All Posts

RITA - An open source framework for network traffic analysis.
The framework ingests Zeek Logs in TSV or JSON format, and currently supports the following major features: Beaconing Detection: Search for signs of beaconing behavior in and out of your network. Long Connection Detection : Easily see connections that have communicated for long periods of time. DNS Tunneling Detection : Search for signs of DNS based covert channels. Threat Intel Feed Checking : Query threat intel feeds to search for suspicious domains and hosts. Check out t

Untitled Goose Tool
Much useful Incident Response (IR) tool released by CISA to run a full investigation against a customer’s Azure Active Directory...

Magnet RESPONSE tool
The acquisition of volatile data in the IR process is very important and Incident Responders used to execute separate tools and commands...

WinPMEM free RAM capture tool
Adding to the list of free RAM capture tools -WinPMEM — an open-source memory acquisition tool. Download from https://lnkd.in/g8eUvPM8...

Important Windows PowerShell Commands in Forensic Investigation
Start Windows PowerShell (Run as Administrator) Lists all the established TCP connections in the system and output to text...

Chrome-URL useful for Incident Responders
Though Chrome-URL list is huge, I have selected few from the list which can be useful for Incident Responders to quickly gather...

Track registry changes-Digital Forensics and Incident Response
Track registry changes (useful for remote collection and analysis as a part of IR Process) In this example, we are tracking changes in...

Windows Registry Forensic Analysis
Time Zone Information:SYSTEM\CurrentControlSet\Control \TimeZoneInformation Network Interfaces and Past Networks:SYSTEM\CurrentControlSet...

An important location in Windows to look for deleted records. Windows search index database forensics.
Analyse Windows.edb to parse normal records and recover deleted records. Step 1 : (Stop SearchIndexer in order to copy windows.edb...

Data Exfiltration Over Bluetooth.
History of Bluetooth Registry Entries to investigate (MAC address of connected bluetooth devices) After that use free utility called...

ETL File Analysis
There are events that carry information about shell Items, network shares, apps that require privileges, RunKey information etc.; When...

Get hash of all files in a folder and export it to txt file using PowerShell. Run this command in PowerShell and remember to change the folder path.
During incident response process, it is important to quickly collect hash value of all files in a folder. Use PowerShell as administrator...

Wireshark - most common type of filtering
Filter by IP address: displays all traffic from IP, be it source or destination ip.addr == 192.168.1.1 Filter by source address: display...

Obtain hash of all running executables in Win OS using “CertUtil” while conducting Live Forensics.
CertUtil in windows is mostly related to managing and viewing certificates, but very useful for getting hash value of any file using...

Digital Forensics: Active Directory Ntds.dit
The Ntds.dit file is an Active Directory database that maintains information about user objects, groups, and group membership. It...
