complemented with new exercise scenarios containing essential material for success in the CERT community and in the field of information security. In this page you will find the ENISA CERT Exercise material, containing Handbook for teachers, Toolset for students and Virtual Image to support hands on training sessions.
- ENISA CERT Exercises and Training
- Malware Management Framework (Originally called 'Sniper Forensics')
- Malware Management Framework - Sniper Forensics Toolkit
- The Malware Management Framework
- Sniper Forensics
- Pg10 and onward
- Link )
- Sniper Forensics, Memory Analysis, and Malware Detection - windowsir.blogspot
- Unrelated but highly relevant: LogMD
-
101
-
Articles/Talks/Writeups
-
Android & iOS
- Incident Response for Android and iOS - NowSecure
- This book will prepare enterprises and practitioners for the inevitable increase in mobile compromise. We will use step-by-step tutorials, guiding the reader from setting up a mobile IR practice all the way through continuous monitoring of mobile devices.
- Incident Response for Android and iOS - NowSecure
-
General
-
Papers
- Secure Deletion of Data from Magnetic and Solid-State Memory
- Hiding Data in Hard-Drive's Service Areas
- In this paper we will demonstrate how spinning hard-drives’ serv ice areas 1 can be used to hide data from the operating-system (or any software using the standard OS’s API or the standard ATA commands to access the hard- drive)
-
Talks/Presentations/Videos
- Anti-Forensics for the Louise - Derbycon - int0x80 (of Dual Core)
- Hardware Backdooring is Practical** -Jonathan Brossard
- Hiding the breadcrumbs: Forensics and anti-forensics on SAP systems - Juan Perez-Etchegoyen
- The largest organizations in the world rely on SAP platforms to run their critical processes and keep their business crown jewels: financial information, customer data, intellectual property, credit cards, human resources salaries, sensitive materials, suppliers and more. Everything is there and attackers know it. For several years at Onapsis we have been researching on how cyber-criminals might be able to break into ERP systems in order to help organizations better protect themselves. This has enabled us to gain a unique expertise on which are the most critical attack vectors and what kind of traces they leave (and don’t) over the victim’s SAP platforms. SAP systems need to be ready for Forensic Analysis, so the big question is: Are your systems prepared to retain the attackers breadcrumbs in the event of an attack? Join us and learn how to do a forensic analysis of an SAP system, looking for traces of a security breach We will also show novel techniques being used by attackers to avoid being detected during post attack forensic investigations. Vulnerabilities related to anti-forensic techniques will be presented together with their mitigation. NEW New attacks never presented before will be shown. JAVA, ABAP and BO systems will be covered.
- Forensics Impossible: Self-Destructing Thumb Drives - Brandon Wilson
- Anti-Forensics and Anti-Anti-Forensics Attacks - Michael Perkins
- Everyone's heard the claim: Security through obscurity is no security at all. Challenging this claim is the entire field of steganography itself - the art of hiding things in plain sight. Most people know you can hide a text file inside a photograph, or embed a photograph inside an MP3. But how does this work under the hood? What's new in the stego field? This talk will explore how various techniques employed by older steganographic tools work and will discuss a new technique developed by the speaker which embodies both data hiding and data enciphering properties by encoding data inside NTFS volumes. A new tool will be released during this talk that will allow attendees to both encode and decode data with this new scheme.
- Slides: Slides(link)
- Destroying Evidence Before Its Evidence
- And That's How I Lost My Other Eye...Explorations in Data Destruction
- An Anti-Forensics Primer - Jason Andress
- This talk will cover the basics of anti-forensics, the tools and techniques that can be used to make life harder for computer forensic examiners. We will cover some of the basic methods that are used (disk wiping, time stomping, encryption, etc…) and talk about which of these methods might actually work and which are easily surmounted with common forensic tools.
- Anti-Forensics for Fun and Privacy - Alissa Gilbert(Shmoocon 2020)
- Want to learn how to avoid surveillance and investigators? Anti-forensics is the practice of modifying or removing data so that others cannot find it later during an investigation. While annoying to forensic practitioners and law enforcement, it is unavoidable to help maintain privacy in a world of shady ToS, snooping partners, and potential search and seizures. How far do you need to go to maintain your privacy? This talk will break down anti-forensics techniques that you can use to protect yourself from audiences like your mom to an extreme nation-state level actor. The only thing more fun than forensics is anti-forensics.
-
Tools
- usbkill
- A tool that shuts down your computer if USB devices change, for example if you unplug or plug-in a device.
- CleanAfterMe
- CleanAfterMe allows you to easily clean files and Registry entries that are automatically created by the Windows operating system during your regular computer work. With CleanAfterMe, you can clean the cookies/history/cache/passwords of Internet Explorer, the 'Recent' folder, the Registry entries that record the last opened files, the temporary folder of Windows, the event logs, the Recycle Bin, and more.
