% forensics, dfir, volatility, memory, incident-response # Volatility 3 - identify OS vol -f windows.info # Volatility 3 - process list vol -f windows.pslist # Volatility 3 - process tree vol -f windows.pstree # Volatility 3 - hidden processes vol -f windows.psscan # Volatility 3 - network connections vol -f windows.netscan # Volatility 3 - command line history vol -f windows.cmdline # Volatility 3 - DLLs for process vol -f windows.dlllist --pid # Volatility 3 - malware detection vol -f windows.malfind # Volatility 3 - registry hives vol -f windows.registry.hivelist # Volatility 3 - dump process memory vol -f windows.memmap --pid --dump # Volatility 2 - image info (legacy) volatility -f imageinfo # Volatility 2 - with profile volatility -f --profile= pslist # Disk imaging with dd sudo dd if= of= bs=64K conv=noerror,sync status=progress # Disk imaging with dcfldd (forensic) sudo dcfldd if= of= hash=md5,sha256 hashlog=hashes.txt # Mount forensic image read-only sudo mount -o ro,loop,noexec # Mount with offset (partition) sudo mount -o ro,loop,offset=$((512*)) # File carving with foremost foremost -i -o # File recovery with photorec photorec # File recovery with scalpel scalpel -c /etc/scalpel/scalpel.conf -o # Timeline with plaso log2timeline.py # Parse plaso timeline psort.py -o l2tcsv -w timeline.csv # Extract strings from binary strings -n 8 strings -e l # Calculate file hashes md5sum && sha256sum # Chainsaw - Windows event log hunting chainsaw hunt --rules # Parse Windows prefetch PECmd.exe -d C:\Windows\Prefetch --csv # Registry analysis with RegRipper rip.pl -r -p all # KAPE collection kape.exe --tsource C: --tdest --target !SANS_Triage # Autopsy (GUI forensics) autopsy $ memory_dump: find . -name "*.raw" -o -name "*.mem" -o -name "*.dmp" 2>/dev/null $ source_device: lsblk -dpno NAME | head -5 $ output_file: echo "disk.raw" $ image_file: find . -name "*.raw" -o -name "*.dd" -o -name "*.img" 2>/dev/null $ mount_point: echo "/mnt/evidence" $ output_dir: echo "output" $ pid: echo "" $ profile: echo "Win10x64_19041" $ sector_offset: echo "2048" $ evtx_dir: echo "/path/to/evtx"