I've decided to halt development of this PowerShell module and instead leverage PowerForensics.
If you're interested in learning more of that project, the link is below: https://github.com/Invoke-IR/PowerForensics
PowerShell scripts for parsing forensic artifacts in the Windows operating system, and the documentation I've created along the way.
Information regarding data structures have been pulled from a number of sources including the ForensicsWiki, Harlan Carvey's RegRipper code, and various whitepapers and forensic professionals. I have done my best to cite all of my sources in each of the scripts, and in this readme. I apologize for any I've forgotten.
Full Version | Lite Version (for Kansa or Invoke-LiveResponse) |
---|---|
Invoke-AppCompatCacheParser.ps1 | Get-AppCompatCache.ps1 |
Invoke-JavaCacheParser.ps1 | Get-JavaCache.ps1 |
Invoke-PrefetchParser.ps1 | Get-Prefetch.ps1 |
Get-BootRecord.ps1 | |
Get-PartitionTable.ps1 | |
Get-VolumeBootRecord.ps1 |
- Provide scripts that can be run on Windows systems without requiring any additional software download/installation
- Provide scripts that can be run against live Windows systems
- Provide scripts that can be run against most Windows systems
- PowerShell Version 3 if possible
- Lowest version of .NET possible, but most everything I find has at least 4
- Provide scripts that can easily be run, or modified to run, in a PowerShell session.
Thanks to Harlan Carvey and his RegRipper tool for providing a lot of help working through the data structures (and for providing a great tool): https://github.com/keydet89/RegRipp2.8 Thanks to the Forensics Wiki: http://forensicswiki.org/wiki/Main_Page