- usbkill
-
Miscellaneous
- 101
- Reference
- File Signature Table
- This table of file signatures (aka "magic numbers") is a continuing work-in-progress. I have found little information on this in a single place, with the exception of the table in Forensic Computing: A Practitioner's Guide by T. Sammes & B. Jenkinson (Springer, 2000); that was my inspiration to start this list in 2002.
- File Signature Table
- Articles & Writeups
- Talks & Presentations
- Papers
- Tools
- binwally
- Binary and Directory tree comparison tool using the Fuzzy Hashing concept (ssdeep)
- SSDeep
- ssdeep is a program for computing context triggered piecewise hashes (CTPH). Also called fuzzy hashes, CTPH can match inputs that have homologies. Such inputs have sequences of identical bytes in the same order, although bytes in between these sequences may be different in both content and length.
- Xmount
- What is xmount? xmount allows you to convert on-the-fly between multiple input and output harddisk image types. xmount creates a virtual file system using FUSE (Filesystem in Userspace) that contains a virtual representation of the input image. The virtual representation can be in raw DD, DMG, VHD, VirtualBox's virtual disk file format or in VmWare's VMDK file format. Input images can be raw DD, EWF (Expert Witness Compression Format) or AFF (Advanced Forensic Format) files. In addition, xmount also supports virtual write access to the output files that is redirected to a cache file. This makes it possible to boot acquired harddisk images using QEMU, KVM, VirtualBox, VmWare or alike.
- PEview
- PEview provides a quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files. This PE/COFF file viewer displays header, section, directory, import table, export table, and resource information within EXE, DLL, OBJ, LIB, DBG, and other file types.
- SQLite
- Python Parser to Recover Deleted SQLite Database Data - az4n6)
- SQLite-Parser
- Script to recover deleted entries in an SQLite database
- binwally
- Training
- Miscellaneous
- The Sleuth Kit
- The Sleuth Kit is an open source forensic toolkit for analyzing Microsoft and UNIX file systems and disks. The Sleuth Kit enables investigators to identify and recover evidence from images acquired during incident response or from live systems. The Sleuth Kit is open source, which allows investigators to verify the actions of the tool or customize it to specific needs. The Sleuth Kit uses code from the file system analysis tools of The Coroner's Toolkit (TCT) by Wietse Venema and Dan Farmer. The TCT code was modified for platform independence. In addition, support was added for the NTFS (see docs/ntfs.README) and FAT (see docs/fat.README) file systems. Previously, The Sleuth Kit was called The @stake Sleuth Kit (TASK). The Sleuth Kit is now independent of any commercial or academic organizations.
- The Sleuth Kit
- 101
- Articles/Papers/Talks/Writeups
- General
- Tools
- wechat-dump
- Dump wechat messages from android. Right now it can dump messages in text-only mode, or generate a single-file html containing voice messages, images, emoji, etc.
- Androick
- Androick is a python tool to help in forensics analysis on android. Put the package name, some options and the program will download automatically apk, datas, files permissions, manifest, databases and logs. It is easy to use and avoid all repetitive tasks!
- wechat-dump
- Training
- Android Forensics class - OpenSecurity Training
- This class serves as a foundation for mobile digital forensics, forensics of Android operating systems, and penetration testing of Android applications.
- Android Forensics class - OpenSecurity Training
- Miscellaneous
- 101
- Articles/Papers/Talks/Writeups
- Talks/Presentations/Videos
- Efficiently Summarizing Web Browsing Activity - Ryan Benson(SANS DFIR Summit2018)
- Reviewing web browsing activity is relevant in a wide variety of DFIR cases. With many users having multiple devices that may need to be analyzed, we need better ways to get answers quickly. This presentation will show how a synopsis of browsing activity can be a starting point before a deep-dive investigation and can help investigators decide whether a device is relevant to their case. We will also examine if a device is relevant to their case, and how this summary can provide quick answers to some common questions that are useful in communicating one’s findings to a less technical audience.
- Efficiently Summarizing Web Browsing Activity - Ryan Benson(SANS DFIR Summit2018)
- Tools
- Chrome
- Chrome Ragamuffin
- Volatility plugin designed to extract useful information from Google Chrome's address space. The goal of this plugin is to make possible the analysis of a Google Chrome running instance. Starting from a memory dump, Chrome Ragamuffin can list which page was open on which tab and it is able to extract the DOM Tree in order to analyze the full page structure.
- Chrome Ragamuffin
- Firefox
- MozillaRecovery
- Recovers the master password of key3.db files, i.e. Thunderbird, Firefox
- firefox_decrypt
- Firefox Decrypt is a tool to extract passwords from Mozilla (Firefox/Thunderbird/Seabird) profiles
- firepwd.py
- firepwd.py, an open source tool to decrypt Mozilla protected passwords
- Firefed
- Firefed is a command-line tool to inspect Firefox profiles. It can extract saved passwords, preferences, addons, history and more. You may use it for forensic analysis, to audit your config for insecure settings or just to quickly extract some data without starting up the browser.
