Advertisement
edusatoe

Experto Forense

Feb 12th, 2024 (edited)
19
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.25 KB | None | 0 0
  1. --------------- Clase 1
  2. Hashes y colisiones
  3. Imágenes https://developer.microsoft.com/en-us/windows/downloads/virtual-machines/
  4. Clonado bit a bit
  5. Modo forensic en Kali
  6. Data Duplicator dd if= of=
  7. Clonado con FTK Imager (disk y RAM)
  8. Magnet
  9.  
  10. ------- Volatility3
  11. https://blog.onfvp.com/post/volatility-cheatsheet/
  12. https://book.hacktricks.xyz/generic-methodologies-and-resources/basic-forensic-methodology/memory-dump-analysis/volatility-cheatsheet
  13. https://atenea.ccn-cert.cni.es/challenges?category=anlisis-de-memoria
  14.  
  15. Instalación y requisitos
  16. Doc https://volatility3.readthedocs.io/en/latest/
  17. py vol.py -f mem plugin
  18. windows.pslist - Procesos
  19. windows.pstree
  20. windows.netscan - Estado de red
  21. windows.filescan (muchos ficheros, volcar a file)
  22. windows.dumpfiles.DumpFiles --pid --virtaddr
  23. windows.sessions
  24. windows.cmdline.CmdLine
  25. windows.info
  26.  
  27. NO SALE
  28. ./vol.py -f file.dmp windows.registry.printkey.PrintKey --key "Software\Microsoft\Windows NT\CurrentVersion"
  29.  
  30. ASI SI
  31. py .\vol.py -f 'C:\forense\MemoryDumpWH.raw' -o .\registro windows.registry.hivelist.HiveList --dump
  32. Analizar los registros con HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\
  33.  
  34. TOOLS https://ericzimmerman.github.io/#!index.md
  35. ------- MFT
  36. MFT Explorer
  37. MFT Browser
  38.  
  39.  
  40.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement