hacktricks/forensics/basic-forensic-methodology
CPol ddf8210cf7
GitBook: [#2876] save
2021-11-30 16:46:07 +00:00
..
memory-dump-analysis GitBook: [#2876] save 2021-11-30 16:46:07 +00:00
partitions-file-systems-carving GitBook: [#2876] save 2021-11-30 16:46:07 +00:00
pcap-inspection GitBook: [#2876] save 2021-11-30 16:46:07 +00:00
specific-software-file-type-tricks GitBook: [#2876] save 2021-11-30 16:46:07 +00:00
windows-forensics GitBook: [#2876] save 2021-11-30 16:46:07 +00:00
README.md GitBook: [#2876] save 2021-11-30 16:46:07 +00:00
anti-forensic-techniques.md GitBook: [#2876] save 2021-11-30 16:46:07 +00:00
docker-forensics.md GitBook: [#2876] save 2021-11-30 16:46:07 +00:00
file-integrity-monitoring.md GitBook: [#2777] gitbookissooooo slow I cannot write 2021-10-18 11:21:18 +00:00
image-adquisition-and-mount.md GitBook: [#2876] save 2021-11-30 16:46:07 +00:00
linux-forensics.md GitBook: [#2876] save 2021-11-30 16:46:07 +00:00
malware-analysis.md GitBook: [#2876] save 2021-11-30 16:46:07 +00:00

README.md

Basic Forensic Methodology

{% hint style="danger" %} Do you use Hacktricks every day? Did you find the book very useful? Would you like to receive extra help with cybersecurity questions? Would you like to find more and higher quality content on Hacktricks?
Support Hacktricks through github sponsors so we can dedicate more time to it and also get access to the Hacktricks private group where you will get the help you need and much more! {% endhint %}

If you want to know about my latest modifications/additions or you have any suggestion for HackTricks or PEASS, join the 💬telegram group, or follow me on Twitter 🐦@carlospolopm.
If you want to share some tricks with the community you can also submit pull requests to https://github.com/carlospolop/hacktricks that will be reflected in this book and don't forget to give on github to motivate me to continue developing this book.

In this section of the book we are going to learn about some useful forensics tricks.
We are going to talk about partitions, file-systems, carving, memory, logs, backups, OSs, and much more.

So if you are doing a professional forensic analysis to some data or just playing a CTF you can find here useful interesting tricks.

Creating and Mounting an Image

{% content-ref url="image-adquisition-and-mount.md" %} image-adquisition-and-mount.md {% endcontent-ref %}

Malware Analysis

This isn't necessary the first step to perform once you have the image. But you can use this malware analysis techniques independently if you have a file, a file-system image, memory image, pcap... so it's good to keep these actions in mind:

{% content-ref url="malware-analysis.md" %} malware-analysis.md {% endcontent-ref %}

Inspecting an Image

if you are given a forensic image of a device you can start analyzing the partitions, file-system used and recovering potentially interesting files (even deleted ones). Learn how in:

{% content-ref url="partitions-file-systems-carving/" %} partitions-file-systems-carving {% endcontent-ref %}

Depending on the used OSs and even platform different interesting artifacts should be searched:

{% content-ref url="windows-forensics/" %} windows-forensics {% endcontent-ref %}

{% content-ref url="linux-forensics.md" %} linux-forensics.md {% endcontent-ref %}

{% content-ref url="docker-forensics.md" %} docker-forensics.md {% endcontent-ref %}

Deep inspection of specific file-types and Software

If you have very suspicious file, then depending on the file-type and software that created it several tricks may be useful.
Read the following page to learn some interesting tricks:

{% content-ref url="specific-software-file-type-tricks/" %} specific-software-file-type-tricks {% endcontent-ref %}

I want to do a special mention to the page:

{% content-ref url="specific-software-file-type-tricks/browser-artifacts.md" %} browser-artifacts.md {% endcontent-ref %}

Memory Dump Inspection

{% content-ref url="memory-dump-analysis/" %} memory-dump-analysis {% endcontent-ref %}

Pcap Inspection

{% content-ref url="pcap-inspection/" %} pcap-inspection {% endcontent-ref %}

Anti-Forensic Techniques

Keep in mind the possible use of anti-forensic techniques:

{% content-ref url="anti-forensic-techniques.md" %} anti-forensic-techniques.md {% endcontent-ref %}

Threat Hunting

{% content-ref url="file-integrity-monitoring.md" %} file-integrity-monitoring.md {% endcontent-ref %}