- MozillaRecovery
- Neutral
- Extension Finder
- Python and PowerShell utilities for finding installed browser extensions, plug-ins and add-ons. Attempts to find installed browser extensions (sometimes called add-ons or plug-ins, depending on the browser).
- Hindsight
- Hindsight is a free tool for analyzing web artifacts. It started with the browsing history of the Google Chrome web browser and has expanded to support other Chromium-based applications (with more to come!). Hindsight can parse a number of different types of web artifacts, including URLs, download history, cache records, bookmarks, autofill records, saved passwords, preferences, browser extensions, HTTP cookies, and Local Storage records (HTML5 cookies). Once the data is extracted from each file, it is correlated with data from other history files and placed in a timeline.
- Extension Finder
- Chrome
- Miscellaneous
####Cloud Forensics
- 101
- Agnostic/Multiple
- Articles/Blogposts/Writeups
- Presentations/Talks/Videos
- Logging in the Cloud: From Zero to (Incident Response) Hero - Jonathon Poling(2020)
- Slides
- So many logs, so little time. What logs even exist? Which are enabled by default? Which are the most critical to enable and configure for effective incident response? AWS. Azure. GCP. My. Dear. God. Send help! And, help you this presentation shall. This session will walk through the most important logging to enable (and how) in each cloud provider to take you from zero to incident response hero!Pre-Requisites: Basic familiarity operating with the three major Cloud providers: AWS, Azure, and GCP.
- Logging in the Cloud: From Zero to (Incident Response) Hero - Jonathon Poling(2020)
- AWS
- Articles/Blogposts/Writeups
- Presentations/Talks/Videos
- Tools
- Dufflebag
- Dufflebag is a tool that searches through public Elastic Block Storage (EBS) snapshots for secrets that may have been accidentally left in.
- Dufflebag
- Azure
- Articles/Blogposts/Writeups
- Presentations/Talks/Videos
- GCP
- Articles/Blogposts/Writeups
- Presentations/Talks/Videos
- Cloud Forensics 101 - Sami Zuhuruddin(Cloud Next '18)
- We hope it never happens, but we need a plan to deal with 'incidents' should we ever suspect one is happening. This could be anything from an application issue to a suspected compromise. How do we capture needed environment details on the spot and carry out a full investigation? We'll demonstrate the tools and processes that everyone should be familiar with when running in a cloud environment.
- Cloud Forensics 101 - Sami Zuhuruddin(Cloud Next '18)
- GSuite
- Articles/Blogposts/Writeups
- Presentations/Talks/Videos
- GSuite Digital Forensics and Incident Response - Megan Roddie(BSides SanAntonio)
- With the current standard of companies transitioning to the cloud, digital forensic investigators and incident responders are facing new, unknown territory. As a starting point of talking about cloud DFIR, this talk aims to provide a real-life case study of what it is like to respond to an incident in GSuite, Google’s cloud business suite. The goal is that by reviewing this case study the audience will not only learn about GSuite DFIR but also begin to think about how this extends to all cloud environments.
- GSuite Digital Forensics and Incident Response - Megan Roddie(BSides SanAntonio)
- O365
- Tools
- hawk
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches
- hawk
- Tools
- Miscellaneous
- 101
- Articles/Blogposts/Writeups
- Presentations/Talks/Videos
- Tools
- USB
- usbrip
- usbrip is a small piece of software written in pure Python 3 (using some external modules, see Dependencies/pip) which analyzes Linux log data (journalctl output or /var/log/syslog* and /var/log/messages* files, depending on the distro) for constructing USB event history tables. Such tables may contain the following columns: "Connected" (date & time), "Host", "VID" (vendor ID), "PID" (product ID), "Product", "Manufacturer", "Serial Number", "Port" and "Disconnected" (date & time).
- usbrip
- USB
- Miscellaneous
- 101
- Articles/Papers/Talks/Writeups
- General
- Tools
- lmg - Linux Memory Grabber
- A script for dumping Linux memory and creating Volatility(TM) profiles.
- Detekt
- Detekt is a Python tool that relies on Yara, Volatility and Winpmem to scan the memory of a running Windows system (currently supporting Windows XP to Windows 8 both 32 and 64 bit and Windows 8.1 32bit). Detekt tries to detect the presence of pre-defined patterns that have been identified through the course of our research to be unique identifiers that indicate the presence of a given malware running on the computer.
- Dshell
- An extensible network forensic analysis framework. Enables rapid development of plugins to support the dissection of network packet captures.
- LiME - Linux Memory Extractor
- A Loadable Kernel Module (LKM) which allows for volatile memory acquisition from Linux and Linux-based devices, such as Android. This makes LiME unique as it is the first tool that allows for full memory captures on Android devices. It also minimizes its interaction between user and kernel space processes during acquisition, which allows it to produce memory captures that are more forensically sound than those of other tools designed for Linux memory acquisition.
- Vortessence is a tool, whose aim is to partially automate memory forensics analysis. Vortessence is a project of the Security Engineering Lab of the Bern University of Applied Sciences.
- Miscellaneous
- Volatility
- Volatility
- An advanced memory forensics framework
- VolUtility
- Web Interface for Volatility Memory Analysis framework
- evolve
- Web interface for the Volatility Memory Forensics Framework
- Vortessence
- Volatility
- 101
- Android
- iOS
- Articles/Blogposts/Writeups
- Both/Neutral
- Android
- iOS
- Papers
- Presentations/Talks/Videos
- Tools
- Android
- iOS
- iOSForensic
- iosForensic is a python tool to help in forensics analysis on iOS. It get files, logs, extract sqlite3 databases and uncompress .plist files in xml.
- iOSForensic
- See also: Network Security Monitoring/Logging
- 101
- Articles/Papers/Talks/Writeups
- Analyzing TNEF files
- Finding Bad Guys with 35 million Flows, 2 Analysts, 5 Minutes and 0 Dollars
- There are a lot of proof of concepts out there for building open source networks forensics analysis environments. Taking them into production in an enterprise? Another story entirely. This talk will focus on my journey into constructing a large scale Netflow security analytics platform for a large healthcare management company's complex environment on no additional budget. Important points to be covered were technology considerations, scalability, and how to quickly break the collected data down to find malicious activity on the network with minimal effort.
- Papers
- Tools
- Miscellaneous
-
101
-
Articles/Blogposts/Writeups
- General
- OS X Forensics Generals
- OSX Lion User Interface Preservation Analysis
- When did my Mac last start up, and why? An exploration with Ulbow - hoakley(2020)
- RunningBoard: a new subsystem in Catalina to detect errors - hoakley(2019)
- How RunningBoard tracks every app, and manages some - hoakley(2019)
- Mac Forensic Artifacts - Corrie Erk(2015)
*This is a running list of notes gathered based on experience investigating devices. This is very much an incomplete collection of artifacts*
- Collection
- Logs
- Parsing
- General
-
General
-
Papers
-
Presentations/Talks/Videos
- Watching the Watchers - Sarah Edwards(Objective by the Sea v2.0)
- Slides
- Forensic analysis is sometimes all about grasping for straws. You never know what time little piece of data can make a difference in an investigation. We focus so much on native forensic artifacts that we lose sight of what third party applications provide us. I’m a huge proponent of having monitoring tools to keep track of what is happening on my system and to (hopefully) protect it. These tools are inherently monitoring the system, what data can they provide to forensic investigators? This talk will go through some of the most popular monitoring utilities to show what they record and how that can help move forward investigations. Objective-See, Little Snitch, iStat Menus, AV, and more!
- Watching the Watchers - Sarah Edwards(Objective by the Sea v2.0)
-
OS X Specific Stuff
-
Tools
- Collection
- Venator
- Venator is a python tool used to gather data for proactive detection of malicious activity on macOS devices.
- osxcollector
- OSXCollector is a forensic evidence collection & analysis toolkit for OSX.
- Mac OS X Keychain Forensic Tool
- The chainbreaker can extract user credential in a Keychain file with Master Key or user password in forensically sound manner. Master Key candidates can be extracted from volafox or volatility keychaindump module. Supports: Snow Leopard, Lion, Mountain Lion, Mavericks, Yosemite, El Capitan, (High) Sierra
- Pac4Mac
- Pac4Mac (Plug And Check for Mac OS X) is a portable Forensics framework (to launch from USB storage) allowing extraction and analysis session informations in highlighting the real risks in term of information leak (history, passwords, technical secrets, business secrets, ...). Pac4Mac can be used to check security of your Mac OS X system or to help you during forensics investigation.
- AutoMacTC: Automating Mac Forensic Triage - CrowdStrike
- This is a modular forensic triage collection framework designed to access various forensic artifacts on macOS, parse them, and present them in formats viable for analysis. The output may provide valuable insights for incident response in a macOS environment. Automactc can be run against a live system or dead disk (as a mounted volume.)
- Article
- PICT - Post-Infection Collection Toolkit
- This set of scripts is designed to collect a variety of data from an endpoint thought to be infected, to facilitate the incident response process. This data should not be considered to be a full forensic data collection, but does capture a lot of useful forensic information.
