Mindmap - Memory Forensics-Intro
Mindmap - Memory Forensics-Intro
Velociraptor
Technology types used for Remote IR tooling
gives analyst full remote access to disk and memory
provides a direct iSCSI connection between an analysis system and target system for
low-level examinations Remote IR tooling Primary goal is to rapidly detect and mitigate ongoing attacks.
FMC: F-Response Management Console for collecting data Memory Forensics Threat Hunting
Console to interact with a limitless number of target machines
for IR Host-based Continuous Monitoring Anomaly Detection
A secondory connectivity tool allowing for an unlimited number of remote examiners F-Response Accelerator IT Support
as well as optional HIPPAA compliant and industry standard AES 256-bit encryption
Pattern Analysis
Completely Vendor Neutral F-Response
F-Response Enterprise Collection point of Endpoints and Network activities Historical Searches for hunting and remediation
reduces identification and containment times and increases the cost to the adversary
collect artifects of over 10 different OS systems as their tradecraft is discovered
kape.exe --tsoource <drive/dir> --target <what data to collect .tkape file> -- Scaling of monitoring and analysis
tdest <dest folder> KAPE
- vss: find,mount, and search all available Volumne Shadow Copies on --tsource
- vhdx: creates a virtual hard disk
- debug: enables debug messages