1
2
Fork 0
mirror of https://github.com/carlospolop/hacktricks.git synced 2023-12-14 19:12:55 +01:00
hacktricks/forensics/basic-forensic-methodology
2021-05-28 17:53:46 +00:00
..
memory-dump-analysis GitBook: [master] 7 pages modified 2021-05-28 17:51:59 +00:00
partitions-file-systems-carving GitBook: [master] 476 pages modified 2021-05-28 17:53:46 +00:00
pcap-inspection GitBook: [master] 476 pages modified 2021-05-28 17:53:46 +00:00
specific-software-file-type-tricks GitBook: [master] 46 pages modified 2021-05-28 17:27:17 +00:00
windows-forensics GitBook: [master] 476 pages modified 2021-05-28 17:53:46 +00:00
anti-forensic-techniques.md GitBook: [master] 476 pages modified 2021-05-28 17:53:46 +00:00
docker-forensics.md GitBook: [master] 46 pages modified 2021-05-28 17:27:17 +00:00
image-adquisition-and-mount.md GitBook: [master] 2 pages modified 2021-05-28 17:29:30 +00:00
linux-forensics.md GitBook: [master] 7 pages modified 2021-05-28 17:51:59 +00:00
malware-analysis.md GitBook: [master] 7 pages modified 2021-05-28 17:51:59 +00:00
README.md GitBook: [master] 476 pages modified 2021-05-28 17:53:46 +00:00

Basic Forensic Methodology

In this section of the book we are going to learn about some useful forensics tricks.
We are going to talk about partitions, file-systems, carving, memory, logs, backups, OSs, and much more.

So if you are doing a professional forensic analysis to some data or just playing a CTF you can find here useful interesting tricks.

Creating and Mounting an Image

{% page-ref page="image-adquisition-and-mount.md" %}

Malware Analysis

This isn't necessary the first step to perform once you have the image. But you can use this malware analysis techniques independently if you have a file, a file-system image, memory image, pcap... so it's good to keep these actions in mind:

{% page-ref page="malware-analysis.md" %}

Inspecting an Image

if you are given a forensic image of a device you can start analyzing the partitions, file-system used and recovering potentially interesting files even deleted ones. Learn how in:

{% page-ref page="partitions-file-systems-carving/" %}

Depending on the used OSs and even platform different interesting artifacts should be searched:

{% page-ref page="windows-forensics/" %}

{% page-ref page="linux-forensics.md" %}

{% page-ref page="docker-forensics.md" %}

Deep inspection of specific file-types and Software

If you have very suspicious file, then depending on the file-type and software that created it several tricks may be useful.
Read the following page to learn some interesting tricks:

{% page-ref page="specific-software-file-type-tricks/" %}

I want to do a special mention to the page:

{% page-ref page="specific-software-file-type-tricks/browser-artifacts.md" %}

Memory Dump Inspection

{% page-ref page="memory-dump-analysis/" %}

Pcap Inspection

{% page-ref page="pcap-inspection/" %}

Anti-Forensic Techniques

Keep in mind the possible use of anti-forensic techniques:

{% page-ref page="anti-forensic-techniques.md" %}