- PICT-Swift (Post Infection Collection Toolkit)
- This is a Swift (and slightly modified) version of Thomas Reed's PICT (Post Infection Collection Toolkit: https://github.com/thomasareed/pict). Thomas Reed is the brains behind the awesome PICT concept. I just simply wrote a Swift version of it and added an additional collector.
- Catalina Forensic Tool
- A GUI frontend for AppleScript (shell, etc) based forensic artifact retreival.
- macOSTriageTool
- A DFIR tool to collect artifacts on macOS
- macOS-ir
- Prototype to collect data and analyse it from a compromised macOS device.
- Venator
- Parsing
- TrueTree
- TrueTree is more than just a pstree command for macOS. It is used to display a process tree for current running processes while using a hierarchy built on additoinal pids that can be collected from the operating system. The standard process tree on macOS that can be built with traditional pids and ppids is less than helpful on macOS due to all the XPC communication at play. The vast majority of processes end up having a parent process of launchd. TrueTree however displays a process tree that is meant to be useful to incident responders, threat hunters, researchers, and everything in between!
- mac_apt
- macOS Artifact Parsing Tool. mac_apt is a DFIR tool to process Mac computer full disk images (or live machines) and extract data/metadata useful for forensic investigation. It is a python based framework, which has plugins to process individual artifacts (such as Safari internet history, Network interfaces, Recently accessed files & volumes, ..)
- DSStoreParser
- macOS .DS_Store Parser. Searches recursively for .DS_Store files in the path provided and parses them. MacOS Finder uses .DS_Store files to remember how a folder view was customized by the user.
- TrueTree
- Point-in-Time
- Crescendo
- Crescendo is a swift based, real time event viewer for macOS. It utilizes Apple's Endpoint Security Framework.
- Crescendo
- Miscellaneous
- Knock Knock
- KnockKnock displays persistent items (scripts, commands, binaries, etc.), that are set to execute automatically on OS X
- OS X Auditor
- OS X Auditor is a free Mac OS X computer forensics tool. - No longer maintained
- FileMonitor
- A macOS File Monitor (based on Apple's new Endpoint Security Framework)
- ProcessMonitor
- Process Monitor Library (based on Apple's new Endpoint Security Framework)
- Knock Knock
- Collection
- 101
- Introduction to Windows Forensics - 13cubed
- An introduction to basic Windows forensics, covering topics including UserAssist, Shellbags, USB devices, network adapter information and Network Location Awareness (NLA), LNK files, prefetch, and numerous other common Windows forensic artifacts. We will walk through a DFIR cheat sheet I have created, and see a live example of each topic as we analyze a Windows 10 image.
- Introduction to Windows Forensics - 13cubed
- Articles/Blogposts/Writeups
- Active Directory
- The only PowerShell Command you will ever need to find out who did what in Active Directory - Przemyslaw Klys
- Forensics: Monitor Active Directory Privileged Groups with PowerShell - Ashley McGlone
- Digital Forensics Tips&Tricks: How to Detect an Intruder-driven Group Policy Changes - volnodumcev
- ADTIMELINE – Active Directory Forensics With Replication Metadata at the First Technical Colloqium
- Bitlocker
- Disk Forensics
- Invoke-LiveResponse
- The current scope of Invoke-LiveResponse is a live response tool for targeted collection. There are two main modes of use in Invoke-LiveResponse and both are configured by a variety of command line switches.
- Article
- Invoke-LiveResponse
- Event Log
- Event Tracing
- Event Tracing for Windows and Network Monitor
- "Event Tracing for Windows, (ETW), has been around for quite a while now as it was introduced in Windows 2000. It's basically instrumented logging that describes what a component is doing. Conceptually, it’s something like the proverbial printf("here1") concept used by programmers, but it is present in retail builds. When you enable logging in a component the result is an ETL (Event Trace Log) file. What’s new is that that Network Monitor can read any ETL file. And with the supplied parsers many network oriented ETW providers can be decoded."
- Windows Forensics: Event Trace Logs - Nicole Ibrahim(SANS DFIR Summit 2018)
- This talk will cover what ETL files are and where you can expect to find them, how to decode ETL files, caveats associated with those files, and some interesting and forensically relevant data that ETL files can provide.
- Event Tracing for Windows and Network Monitor
- Evidence of Execution
- Available Artifacts - Evidence of Execution - Adam Harrison(2019)
- HowTo: Determine Program Execution - Harlan Carvey(2013)
- Forensic Artifacts: evidences of program execution on Windows systems - Andrea Fortuna(2018)
- It Is All About Program Execution - Corey Harrell(2014)
- Did It Execute? - Mary Singh
- Exchange
- Microsoft Teams
- Notification DB
- O365
- Security Information and Event Management (SIEM) server integration with Microsoft 365 services and applications - docs.ms
- Is your organization using or planning to get a Security Information and Event Management (SIEM) server? You might be wondering how it integrates with Microsoft 365 or Office 365. This article provides a list of resources you can use to integrate your SIEM server with Microsoft 365 services and applications.
