Post

Forensics (and Steganography)

Methodology

  1. Description and hints/try to determine topic
  2. file
  3. exiftool/metadata
  4. strings -t x -w
  5. Carving

Scripts

Tools

Practice

Links

Topics

TSK

Volatility

FS

  • Rekall
  • Redline
  • DiskEditor
  • Testdisk
  • e2fsck
  • mke2fs
  • debugfs

Mounting

  • mount [file] -t [type] -o loop,ro,noexec /mnt/[name]

NTFS

Windows

Linux Logs

  • aureport/ausearch

Carving

  • binwalk
  • Update configuration files for tailored results for scalpel and foremost
  • scalpel
  • foremost
  • PhotoRec

PCAPs

General Steg

Steg methods to check

Images

  • ImageMagick
  • GIMP
  • PIL
  • LSBSteg
  • QuickStego
  • For data hidden in pixels, check both row-major and column-major orders

PNG

JPG

BMP

GIF

Video

  • Example
    • opencv-python
  • Data can be hidden in frames, streams, etc

Audio

  • AudioStego
  • DeepSound

WAV

MP3

PDF

ZIP

  • -F (fix zipfile) -FF (really fix) --out output.zip
  • zipdetails/zipinfo
  • Password cracking
1
2
3
4
run\zip2john.exe [zipfilename] > hash
run\john.exe --pot=pot --wordlist=[dictionary] hash
// password in pot
unzip -P [password] [zipfilename]

Microsoft Office

Password Cracking

HAR

This post is licensed under CC BY 4.0 by the author.