Tooling for analyze forensic¶
2010
We present different tools for forensic analysis of the random-access memory.
Mass memory analysis¶
Mass memory corresponding to all non-volatile, high-capacity media that can be written by a computer.
fdisk
: list of partition tabledf
: list of mount pointlosetup
: mount fileThe Coroner’s Toolkit (TCT) : find file and stuff in mass memory
sleuthkit
http://www.sleuthkit.org.blkcalc
: converts unassigned disk unit numbers and standard disk unit numbers.blkcat
: displays the contents of the file system data unit in a disk image.blkls
: displays data blocks in a file system.blkstat
: display details of a file system data unit (block or sector).ffind
: searches for file names that point to a specified metadata entryfls
: lists of file names in a file systemfsstat
: displays system and statistical information on an image or other mediumhfind
: search for a hash value in a hash database.icat
: displays a file on standard output, based on the file inode.ifind
: Find the metadata structure that allocated a given disk drive or file name.ils
: lists of all entered metadata, such as an inodeimg_cat
: output the contents of an image file.img_stat
: display the details of an image file.istat
: displays information relating to a file, according to its inodejcat
: display the contents of a block in the file system log.jls
: lists the contents of a file system log.mactime
: produces a timeline of MAC accesses to files whose metadata has not been destroyedmmcat
: displays the contents of a partition on stdout.mmls
: display the partition layout of a volume system (partition tables).mmstat
: show details about the volume system (partition tables).sigfind
: searches for the binary signature in a file.sort
: sorts files deleted (and recoverable) or present in an image according to the file type: exec, text, document, archive, audio, image, video, system, …srch_strings
: show printable strings in files.disk_stat
: (currently Linux only) discovers the existence of a “Host Protected Area”
Autopsy
: Web interface for data analysis and recoveryOther recovery tools: Fatback, Foremost, Ntfsundelete
Other specific tools: galetta, pasco, rifiuti, …
PyFlag
: Interface for data analysis and recoveryPenguin Sleuth Kit: This is a live CD which contains the analysis tools
Copy of mass memory¶
sudo dd conv=notrunc,noerror,sync if=/dev/sdd1 of=/home/user/Desktop/file.dd
notrunc warns dd not to truncate the result on an error
sync allows you to put
0
in instead of blocks that contain errorsnoerror allows
dd
not to stop when it encounters an error.
fsstat: displays system and statistic information on an image or other media
fsstat file.dd
Mount the image file:
losetup /dev/loop0 file.dd
mount -r /dev/loop0 mnt #-r : read-only
List files with fls. It lists the files (r/r), folders (d/d), files and folders deleted: you will see a star (*) after d/d or r/r.
fls -f ntfs /dev/loop0
Same thing as before, this time, it directly scans the file created by dd
fls file.dd
Display the contents of a file with icat on standard output depending on the file inode
icat -f ntfs file.dd 29981-128-4
Ram memory Analysis with Volatility¶
What is the Operating System of this Dump file? (OS name) ?
volatility -f victim.raw imageinfo
What is the PID of SearchIndexer?
volatility -f victim.raw --profile=Win7SP1x64 pslist