mirror of
https://github.com/carlospolop/hacktricks
synced 2024-12-22 19:13:39 +00:00
122 lines
5.8 KiB
Markdown
122 lines
5.8 KiB
Markdown
|
# File/Data Carving & Recovery Tools
|
||
|
|
||
|
{% hint style="success" %}
|
||
|
Learn & practice AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
||
|
Learn & practice GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
||
|
|
||
|
<details>
|
||
|
|
||
|
<summary>Support HackTricks</summary>
|
||
|
|
||
|
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
|
||
|
* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
||
|
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
|
||
|
|
||
|
</details>
|
||
|
{% endhint %}
|
||
|
|
||
|
## Carving & Recovery tools
|
||
|
|
||
|
More tools in [https://github.com/Claudio-C/awesome-datarecovery](https://github.com/Claudio-C/awesome-datarecovery)
|
||
|
|
||
|
### Autopsy
|
||
|
|
||
|
The most common tool used in forensics to extract files from images is [**Autopsy**](https://www.autopsy.com/download/). Download it, install it and make it ingest the file to find "hidden" files. Note that Autopsy is built to support disk images and other kinds of images, but not simple files.
|
||
|
|
||
|
### Binwalk <a href="#binwalk" id="binwalk"></a>
|
||
|
|
||
|
**Binwalk** is a tool for analyzing binary files to find embedded content. It's installable via `apt` and its source is on [GitHub](https://github.com/ReFirmLabs/binwalk).
|
||
|
|
||
|
**Useful commands**:
|
||
|
|
||
|
```bash
|
||
|
sudo apt install binwalk #Insllation
|
||
|
binwalk file #Displays the embedded data in the given file
|
||
|
binwalk -e file #Displays and extracts some files from the given file
|
||
|
binwalk --dd ".*" file #Displays and extracts all files from the given file
|
||
|
```
|
||
|
|
||
|
### Foremost
|
||
|
|
||
|
Another common tool to find hidden files is **foremost**. You can find the configuration file of foremost in `/etc/foremost.conf`. If you just want to search for some specific files uncomment them. If you don't uncomment anything foremost will search for its default configured file types.
|
||
|
|
||
|
```bash
|
||
|
sudo apt-get install foremost
|
||
|
foremost -v -i file.img -o output
|
||
|
#Discovered files will appear inside the folder "output"
|
||
|
```
|
||
|
|
||
|
### **Scalpel**
|
||
|
|
||
|
**Scalpel** is another tool that can be used to find and extract **files embedded in a file**. In this case, you will need to uncomment from the configuration file (_/etc/scalpel/scalpel.conf_) the file types you want it to extract.
|
||
|
|
||
|
```bash
|
||
|
sudo apt-get install scalpel
|
||
|
scalpel file.img -o output
|
||
|
```
|
||
|
|
||
|
### Bulk Extractor
|
||
|
|
||
|
This tool comes inside kali but you can find it here: [https://github.com/simsong/bulk\_extractor](https://github.com/simsong/bulk\_extractor)
|
||
|
|
||
|
This tool can scan an image and will **extract pcaps** inside it, **network information (URLs, domains, IPs, MACs, mails)** and more **files**. You only have to do:
|
||
|
|
||
|
```
|
||
|
bulk_extractor memory.img -o out_folder
|
||
|
```
|
||
|
|
||
|
Navigate through **all the information** that the tool has gathered (passwords?), **analyse** the **packets** (read[ **Pcaps analysis**](../pcap-inspection/)), search for **weird domains** (domains related to **malware** or **non-existent**).
|
||
|
|
||
|
### PhotoRec
|
||
|
|
||
|
You can find it in [https://www.cgsecurity.org/wiki/TestDisk\_Download](https://www.cgsecurity.org/wiki/TestDisk\_Download)
|
||
|
|
||
|
It comes with GUI and CLI versions. You can select the **file-types** you want PhotoRec to search for.
|
||
|
|
||
|
![](<../../../.gitbook/assets/image (242).png>)
|
||
|
|
||
|
### binvis
|
||
|
|
||
|
Check the [code](https://code.google.com/archive/p/binvis/) and the [web page tool](https://binvis.io/#/).
|
||
|
|
||
|
#### Features of BinVis
|
||
|
|
||
|
* Visual and active **structure viewer**
|
||
|
* Multiple plots for different focus points
|
||
|
* Focusing on portions of a sample
|
||
|
* **Seeing stings and resources**, in PE or ELF executables e. g.
|
||
|
* Getting **patterns** for cryptanalysis on files
|
||
|
* **Spotting** packer or encoder algorithms
|
||
|
* **Identify** Steganography by patterns
|
||
|
* **Visual** binary-diffing
|
||
|
|
||
|
BinVis is a great **start-point to get familiar with an unknown target** in a black-boxing scenario.
|
||
|
|
||
|
## Specific Data Carving Tools
|
||
|
|
||
|
### FindAES
|
||
|
|
||
|
Searches for AES keys by searching for their key schedules. Able to find 128. 192, and 256 bit keys, such as those used by TrueCrypt and BitLocker.
|
||
|
|
||
|
Download [here](https://sourceforge.net/projects/findaes/).
|
||
|
|
||
|
## Complementary tools
|
||
|
|
||
|
You can use [**viu** ](https://github.com/atanunq/viu)to see images from the terminal.\
|
||
|
You can use the linux command line tool **pdftotext** to transform a pdf into text and read it.
|
||
|
|
||
|
{% hint style="success" %}
|
||
|
Learn & practice AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
||
|
Learn & practice GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
||
|
|
||
|
<details>
|
||
|
|
||
|
<summary>Support HackTricks</summary>
|
||
|
|
||
|
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
|
||
|
* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
||
|
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
|
||
|
|
||
|
</details>
|
||
|
{% endhint %}
|