Practical Digital Forensics Scenario
Scenario Setup
Notes
Memory Analysis with Volatility v3
Identifying Memory Profile
python vol.py -q -f ..\memdump\PhysicalMemory.raw windows.infoVariable
Value
Detecting Injected Code
Identifying Running Processes
Listing Processes
PID
PPID
ImageFileName
CreateTime
SessionId
Viewing Process Tree
Identifying Process Command Lines
PID
Process
Args
Dumping Process Memory & Leveraging YARA
Scanning with YARA
Identifying Loaded DLLs
Identifying Handles
Identifying Network Artifacts
Disk Image/Rapid Triage Data Examination & Analysis
Searching for Keywords with Autopsy
Identifying Web Download Information & Extracting Files
Analyzing Cobalt Strike Beacon Configuration
Persistence Mechanisms with Autoruns
File Hash Identification & VirusTotal
Scheduled Tasks & Timestomping Analysis
SRUM Data Analysis
Windows Event Logs Analysis with Chainsaw
Prefetch Files Analysis
USN Journal Analysis
Disk Image/Rapid Triage Data Examination & Analysis
Analyzing Rapid Triage Data - MFT/pagefile.sys (MFTECmd/Autopsy)
Constructing an Execution Timeline with Autopsy
The Actual Attack Timeline
Last updated