- Security Information and Event Management (SIEM) server integration with Microsoft 365 services and applications - docs.ms
- Registry
- Telemetry
- Forensic analysis of the Windows telemetry for diagnostics - Jaehyeok Han, Jungheum Park, Hyunji Chung, Sangjin Lee(2020)
- Telemetry is the automated sensing and collection of data from a remote device. It is often used to provide better services for users. Microsoft uses telemetry to periodically collect information about Windows systems and to help improve user experience and fix potential issues. Windows telemetry service functions by creating RBS files on the local system to reliably transfer and manage the telemetry data, and these files can provide useful information in a digital forensic investigation. Combined with the information derived from traditional Windows forensics, investigators can have greater confidence in the evidence derived from various artifacts. It is possible to acquire information that can be confirmed only for live systems, such as the computer hardware serial number, the connection records for external storage devices, and traces of executed processes. This information is included in the RBS files that are created for use in Windows telemetry. In this paper, we introduced how to acquire RBS files telemetry and analyzed the data structure of these RBS files, which are able to determine the types of information that Windows OS have been collected. We also discussed the reliability and the novelty by comparing the conventional artifacts with the RBS files, which could be useful in digital forensic investigation.
- Tool
- Forensic analysis of the Windows telemetry for diagnostics - Jaehyeok Han, Jungheum Park, Hyunji Chung, Sangjin Lee(2020)
- Touch-Screen
- USB
- Active Directory
- Educational
- General
- Sysmon
- Articles/Blogposts/Writeups
- Sysmon - DFIR
- A curated list of resources for learning about deploying, managing and hunting with Microsoft Sysmon. Contains presentations, deployment methods, configuration file examples, blogs and additional github repositories.
- Getting Started With Sysmon - John Strand(BHIS)
- Building A Perfect Sysmon Configuration File - Paula(CQURE)
- Working With Sysmon Configurations Like a Pro Through Better Tooling - Matt Graeber
- Sysmon - DFIR
- Talks/Presentations/Videos
- Advanced Incident Detection and Threat Hunting using Sysmon (and Splunk) - Tom Ueltschi
- This presentation will give an overview and detailed examples on how to use the free Sysinternals tool SYSMON to greatly improve host-based incident detection and enable threat hunting approaches.
- Slides
- Advanced Incident Detection and Threat Hunting using Sysmon (and Splunk) - Tom Ueltschi
- Tools
- sysmon-config | A Sysmon configuration file for everybody to fork - SwiftonSecurity
- Sysmon configuration file template with default high-quality event tracing
- sysmon-config | A Sysmon configuration file for everybody to fork - SwiftonSecurity
- Articles/Blogposts/Writeups
- Talks/Presentations/Videos
- Techniques for fast windows forensics investigations
- Look at sniper forensics, skip around, 18min has resources you want to grab for snapshots
- O365
- A Planned Methodology for Forensically Sound IR in Office 365 - Devon Ackerman(SANS DFIR Summit2018)
- A planned methodology for developing and implementing a forensically sound incident response plan in Microsoft’s Office 365 cloud environment must be thoroughly researched and re-evaluated over time as the system evolves, new features are introduced, and older capabilities are deprecated. This presentation will walk through the numerous forensic, incident response, and evidentiary aspects of Office 365. The presentation is based on two years’ worth of collection of forensics and incident response data in Microsoft’s Office 365 and Azure environments. It combines knowledge from more than a hundred Office 365 investigations, primarily centered around Business Email Compromise (BEC) and insider threat cases.
- Office 365 Incident Response - Alex Parsons(BSides Orlando2019)
- In this talk, I will discuss attacker patterns in O365 environments, how to collect the data you need during an incident, and how to respond to questions from CISOs and lawyers, and tell some Incident Response war stories along the way. We will also look into some of the new techniques attackers are using to perform things like MFA bypass, new features that Microsoft is rolling out to assist Incident Responders (such as MailItemsAccessed operations), and ways to automate and prepare for such an attack.
- Slides
- A Planned Methodology for Forensically Sound IR in Office 365 - Devon Ackerman(SANS DFIR Summit2018)
- Techniques for fast windows forensics investigations
- Tools
- Active Directory Focused
- NTDSXtract - Active Directory Forensics Framework
- Description from the page: This framework was developed by the author in order to provide the community with a solution to extract forensically important information from the main database of Microsoft Active Directory (NTDS.DIT).
- ADTimeline
- PowerShell script creating a timeline of Active Directory changes with replication metadata
- BTA - AD Security Audit Framework
- BTA is an open-source Active Directory security audit framework. Its goal is to help auditors harvest the information they need to answer such questions as:
- Who has rights over a given object (computer, user account, etc.) ?
