Tools


This page contains a list of tools I have used/been exposed to throughout forensics, with a short description of the usefullness of each.

Fundamentals

  • grep
  • sed
  • tr

Command-line Utilities

Vanilla Tools

  • dd performs a 1:1/byte-for-byte copy of a file/folder

Disk Structures/Partition Tables

  • lsblk -a
  • df -a

macOS-specific

  • ls -l@ will display all ‘forks’ or Alternate Data Stream files in the directory
  • hdiutil & diskutil can be used for mounting and managing disk images/partitions

Complete Tooling Environments

Full Toolsets

  • Sleuthkit Suite
    • SIFT - The ‘Kali’ of forensics
    • Autopsy
    • sleuthkit commandline tools is what underpins Autopsy. See all the TSK commands for details.
  • RedLine - a similar tool to Autopsy (Windows only)

Memory Analysis

  • Volatility
  • Rekall

File Scraping

Unallocated Cluster Tools

  • Photorec - Windows-based unallocated file carving tool
  • bulk_extractor - linux-based ‘string’/regex extractor tool. Extracts string artefacts from the file.

Note: I will endeavour to add links to html man pages for the above tools where available.

Windows Analysis Tools

Registry Analysis

  • regedit
  • MiTeC Windows Registry Recovery
  • RegRipper
    • SAM plugin for inspecting user information