This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Showing posts with label Forensics. Show all posts
Showing posts with label Forensics. Show all posts

Operative Framework v1.0b - Fingerprint Framework



This is a framework based on fingerprint action, this tool is used for get information on a website or a enterprise target with multiple modules (Viadeo search, Linkedin search, Reverse email whois, Reverse ip whois, SQL file forensics ...)

Dependency & launching
  • pip install -r requirements.txt
  • python operative.py

Youtube

Campaign
  • You can start a (gathering/fingerprinting) campaign with :campaign command.
  • Update a value of YOURWEBSITE.COM / ENTERPRISE_NAME in config.json file.
  • You can add a module process for a customized campaign.

Core Modules
  • core/modules/cms_gathering
  • core/modules/domain_search
  • core/modules/email_to_domain
  • core/modules/https_gathering
  • core/modules/linkedin_search
  • core/modules/reverse_ipdomain
  • core/modules/search_db
  • core/modules/waf_gathering
  • core/modules/whois_domain
  • core/modules/generate_email
  • core/modules/viadeo_search
  • core/modules/file_common
  • core/modules/get_websiteurl
  • core/modules/getform_data
  • core/modules/subdomain_search
  • core/modules/vhost_IPchecker
  • core/modules/tools_suggester
  • core/modules/metatag_look
  • core/modules/header_retrieval

SQL File forensics
  • import database in core/dbs/
  • read table
  • read columns
  • search information with pattern

Write module
For write module look core/modules/sample_module class


OWASP iOSForensic - Tool to help in forensics analysis on iOS


OWASP iOSForensic is a python tool to help in forensics analysis on iOS.
It get files, logs, extract sqlite3 databases and uncompress .plist files in xml.

OWASP iOSForensic provides:
  • Application's files
  • Conversion of .plist files in XML
  • Extract all databases
  • Conversion of binary cookies
  • Application's logs
  • A List of all packages
  • Extraction multiple packages

Options

  • -h --help : show help message
  • -a --about : show informations
  • -v --verbose : verbose mode
  • -i --ip : local ip address of the iOS terminal
  • -p --port : ssh port of the iOS terminal (default 22)
  • -P --password : root password of the iOS terminal (default alpine)
Examples:
./iOSForensic.py -i 192.168.1.10 [OPTIONS] APP_NAME.app INCOMPLETE_APP_NAME APP_NAME2_WITHOUT_DOT_APP
./iOSForensic.py -i 192.168.1.10 -p 1337 -P pwd MyApp.app angry MyApp2


Collection Of Free Computer Forensic Tools



Disk tools and data capture

Name
From
Description
DumpItMoonSolsGenerates physical memory dump of Windows machines, 32 bits 64 bit. Can run from a USB flash drive.
EnCase Forensic ImagerGuidance SoftwareCreate EnCase evidence files and EnCase logical evidence files [direct download link]
Encrypted Disk Detector*Magnet ForensicsChecks local physical drives on a system for TrueCrypt, PGP, or Bitlocker encrypted volumes
EWF MetaEditor4DiscoveryEdit EWF (E01) meta data, remove passwords (Encase v6 and earlier)
FAT32 FormatRidgecropEnables large capacity disks to be formatted as FAT32
Forensics Acquisition of WebsitesWeb Content Protection AssociationBrowser designed to forensically capture web pages
FTK Imager*AccessDataImaging tool, disk viewer and image mounter
Guymagervogu00Multi-threaded GUI imager under running under Linux
HotSwapKazuyuki NakayamaSafely remove SATA disks similar to the “Safely Remove Hardware” icon in the notification area
LiveViewCERTAllows examiner to boot dd images in VMware.
P2 Explorer FreeParabenMount forensic images as read-only local logical and physical disks
Live RAM Capturer*BelkasoftExtracts RAM dump including that protected by an anti-debugging or anti-dumping system. 32 and 64 bit builds
OSFClonePassmark SoftwareBoot utility for CD/DVD or USB flash drives to create dd or AFF images/clones.
OSFMountPassmark SoftwareMounts a wide range of disk images. Also allows creation of RAM disks
Tableau Imager*TableauImaging tool for use with Tableau imaging products
VHD ToolMicrosoftConverts raw disk images to VHD format which are mountable in Windows Disk Management


Email analysis

Name
From
Description
EDB ViewerLepide SoftwareOpen and view (not export) Outlook EDB files without an Exchange server
Mail ViewerMiTeCViewer for Outlook Express, Windows Mail/Windows Live Mail, Mozilla Thunderbird message databases and single EML files
OST ViewerLepide SoftwareOpen and view (not export) Outlook OST files without connecting to an Exchange server
PST ViewerLepide SoftwareOpen and view (not export) Outlook PST files without needing Outlook


General

Name
From
Description
Agent RansackMythicsoftSearch multiple files using Boolean operators and Perl Regex
CaseNotes LiteBlackthornContemporaneous notes recorder
Computer Forensic Reference Data SetsNISTCollated forensic images for training, practice and validation
EvidenceMover*NuixCopies data between locations, with file comparison, verification, logging
FastCopyShirouzu HiroakiSelf labelled ‘fastest’ copy/delete Windows software. Can verify with SHA-1, etc.
File SignaturesGary KesslerTable of file signatures
HashMyFilesNirsoftCalculate MD5 and SHA1 hashes
MobaLiveCDMobatekRun Linux live CDs from their ISO image without having to boot to them
Mouse JigglerArkane SystemsAutomatically moves mouse pointer stopping screen saver, hibernation etc.
Notepad ++Notepad ++Advanced Notepad replacement
NSRLNISTHash sets of ‘known’ (ignorable) files
Quick HashTed TechnologyA Linux & Windows GUI for individual and recursive SHA1 hashing of files
USB Write BlockerDSiEnables software write-blocking of USB ports
USB Write BlockerSécurité Multi-SecteursSoftware write blocker for Windows XP through to Windows 8
Windows Forensic EnvironmentTroy LarsonGuide by Brett Shavers to creating and working with a Windows boot CD


File and data analysis

Name
From
Description
Advanced Prefetch AnalyserAllan HayReads Windows XP,Vista and Windows 7 prefetch files
analyzeMFTDavid KovarParses the MFT from an NTFS file system allowing results to be analysed with other tools
DefraserVariousDetects full and partial multimedia files in unallocated space
eCryptfs ParserTed TechnologyRecursively parses headers of every eCryptfs file in selected directory. Outputs encryption algorithm used, original file size, signature used, etc.
Encryption AnalyzerPasswareScans a computer for password-protected & encrypted files, reports encryption complexity and decryption options for each file
ExifToolPhil HarveyRead, write and edit Exif data in a large number of file types
Forensic Image ViewerSanderson ForensicsView various picture formats, image enhancer, extraction of embedded Exif, GPS data
HighlighterMandiantExamine log files using text, graphic or histogram views
Link Parser4DiscoveryRecursively parses folders extracting 30+ attributes from Windows .lnk (shortcut) files
LiveContactsViewNirsoftView and export Windows Live Messenger contact details
RSA Netwitness Investigator*EMCNetwork packet capture and analysis
MemoryzeMandiantAcquire and/or analyse RAM images, including the page file on live systems
MetaExtractor4DiscoveryRecursively parses folders to extract meta data from MS Office, OpenOffice and PDF files
MFTviewSanderson ForensicsDisplays and decodes contents of an extracted MFT file
NetSleuthNetGrabNetwork monitoring tool, with covert “silent port scanning”
PictureBoxMike’s Forensic ToolsLists EXIF, and where available, GPS data for all photographs present in a directory. Export data to .xls or Google Earth KML format
PsToolsMicrosoftSuite of command-line Windows utilities
Shadow ExplorerShadow ExplorerBrowse and extract files from shadow copies
Simple File ParserChris MayhewGUI tool for parsing .lnk files, prefetch and jump list artefacts
SQLite ManagerMrinal Kant, Tarakant TripathyFirefox add-on enabling viewing of any SQLite database
StringsMicrosoftCommand-line tool for text searches
Structured Storage ViewerMiTecView and manage MS OLE Structured Storage based files
Switch-a-RooMike’s Forensic ToolsText replacement/converter/decoder for when dealing with URL encoding, etc
Windows File AnalyzerMiTeCAnalyse thumbs.db, Prefetch, INFO2 and .lnk files


Mac OS tools

Name
From
Description
AuditTwocanoes SoftwareAudit Preference Pane and Log Reader for OS X
Disk ArbitratorAaron BurghardtBlocks the mounting of file systems, complimenting a write blocker in disabling disk arbitration
Epoch Converter*Blackbag TechnologiesConverts epoch times to local time and UTC
FTK Imager CLI for Mac OS*AccessDataCommand line Mac OS version of AccessData’s FTK Imager
IORegInfoBlackbag TechnologiesLists items connected to the computer (e.g., SATA, USB and FireWire Drives, software RAID sets). Can locate partition information, including sizes, types, and the bus to which the device is connected
Mac Memory ReaderCyber MarshalCommand-line utility to capture physical RAM from Mac OS systems
PMAP Info*Blackbag TechnologiesDisplays the physical partitioning of the specified device. Can be used to map out all the drive information, accounting for all used sectors


