Design as a script based live forensics tools that can be used by forensics investigator with zero knowledge.
Conduct live evidence extraction before system reboot
Make use of USB as the media
Used for carrying non-intrusive volatile evidence extraction
According to Forensics Practice Principles at the Scene of Crime
Find as much as evidence as possible
Reconnaissance
Preserve the evidence as good as possible
Reliability
Identify related evidence as close as possible
Relevancy
⚫ Not to cause unnecessary input to the target machine ⚫ Collect the volatile data including network, and memory information for investigation ⚫Documentation of execution flow for court presentation ⚫ Backup passwords from the machine for future forensic purpose.
Volatile information to be collected
⚫ Date, time
⚫ Volatile memory
⚫ clipboard
⚫ Network connection
⚫ Open ports UDP, TCP
⚫ NetBIOS, neighboring network connection
⚫ User Account
⚫Users currently logged on
⚫ Processes
⚫ Running processes
⚫ Running services
⚫ Scheduled Jobs
⚫ Files
⚫ Open files
⚫ Screen capture
⚫ Clipboard
Supported OS, hardware and commands
OS
⚫ Windows 2000
⚫ Windows XP
⚫ Windows 2003 Server
⚫ Windows Vista
⚫ Windows 7
⚫ Windows 2008 R1 & R2
⚫ Windows 8.1
⚫ Windows 10
Hardware
⚫ Tested on USB thumb drive and Hard disk
Commands
Around 150 commands executed cover the following area:
⚫ Network
⚫ Log
⚫ Memory
⚫ Users
⚫ Registry
⚫ Process, Services
⚫ Files
⚫ Password
⚫ System configuration