Basic Forensic Methodology
In this section of the book we are going to learn about some useful forensics tricks. We are going to talk about partitions, file-systems, carving, memory, logs, backups, OSs, and much more.
So if you are doing a professional forensic analysis to some data or just playing a CTF you can find here useful interesting tricks.
Creating and Mounting an Image
Image Adquisition & MountMalware Analysis
This isn't necessary the first step to perform once you have the image. But you can use this malware analysis techniques independently if you have a file, a file-system image, memory image, pcap... so it's good to keep these actions in mind:
Malware AnalysisInspecting an Image
if you are given a forensic image of a device you can start analyzing the partitions, file-system used and recovering potentially interesting files (even deleted ones). Learn how in:
Partitions/File Systems/CarvingDepending on the used OSs and even platform different interesting artifacts should be searched:
Windows ArtifactsLinux ForensicsDocker ForensicsDeep inspection of specific file-types and Software
If you have very suspicious file, then depending on the file-type and software that created it several tricks may be useful. Read the following page to learn some interesting tricks:
Specific Software/File-Type TricksI want to do a special mention to the page:
Browser ArtifactsMemory Dump Inspection
Memory dump analysisPcap Inspection
Pcap InspectionAnti-Forensic Techniques
Keep in mind the possible use of anti-forensic techniques:
Anti-Forensic TechniquesLast updated