- Who can read a given mailbox ?
- Which are the accounts with domain admin rights ?
- Who has extended rights (userForceChangePassword, SendAs, etc.) ?
- What are the changes done on an AD between two points in time ?
- BTA is an open-source Active Directory security audit framework. Its goal is to help auditors harvest the information they need to answer such questions as:
- ADTimeline
- The ADTimeline script generates a timeline based on Active Directory replication metadata for objects considered of interest. Replication metadata gives you the time at which each replicated attribute for a given object was last changed. As a result the timeline of modifications is partial. For each modification of a replicated attribute a version number is incremented.
- NTDSXtract - Active Directory Forensics Framework
- Artifact Collection
- FastIR Collector
- This tool collects different artefacts on live Windows and records the results in csv or json files. With the analyses of these artefacts, an early compromission can be detected.
- FastIR Collector on advanced threats
- triage-ir
- Triage: Incident Response automatically collect information from a system that needs basic triage functions performed upon it. The script allows for easy modification for customization to your needs, in an easy to comprehend and implement language. This tool uses a lot others to get its information. Eventually I hope to eliminate the need for them, but use them as verification. This tool requires you to download the Sysinternals Suite if you want full functionality to it.
- Rapier
- RAPIER is a security tool built to facilitate first response procedures for incident handling. It is designed to acquire commonly requested information and samples during an information security event, incident, or investigation. RAPIER automates the entire process of data collection and delivers the results directly to the hands of a skilled security analyst
- FastIR Collector
- Autoruns
- AutoRuns PowerShell Module
- AutoRuns module was designed to help do live incident response and enumerate autoruns artifacts that may be used by legitimate programs as well as malware to achieve persistence.
- AutoRuns PowerShell Module
- DPAPI
- DPAPIck
- This is a forensic tool to deal, in an offline way, with Microsoft Windows® protected data, using the DPAPI (Data Protection API
- DPAPIck
- Event Log
- ETW
- Windows Insight: The Windows Telemetry ETW Monitor - Aleksandar Milenkoski
- The Windows Insight repository now hosts the Windows Telemetry ETW Monitor framework. The framework monitors and reports on Windows Telemetry ETW (Event Tracing for Windows) activities – ETW activities for providing data to Windows Telemetry. It consists of two components:
- Windows Insight
- The content of this repository aims to assist efforts on analysing inner working principles, functionalities, and properties of the Microsoft Windows operating system. This repository stores relevant documentation as well as executable files needed for conducting analysis studies.
- Windows Insight: The Windows Telemetry ETW Monitor - Aleksandar Milenkoski
- File Systems
- PowerForensics - PowerShell Digital Forensics
- The purpose of PowerForensics is to provide an all inclusive framework for hard drive forensic analysis. PowerForensics currently supports NTFS and FAT file systems, and work has begun on Extended File System and HFS+ support.
- Introducing KAPE – Kroll Artifact Parser and Extractor - Eric Zimmerman
- Introduction to KAPE - 13Cubed
- This 13Cubed episode covers an exciting new tool from Kroll and Eric Zimmerman called KAPE. From the developer, KAPE is an efficient and highly configurable triage program that will target essentially any device or storage location, find forensically useful artifacts, and parse them within a few minutes.
- Triage Collection and Timeline Analysis with KAPE - Mari DeGrazia
- As hard drive sizes get larger and larger, conducting full disk forensics is becoming a thing of the past. Why spend hours analyzing a disk image when you can analyze a handful of core Windows artifacts to build your case in a matter of minutes. In this webcast, learn how to use the free tool KAPE to collect key operating system files from a live system or a forensic image. Once the data is collected, KAPE can be leveraged to parse various artifacts and build a mini-timeline. In addition, learn how to customize KAPE by writing your own custom modules for your workflow.
- PowerForensics - PowerShell Digital Forensics
- Memory Acquisition
- Margarita Shotgun
- Python Remote Memory Aquisition
- Margarita Shotgun
- .NET CLR
- Notifications DB
- Office365
- HAWK 1.1.4
- The Hawk module has been designed to ease the burden on O365 administrators who are performing a forensic analysis in their organization. It accelerates the gathering of data from multiple sources in the service. It does NOT take the place of a human reviewing the data generated and is simply here to make data gathering easier.
- Monte Carlo
- Monte Carlo is a collection of 3 tools to process Office 365 Unified audit logs in incident response investigations. It is extensible and breaks the processing tasks in 3 stages (sectors):
- HAWK 1.1.4
- Pre-Fetch
- WinPrefetchView v1.25
- Each time that you run an application in your system, a Prefetch file which contains information about the files loaded by the application is created by Windows operating system. The information in the Prefetch file is used for optimizing the loading time of the application in the next time that you run it. WinPrefetchView is a small utility that reads the Prefetch files stored in your system and display the information stored in them. By looking in these files, you can learn which files every application is using, and which files are loaded on Windows boot.
