https://github.com/cuhsat/fact
Forensic Artifacts Collecting Toolset
https://github.com/cuhsat/fact
artifacts collecting dfir digital-forensics digital-forensics-incident-response digitalforensics forensic-artefact-search forensic-artifact forensic-artifacts forensicartifacts go golang incident-response incident-response-tooling incidentresponse infosec infosectools toolkit toolset windows
Last synced: 2 months ago
JSON representation
Forensic Artifacts Collecting Toolset
- Host: GitHub
- URL: https://github.com/cuhsat/fact
- Owner: cuhsat
- License: mit
- Created: 2024-05-17T15:12:42.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2024-05-28T16:04:07.000Z (about 1 year ago)
- Last Synced: 2024-05-29T07:09:37.141Z (about 1 year ago)
- Topics: artifacts, collecting, dfir, digital-forensics, digital-forensics-incident-response, digitalforensics, forensic-artefact-search, forensic-artifact, forensic-artifacts, forensicartifacts, go, golang, incident-response, incident-response-tooling, incidentresponse, infosec, infosectools, toolkit, toolset, windows
- Language: Go
- Homepage:
- Size: 179 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Forensic Artifacts Collecting Toolkit
A basic shell pipeline for extracting forensic artifacts from disk images. Relevant artifacts will be processed and provided in [ECS](https://www.elastic.co/guide/en/ecs/current/index.html) format for ingestion with [Logstash](https://www.elastic.co/de/logstash).
```sh
# fmount image.dd | ffind | flog -D logstash
```## Tools
### fmount
Mount disk images for read-only processing.```sh
# fmount [-ruszqhv] [-H CRC32|MD5|SHA1|SHA256] [-V SUM] [-B KEY] [-D DIR] IMAGE
```Available options:
- `-D` Mount point
- `-B` BitLocker key
- `-H` Hash algorithm
- `-V` Verify hash sum
- `-r` Recovery key ids
- `-u` Unmount image
- `-s` System partition only
- `-z` Unzip image
- `-q` Quiet mode
- `-h` Show usage
- `-v` Show versionSupported image types on Linux systems:
- [vdi](https://forensics.wiki/virtual_disk_image_%28vdi%29/)
- [vpc](https://cloud.ibm.com/docs/vpc?topic=vpc-planning-custom-images)
- [vhdx](https://forensics.wiki/virtual_hard_disk_%28vhd%29/)
- [vmdk](https://forensics.wiki/vmware_virtual_disk_format_%28vmdk%29/)
- [parallels](https://github.com/libyal/libphdi/blob/main/documentation/Parallels%20Hard%20Disk%20image%20format.asciidoc)
- [qcow2](https://forensics.wiki/qcow_image_format/)
- [qcow](https://forensics.wiki/qcow_image_format/)
- [raw](https://forensics.wiki/raw_image_format/)Required system commands:
- [dislocker](https://github.com/Aorimn/dislocker)
- [qemu-nbd](https://www.qemu.org/docs/master/tools/qemu-nbd.html)
- [lsblk](https://man7.org/linux/man-pages/man8/lsblk.8.html)
- [mount](https://man7.org/linux/man-pages/man8/mount.8.html)
- [umount](https://man7.org/linux/man-pages/man8/umount.8.html)### ffind
Find forensic artifacts in mount points or on the live system.```sh
$ ffind [-rcsuqhv] [-H CRC32|MD5|SHA1|SHA256] [-C CSV] [-Z ZIP] [MOUNT ...]
```Available options:
- `-H` Hash algorithm
- `-C` CSV listing name
- `-Z` Zip archive name
- `-r` Relative paths
- `-c` Volume shadow copy
- `-s` System artifacts only
- `-u` User artifacts only
- `-q` Quiet mode
- `-h` Show usage
- `-v` Show versionSupported artifacts for Windows 7+ systems:
- [System Active Directory](https://forensics.wiki/active_directory/)
- [System Registry Hives](https://forensics.wiki/windows_registry/)
- [System Prefetch Files](https://forensics.wiki/prefetch/)
- [System Event Logs](https://forensics.wiki/windows_event_log_%28evt%29/)
- [System AmCache](https://forensics.wiki/amcache/)
- [User Registry Hives](https://forensics.wiki/windows_registry/)
- [User Jump Lists](https://forensics.wiki/jump_lists/)
- [User Browser Histories](https://forensics.wiki/google_chrome/)### flog
Log forensic artifacts as JSON in [ECS](https://www.elastic.co/guide/en/ecs/current/index.html) format.```sh
$ flog [-pqhv] [-D DIRECTORY] [FILE ...]
```Available options:
- `-D` Log directory
- `-p` Pretty JSON
- `-q` Quiet mode
- `-h` Show usage
- `-v` Show versionRequired system commands:
- [dotnet](https://dotnet.microsoft.com/en-us/download/dotnet/6.0)
> Use `make tools` to install [Eric Zimmerman's Tools](https://ericzimmerman.github.io/#!index.md).
Supported artifacts for Windows 7+ systems:
- [System Event Logs](https://forensics.wiki/windows_event_log_%28evt%29/)
- [User JumpLists](https://forensics.wiki/jump_lists/)
- [User ShellBags](https://forensics.wiki/shell_item/)
- [User Browser Histories](https://forensics.wiki/google_chrome/)## License
Released under the [MIT License](LICENSE).