Mobile devices

Name
From
Description
iPhone AnalyzerLeo Crawford, Mat ProudExplore the internal file structure of Pad, iPod and iPhones
ivMetaRobin WoodExtracts phone model and software version and created date and GPS data from iPhone videos.
Rubus*CCL ForensicsDeconstructs Blackberry .ipd backup files
SAFTSignalSEC CorpObtain SMS Messages, call logs and contacts from Android devices
WhatsApp ForensicsZena ForensicsExtract WhatApp messages from iOS and Android backups


Data analysis suites

Name
From
Description
AutopsyBrian CarrierGraphical interface to the command line digital investigation analysis tools in The Sleuth Kit (see below)
BacktrackBacktrackPenetration testing and security audit with forensic boot capability
CaineNanni BassettiLinux based live CD, featuring a number of analysis tools
DeftDr. Stefano Fratepietro and othersLinux based live CD, featuring a number of analysis tools
Digital Forensics FrameworkArxSysAnalyses volumes, file systems, user and applications data, extracting metadata, deleted and hidden items
Forensic ScannerHarlan CarveyAutomates ‘repetitive tasks of data collection’. Fuller description here
Paladin*SumuriUbuntu based live boot CD for imaging and analysis
SIFT*SANSVMware Appliance pre-configured with multiple tools allowing digital forensic examinations
The Sleuth KitBrian CarrierCollection of UNIX-based command line file and volume system forensic analysis tools
Ubuntu guideHow-To GeekGuide to using an Unbuntu live disk to recover partitions, carve files, etc.
Volatility FrameworkVolatile SystemsCollection of tools for the extraction of artefacts from RAM


File viewers

Name
From
Description
Microsoft PowerPoint 2007 ViewerMicrosoftView PowerPoint presentations
Microsoft Visio 2010 ViewerMicrosoftView Visio diagrams
VLCVideoLANView most multimedia files and DVD, Audio CD, VCD, etc.


Internet analysis

Name
From
Description
Chrome Session ParserCCL ForensicsPython module for performing off-line parsing of Chrome session files (“Current Session”, “Last Session”, “Current Tabs”, “Last Tabs”)
ChromeCacheViewNirsoftReads the cache folder of Google Chrome Web browser, and displays the list of all files currently stored in the cache
Cookie CutterMike’s Forensic ToolsExtracts embedded data held within Google Analytics cookies. Shows search terms used as well as dates of and the number of visits.
DumpzillaBusindreRuns in Python 3.x, extracting forensic information from Firefox, Iceweasel and Seamonkey browsers. See manual for more information.
Facebook Profile SaverBelkasoftCaptures information publicly available in Facebook profiles.
IECookiesViewNirsoftExtracts various details of Internet Explorer cookies
IEPassViewNirsoftExtract stored passwords from Internet Explorer versions 4 to 8
MozillaCacheViewNirsoftReads the cache folder of Firefox/Mozilla/Netscape Web browsers
MozillaCookieViewNirsoftParses the cookie folder of Firefox/Mozilla/Netscape Web browsers
MozillaHistoryViewNirsoftReads the history.dat of Firefox/Mozilla/Netscape Web browsers, and displays the list of all visited Web page
MyLastSearchNirsoftExtracts search queries made with popular search engines (Google, Yahoo and MSN) and social networking sites (Twitter, Facebook, MySpace)
PasswordFoxNirsoftExtracts the user names and passwords stored by Mozilla Firefox Web browser
OperaCacheViewNirsoftReads the cache folder of Opera Web browser, and displays the list of all files currently stored in the cache
OperaPassViewNirsoftDecrypts the content of the Opera Web browser password file, wand.dat
Web HistorianMandiantReviews list of URLs stored in the history files of the most commonly used browsers
Web Page Saver*Magnet ForensicsTakes list of URLs saving scrolling captures of each page. Produces HTML report file containing the saved pages


Registry analysis

Name
From
Description
ForensicUserInfoWoanwareExtracts user information from the SAM, SOFTWARE and SYSTEM hives files and decrypts the LM/NT hashes from the SAM file
Process MonitorMicrosoftExamine Windows processes and registry threads in real time
Registry DecoderUS National Institute of Justice, Digital Forensics SolutionsFor the acquisition, analysis, and reporting of registry contents
RegRipperHarlan CarveyRegistry data extraction and correlation tool
RegshotRegshotTakes snapshots of the registry allowing comparisons e.g., show registry changes after installing software
sbagTZWorksExtracts data from Shellbag entries
USB Device ForensicsWoanwareDetails previously attached USB devices on exported registry hives
USB Historian4DiscoveryDisplays 20+ attributes relating to USB device use on Windows systems
USBDeviewNirsoftDetails previously attached USB devices
User Assist Analysis4DiscoveryExtracts SID, User Names, Indexes, Application Names, Run Counts, Session, and Last Run Time Attributes from UserAssist keys
UserAssistDidier StevensDisplays list of programs run, with run count and last run date and time
Windows Registry RecoveryMiTecExtracts configuration settings and other information from the Registry


