This is an attempt to collect all the most frequently used commands for forensic analysis.
There are numerous tools available for collecting and analysing artefacts and evidence. I will provide an overview, relevant links, or even comparison charts, depending on the tools.
Run a tool to collect all the artefacts for this OS (for example, autorunc.exe for Windows) on the machines in question. I use CSV format as output whenever possible because it can be imported in a SIEM, TimeLine Explorer (Windows) or Numbers/Excel/Google Sheets. I prefer the last option because its pivoting functionality is much easier to deploy.
π If the file doesnβt have an image path (File not found), itβs likely it was moved/deleted and thus is not an active threat. Whatβs suspicious?
First of all, data that is collected for analysis within the cloud needs to be handled properly as well.
Here I will keep the list of useful tools for forensics, their advantages and disadvantages.
This is about … .