Skip to content

padfoot999/magneto

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

magneto

Incident response and forensic tool

Thank you for your interest. Please contact author for other essential files required to run this tool.

Features:

  1. Parse and process triage output files, saving them in pgsql
  2. Process memory captures using volatility
  3. Parse and process volatility output files, saving them in pgsql
  4. Perform baseline, long tail analysis and correlation using above data, stored in pgsql

Step by Step Guide to power up MAGNETO on Windows

  1. Download Magneto Files

  2. Install Python 2.7 (32 bit). Remember to check the box to configure Python Path in Windows System Environment Variables, or do it yourself.

  3. Install all necessary python modules using pip.

C:\Python27\Scripts\pip.exe install argparse bs4 chardet fuzzywuzzy netaddr numpy openpyxl pandas psycopg2 requests scandir sqlalchemy stem win_inet_pton xlrd xlwings
  1. Install PostgreSQL
Database admin account: postgres
Password: (set your own password)
  1. Launch pgadmin and connect to local PostgreSQL server on 127.0.0.1. Create database "magneto"

  2. Make sure that workstation has Powershell v4.0 and above installed, follow this table.

  3. Install Strawberry Perl.

  4. Install Perl modules by typing command prompt:

cpan
install Parse::Win32Registry Regexp::Common Regexp::Common::time
  1. Configure the system environment variable PERL5LIB in command prompt:
setx PERL5LIB c:\path\to\magneto\Tools\RegRipper
  1. Download the NVD XML 2.0 Schema feeds from NIST and unzip them in nvd_cache

  2. Download the NirLauncher Package and unzip in Tools/nirsoft_package

Triage Post-Processing

Suggested Steps

  1. Launch Ubuntu VM and process Memory (.raw) file using PROCESS_memory.py file. Save the output into the Evidence folder within each Incident folder.

  2. Process Event Logs using Windows Powershell (WINTEL.ps1) file by running this in a powershell console:

WINTEL_WindowsLogParser.ps1 -logPath c:\path\to\individual_triage\Evidence\Logs -project PROJECTNAME
  1. Run submit.py
python submit.py -d c:\path\to\parent\ -p PROJECTNAME
OR
python submit.py -d c:\path\to\parent\individual_triage -p PROJECTNAME
  1. Generate output (as required)
python OUTPUT_baselineCSV.py -p PROJECTNAME
python OUTPUT_baselineXLSM.py -p PROJECTNAME
python OUTPUT_baselineXLSX.py -p PROJECTNAME
and other OUTPUT_* python modules

About

Incident response and forensic tool

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published