Sift Cheatsheet PDF
Sift Cheatsheet PDF
SIFT
Step 1 Attach Local or Remote System Drive File System Layer Tools (Partition Information) WORKSTATION
# ewfmount system-name.E01 /mnt/ewf
fsstat -Displays details about the file system Cheat Sheet v3.0
Step 2 Mount VSS Volume # fsstat imagefile.dd SANS DFIR
# cd /mnt/ewf http://computer-forensics.sans.org
# vshadowmount ewf1 /mnt/vss Data Layer Tools (Block or Cluster) http://blogs.sans.org/computer-forensics
Step 3 Run fls across ewf1 mounted image blkcat -Displays the contents of a disk block
# cd /mnt/ewf # blkcat imagefile.dd block_num
# fls r m C: ewf1 >> /cases/vss- Purpose
blkls -Lists contents of deleted disk blocks
bodyfile # blkls imagefile.dd > imagefile.blkls DFIR Forensic Analysts are on the front lines
blkcalc -Maps between dd images and blkls results of computer investigations. This guide aims
Step 4 Run fls Across All Snapshot Images
# cd /mnt/vss # blkcalc imagefile.dd -u blkls_num to support Forensic Analysts in their quest
# for i in vss*; do fls -r m C: $i to uncover the truth.
>> /cases/vss-bodyfile; done blkstat -Display allocation status of block
# blkstat imagefile.dd cluster_number
How To Use This Sheet
Step 5 De-Duplicate Bodyfile using sort and uniq
# sort /cases/vss-bodyfile | uniq > When performing an investigation it is helpful to be
/cases/vss-dedupe-bodyfile MetaData Layer Tools (Inode, MFT, or Directry Entry) reminded of the powerful options available to the
investigator. This document is aimed to be a
Step 6 Run mactime Against De-Duplicated Bodyfile ils -Displays inode details reference to the tools that could be used. Each of
# mactime d b /cases/vss-dedupe- # ils imagefile.dd these commands runs locally on a system.
bodyfile z EST5EDT MM-DD-YYYY..MM-
DD-YYYY > /cases/vss-timeline.csv istat -Displays information about a specific inode This sheet is split into these sections:
# istat imagefile.dd inode_num Mounting Images
icat -Displays contents of blocks allocated to an inode Shadow Timeline Creation
Memory Analysis # icat imagefile.dd inode_num Mounting Volume Shadow Copies
Memory Analysis
ifind -Determine which inode contains a specific block
# ifind imagefile.dd d block_num Recovering Data
vol.py command f
Creating Supert Timelines
/path/to/windows_xp_memory.img --
String Searches
profile=WinXPSP3x86
Filename Layer Tools The Sleuthkit
[Supported commands] Stream Extraction
connscan Scan for connection objects fls -Displays deleted file entries in a directory inode
files list of open files process # fls -rpd imagefile.dd
imagecopy Convert hibernation file
procdump Dump process ffind -Find the filename that using the inode TIME TO GO HUNTING
pslist list of running processes # ffind imagefile.dd inode_num
sockscan Scan for socket objects
Mounting DD Images Creating Super Timelines Registry Parsing - Regripper
Forensic Analysis
mount -t fstype [options] image mountpoint # log2timeline r p z <system-timezone> # rip.pl r <HIVEFILE> fCheat
<HIVETYPE>
Sheet
f <type-input> /mnt/windows_mount w
[Useful Options]
Forensics
image can be a disk partition or dd image file timeline.csv
-r Registry hive file to parse <HIVEFILE>
file|dir artifact target -f Use <HIVETYPE> (e.g. sam, MANDIANT
security,
[Useful Options]
-f <TYPE-INPUT> input format software, system, ntuser) [email protected]
ro mount as read only -o <TYPE-OUTPUT> output format: default csv file 703.683.3141
loop mount on a loop device -l List all plugins http://www.mandiant.org
-w <FILE> append to log file
noexec do not execute files -z <SYSTEM TIMEZONE> # rip.pl r
-Z <OUTPUT TIMEZONE> /mnt/windows_mount/Windows/System32/config/SAM f sam
ro mount as read only
-r recursive mode > /cases/windowsforensics/SAM.txt
loop mount on a loop device -p preprocessors
offset=<BYTES> logical drive mount
show_sys_files show ntfs metafiles # mount o Recover Deleted Registry Keys
streams_interface=windows use ADS loop,ro,show_sys_files,streams_interface=windows
imagefile.dd /mnt/windows_mount
# deleted.pl <HIVEFILE>
Example: Mount an image file at mount_location # log2timeline z EST5EDT p r -f win7
/mnt/windows_mount -w /cases/bodyfile.txt # deleted.pl
# mount o
loop,ro,show_sys_files,streams_interface=window # l2t_process b /cases/bodyfile.txt w
/mnt/windows_mount/Windows/System32/config/SAM >
s imagefile.dd /mnt/windows_mount whitelist.txt 04-02-2012 > timeline.csv /cases/windowsforensics/SAM_DELETED.txt