Quantcast
Channel: Security Tools – Security List Network™
Viewing all articles
Browse latest Browse all 443

PowerForensics v2.0 – PowerShell Digital Forensics.

$
0
0

Changelog PowerForensics v2.0:
* Reorganized and Unified
– Unified PowerForensics, PowerForensicsCore, and PowerForensicsv2
– Working on HFS+ and Ext4 parsing
* Consolidated PowerForensics and PowerForensicsCore Modules
* Updates PowerForensics CoreCLR DLL.

PowerForensics v2.0: Consolidated PowerForensics and PowerForensicsCore Modules.

PowerForensics v2.0:
Consolidated PowerForensics and PowerForensicsCore Modules.

PowerForensics is a PowerShell digital forensics framework. It currently supports NTFS and is in the process of adding support for the ext4 file system.

with Cmdlets Function:
Boot Sector

Get-MBR - parses the first sector of the hard drive and returns a MasterBootRecord object
Get-GPT - parses the first sector of the hard drive and returns a GuidPartitionTable object
Get-BootSector - parses the first sector of the hard drive and returns the appropriate boot sector (MBR or GPT)
Get-PartitionTable - parses the first sector of the hard drive and returns the partition table

New Technology File System (NTFS)

Get-FileRecord - returns Master File Table entries
Get-FileRecordIndex - returns a file's MFT record index number
Get-DeletedFile - returns Master File Table entries of files that are marked as deleted
Get-AttrDef - parses the $AttrDef file to return definitions of MFT Attributes 
Get-BadCluster - parses the $BadClus file to check for damaged clusters
Get-Bitmap - parses the $Bitmap file to determine if a cluster is marked as in use
Get-UsnJrnl - parses the $UsnJrnl file's $J data attribute and returns USN Journal Entries
Get-UsnJrnlInformation - parses the $UsnJrnl file's $MAX data attribute and returns USN Journal Metadata
Get-VolumeBootRecord - parses the $Boot file located in the first sector of the volume and returns the VolumeBootRecord object
Get-VolumeInformation - parses the $Volume file's $VOLUME_INFORMATION attribute and returns a VolumeInformation Object
Get-VolumeName - parses the $Volume file's $VOLUME_NAME attribute and returns the VolumeName

Extended File System 4 (ext4)

Get-Superblock - returns the ext4 SuperBlock object
Get-BlockGroupDescriptor - returns the Block Group Descriptor Table entries
Get-Inode - returns the Inode Table entries

Windows Artifacts

Get-VolumeShadowCopy - returns Win32_ShadowCopy objects
Get-Prefetch - parses the binary structure of Windows Prefetch files and returns a custom Prefetch object
Get-ScheduledJobRaw - parses the binary structure of Scheduled Jobs (at jobs) and returns a custom ScheduledJob object

Utilities.

Invoke-DD - provides a bit for bit copy of a specified device
Copy-FileRaw - creates a copy of a file from its raw bytes on disk 
Get-ChildItemRaw - returns a directory's contents by parsing the MFT structures
Get-ContentRaw - gets the content of a file from its raw bytes on disk
Get-Hash - returns a cryptographic hash for the specified file
Get-Timezone - determines a system's timezone based on the registry setting

Formatters:

Format-Hex - Formats byte array output into a hexdump

Module Installation:

Be sure git has been install on your windows, then Open cmdlet:
git clone https://github.com/Invoke-IR/PowerForensics
cd cd PowerForensics/Modules/PowerForensics/
Import-Module ./PowerForensics.psd1
Get-Command -Module PowerForensics

Build PowerForensics.dll:
right click PowerForensics.sln open with Visual Studio, then build Solution
RUNDLL.EXE PowerForensics.dll [Your path]

Source: https://github.com/Invoke-IR | Our Post Before


Viewing all articles
Browse latest Browse all 443

Trending Articles