Basic Forensic Methodology
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
This isn't necessary the first step to perform once you have the image. But you can use this malware analysis techniques independently if you have a file, a file-system image, memory image, pcap... so it's good to keep these actions in mind:
Malware Analysisif you are given a forensic image of a device you can start analyzing the partitions, file-system used and recovering potentially interesting files (even deleted ones). Learn how in:
Partitions/File Systems/CarvingDepending on the used OSs and even platform different interesting artifacts should be searched:
Windows ArtifactsLinux ForensicsDocker ForensicsIf you have very suspicious file, then depending on the file-type and software that created it several tricks may be useful. Read the following page to learn some interesting tricks:
Specific Software/File-Type TricksI want to do a special mention to the page:
Browser ArtifactsKeep in mind the possible use of anti-forensic techniques:
Anti-Forensic TechniquesLearn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)