Collection of scripts for automating various forensics tasks.
Mount all VMDK files from a given directory
Required Packages:
- afflib-tools (
sudo apt install afflib-tools
)
Usage
Usage: mount_vmdk.sh <dir with vmdk files>
Extract different windows artefacts from a mounted source:
- Execution of Regripper modules, incl. timeline from registry hives
- Execution of regdump for additional timeline
- Timeline from windows event logs (via evtx2bodyfile)
- Windows Event Log Processing with hayabusa
- Timeline from MFT and UsnJrnl (if exists) (via mft2bodyfile)
- Timeline from prefetch files, if they exists (via pf2bodyfile)
Required Tools:
Install the following tools to run the script successfully:
- dfir-toolkit (
cargo install dfir-toolkit
) - mft2bodyfile (
cargo install mft2bodyfile
) - Regripper -> if necessary adjust the variable "RIP" in the windows_timelines.sh script
- squashfs (
sudo apt install squashfs-tools
) - hayabusa -> or you can found a precompiled executable in the 'hayabusa' folder
Usage
Usage: windows-timelines.sh [options] [<windows_mount_dir>] [<output_dir>]
Options:
-t <timezone> convert timestamps from UTC to the given timezone
-e extract event logs in squshfs container
-m parse mft (expect $MFT in Windows Root)
-ha <Hayabusa_Folder> execute hayabusa (the rules should be in the same folder as the executable)
-i switch to case-insensitive (necessary in case of dissect acquire output)
-l list available timezones
-h show this help information
Mounting of the SquashFS container can be done with sudo mount -t squashfs evtx.sqfs <mnt_dir>