Application analysis

Name
From
Description
Dropbox Decryptor*Magnet ForensicsDecrypts the Dropbox filecache.dbx file which stores information about files that have been synced to the cloud using Dropbox
Google Maps Tile Investigator*Magnet ForensicsTakes x,y,z coordinates found in a tile filename and downloads surrounding tiles providing more context
KaZAlyserSanderson ForensicsExtracts various data from the KaZaA application
LiveContactsViewNirsoftView and export Windows Live Messenger contact details
SkypeLogViewNirsoftView Skype calls and chats


Abandonware

Name
From
Description
DCodeDigital DetectiveConverts various data types to date/time values
iPhone Backup BrowserRene DevichiView unencrypted backups of iPad, iPod and iPhones
ChromeAnalysisFoxton SoftwareAnalysis of internet history data generated using Google Chrome
IEHistoryViewNirsoftExtracts recently visited Internet Explorer URLs



[OS X Auditor] free Mac OS X computer forensics tool


OS X Auditor parses and hashes the following artifacts on the running system or a copy of a system you want to analyze:
  • the kernel extensions
  • the system agents and daemons
  • the third party's agents and daemons
  • the old and deprecated system and third party's startup items
  • the users' agents
  • the users' downloaded files
  • the installed applications
It extracts:
  • the users' quarantined files
  • the users' Safari history, downloads, topsites, HTML5 databases and localstore
  • the users' Firefox cookies, downloads, formhistory, permissions, places and signons
  • the users' Chrome history and archives history, cookies, login data, top sites, web data, HTML5 databases and local storage
  • the users' social and email accounts
  • the WiFi access points the audited system has been connected to (and tries to geolocate them)
It also looks for suspicious keywords in the .plist themselves.
It can verify the reputation of each file on:
  • Team Cymru's MHR
  • VirusTotal
  • Malware.lu
  • your own local database
It can aggregate all logs from the following directories into a zipball:
  • /var/log (-> /private/var/log)
  • /Library/logs
  • the user's ~/Library/logs
Finally, the results can be:
  • rendered as a simple txt log file (so you can cat-pipe-grep in them… or just grep)
  • rendered as a HTML log file
  • sent to a Syslog server

[NetworkMiner v1.4.1] Network Forensic Analysis Tool (NFAT)


NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows (but also works in Linux / Mac OS X / FreeBSD).

NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network.

NetworkMiner can also parse PCAP files for off-line analysis and to regenerate/reassemble transmitted files and certificates from PCAP files.



A professional edition of NetworkMiner is available for purchase from NETRESEC

The free edition is available here: NetworkMiner_1-4-1.zip.

NetworkMiner collects data (such as forensic evidence) about hosts on the network rather than to collect data regarding the traffic on the network. The main user interface view is host centric (information grouped per host) rather than packet centric (information showed as a list of packets/frames).

NetworkMiner can extract files and certificates transferred over the network by parsing a PCAP file or by sniffing traffic directly from the network. This functionality can be used to extract and save media files (such as audio or video files) which are streamed across a network from websites such as YouTube. Supported protocols for file extraction are FTP, TFTP, HTTP and SMB.


User credentials (usernames and passwords) for supported protocols are extracted by NetworkMiner and displayed under the “Credentials” tab. The credentials tab sometimes also show information that can be used to identify a particular person, such as user accounts for popular online services like Gmail or Facebook.

NetworkMiner Professional USB flash drive

Another very useful feature is that the user can search sniffed or stored data for keywords. NetworkMiner allows the user to insert arbitrary string or byte-patterns that shall be searched for with the keyword search functionality.


[NetSleuth] Open source Network Forensics And Analysis Tools

NetSleuth-Offline-Varied-2
NetSleuth identifies and fingerprints network devices by silent network monitoring or by processing data from PCAP files.

NetSleuth is an opensource network forensics and analysis tool, designed for triage in incident response situations. It can identify and fingerprint network hosts and devices from pcap files captured from Ethernet or WiFi data (from tools like Kismet).
It also includes a live mode, silently identifying hosts and devices without needing to send any packets or put the network adapters into promiscuous mode ("silent portscanning").
NetSleuth is a free network monitoring, cyber security and network forensics analysis (NFAT) tool that provides the following features:
  • An easy realtime overview of what devices and what people are connected to any WiFi or Ethernet network.
  • Free. The tool can be downloaded for free, and the source code is available under the GPL.
  • Simple and cost effective. No requirement for hardware or reconfiguration of networks.
  • “Silent portscanning” and undetectable network monitoring on WiFi and wired networks.
  • Automatic identification of a vast array of device types, including smartphones, tablets, gaming consoles, printers, routers, desktops and more.
  • Offline analysis of pcap files, from tools like Kismet or tcpdump, to aid in intrusion response and network forensics.