- WinPrefetchView v1.25
- Powershell
- Kansa -A Powershell incident response framework
- A modular incident response framework in Powershell. Note there's a bug that's currently cropping up in PowerShell version 2 systems, but version 3 and later should be fine
- Meerkat
- Meerkat is collection of PowerShell modules designed for artifact gathering and reconnaissance of Windows-based endpoints. Use cases include incident response triage, threat hunting, baseline monitoring, snapshot comparisons, and more.
- Kansa -A Powershell incident response framework
- Processes
- PE-sieve
- PE-sieve is a tool that helps to detect malware running on the system, as well as to collect the potentially malicious material for further analysis. Recognizes and dumps variety of implants within the scanned process: replaced/injected PEs, shellcodes, hooks, and other in-memory patches.
- PE-sieve
- Program Execution
- Did it Execute? - Mandiant
- You found a malicious executable! Now you’ve got a crucial question to answer: did the file execute? We’ll discuss a few sources of evidence you can use to answer this question. In this post, we will focus on static or “dead drive” forensics on Windows systems. We will cover four main sources of evidence: Windows Prefetch, Registry, Log Files, and File Information.
- HowTo: Determine Program Execution
- Did it Execute? - Mandiant
- Recycle Bin
- Rifiuti2
- Rifiuti2 analyse recycle bin files from Windows. Analysis of Windows recycle bin is usually carried out during Windows computer forensics. Rifiuti2 can extract file deletion time, original path and size of deleted files. For more ancient versions of Windows, it can also check whether deleted items were not in recycle bin anymore (that is, either restored or permanently purged).
- Rifiuti2
- Registry
- Regipy: Automating registry forensics with python - Martin Korman
- regipy
- Regipy is an os independent python library for parsing offline registry hives
- WMI Focused
- PoSH-R2
- PoSH-R2 is a set of Windows Management Instrumentation interface (WMI) scripts that investigators and forensic analysts can use to retrieve information from a compromised (or potentially compromised) Windows system. The scripts use WMI to pull this information from the operating system. Therefore, this script will need to be executed with a user that has the necessary privileges.
- WMI_Forensics
- This repository contains scripts used to find evidence in WMI repositories
- PoSH-R2
- Active Directory Focused
- Miscellaneous
- Windows Attribute changer
- Get-InjectedThread.ps1
- Code from "Taking Hunting to the Next Level: Hunting in Memory" presentation at SANS Threat Hunting Summit 2017 by Jared Atkinson and Joe Desimone
- Beagle
- Beagle is an incident response and digital forensics tool which transforms data sources and logs into graphs. Supported data sources include FireEye HX Triages, Windows EVTX files, SysMon logs and Raw Windows memory images. The resulting Graphs can be sent to graph databases such as Neo4J or DGraph, or they can be kept locally as Python NetworkX objects. Beagle can be used directly as a python library, or through a provided web interface.
- 101
- Articles/Papers/Talks/Writeups
- General
- Tools
- Miscellaneous
- 101
- Articles/Blogposts/Writeups
- General
- Papers
- Talks & Videos
- Tools
- Miscellaneous
###< a name="photo">Image Forensics
- 101
- Articles/Papers/Talks/Writeups
- General
- Tools
- Extensible Metadata Platform
- The Extensible Metadata Platform (XMP) is an ISO standard, originally created by Adobe Systems Inc., for the creation, processing and interchange of standardized and custom metadata for digital documents and data sets.
- jhead
- Exif Jpeg header manipulation tool
- Jeffrey's Image Metadata Viewer
- Extensible Metadata Platform
- Miscellaneous
- 101
- Articles/Papers/Talks/Writeups
- General
- Tools
- StegExpose
- StegExpose is a steganalysis tool specialized in detecting LSB (least significant bit) steganography in lossless images such as PNG and BMP. It has a command line interface and is designed to analyse images in bulk while providing reporting capabilities and customization which is comprehensible for non forensic experts. StegExpose rating algorithm is derived from an intelligent and thoroughly tested combination of pre-existing pixel based staganalysis methods including Sample Pairs by Dumitrescu (2003), RS Analysis by Fridrich (2001), Chi Square Attack by Westfeld (2000) and Primary Sets by Dumitrescu (2002). In addition to detecting the presence of steganography, StegExpose also features the quantitative steganalysis (determining the length of the hidden message). StegExpose is part of my MSc of a project at the School of Computing of the University of Kent, in Canterbury, UK.
- StegExpose
- Miscellaneous
- 101
- Articles/Papers/Talks/Writeups
- General
- Tools
- Miscellaneous