Basic Forensic Methodology

Reading time: 2 minutes

tip

Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks

Creating and Mounting an Image

{{#ref}} ../../generic-methodologies-and-resources/basic-forensic-methodology/image-acquisition-and-mount.md {{#endref}}

Malware Analysis

This isn't necessary the first step to perform once you have the image. But you can use this malware analysis techniques independently if you have a file, a file-system image, memory image, pcap... so it's good to keep these actions in mind:

{{#ref}} malware-analysis.md {{#endref}}

Inspecting an Image

if you are given a forensic image of a device you can start analyzing the partitions, file-system used and recovering potentially interesting files (even deleted ones). Learn how in:

{{#ref}} partitions-file-systems-carving/ {{#endref}}

Depending on the used OSs and even platform different interesting artifacts should be searched:

{{#ref}} windows-forensics/ {{#endref}}

{{#ref}} linux-forensics.md {{#endref}}

{{#ref}} docker-forensics.md {{#endref}}

Deep inspection of specific file-types and Software

If you have very suspicious file, then depending on the file-type and software that created it several tricks may be useful.
Read the following page to learn some interesting tricks:

{{#ref}} specific-software-file-type-tricks/ {{#endref}}

I want to do a special mention to the page:

{{#ref}} specific-software-file-type-tricks/browser-artifacts.md {{#endref}}

Memory Dump Inspection

{{#ref}} memory-dump-analysis/ {{#endref}}

Pcap Inspection

{{#ref}} pcap-inspection/ {{#endref}}

Anti-Forensic Techniques

Keep in mind the possible use of anti-forensic techniques:

{{#ref}} anti-forensic-techniques.md {{#endref}}

Threat Hunting

{{#ref}} file-integrity-monitoring.md {{#endref}}

tip

Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks