hacktricks/forensics/basic-forensic-methodology
2024-07-19 04:50:00 +00:00
..
memory-dump-analysis Translated ['crypto-and-stego/cryptographic-algorithms/unpacking-binarie 2024-07-19 04:50:00 +00:00
partitions-file-systems-carving Translated ['binary-exploitation/basic-stack-binary-exploitation-methodo 2024-07-18 22:14:33 +00:00
pcap-inspection Translated ['1911-pentesting-fox.md', '6881-udp-pentesting-bittorrent.md 2024-07-18 18:37:42 +00:00
specific-software-file-type-tricks Translated ['binary-exploitation/basic-stack-binary-exploitation-methodo 2024-07-18 22:14:33 +00:00
windows-forensics Translated ['1911-pentesting-fox.md', '6881-udp-pentesting-bittorrent.md 2024-07-18 18:37:42 +00:00
anti-forensic-techniques.md Translated ['1911-pentesting-fox.md', '6881-udp-pentesting-bittorrent.md 2024-07-18 18:37:42 +00:00
docker-forensics.md Translated ['1911-pentesting-fox.md', '6881-udp-pentesting-bittorrent.md 2024-07-18 18:37:42 +00:00
file-integrity-monitoring.md Translated ['1911-pentesting-fox.md', '6881-udp-pentesting-bittorrent.md 2024-07-18 18:37:42 +00:00
linux-forensics.md Translated ['crypto-and-stego/cryptographic-algorithms/unpacking-binarie 2024-07-19 04:50:00 +00:00
malware-analysis.md Translated ['1911-pentesting-fox.md', '6881-udp-pentesting-bittorrent.md 2024-07-18 18:37:42 +00:00
README.md Translated ['crypto-and-stego/cryptographic-algorithms/unpacking-binarie 2024-07-19 04:50:00 +00:00

Msingi wa Mbinu za Kisheria

{% hint style="success" %} Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

Kuunda na Kuweka Picha

{% content-ref url="../../generic-methodologies-and-resources/basic-forensic-methodology/image-acquisition-and-mount.md" %} image-acquisition-and-mount.md {% endcontent-ref %}

Uchambuzi wa Malware

Hii sio hatua ya kwanza kufanya mara tu unapo kuwa na picha. Lakini unaweza kutumia mbinu hizi za uchambuzi wa malware kwa uhuru ikiwa una faili, picha ya mfumo wa faili, picha ya kumbukumbu, pcap... hivyo ni vizuri kumbuka hatua hizi:

{% content-ref url="malware-analysis.md" %} malware-analysis.md {% endcontent-ref %}

Kukagua Picha

ikiwa umepatiwa picha ya kisheria ya kifaa unaweza kuanza kuchambua sehemu, mfumo wa faili ulio tumika na kuokoa faili ambazo zinaweza kuwa za kuvutia (hata zile zilizofutwa). Jifunze jinsi katika:

{% content-ref url="partitions-file-systems-carving/" %} partitions-file-systems-carving {% endcontent-ref %}

Kulingana na OSs zilizotumika na hata jukwaa, vitu vya kuvutia tofauti vinapaswa kutafutwa:

{% content-ref url="windows-forensics/" %} windows-forensics {% endcontent-ref %}

{% content-ref url="linux-forensics.md" %} linux-forensics.md {% endcontent-ref %}

{% content-ref url="docker-forensics.md" %} docker-forensics.md {% endcontent-ref %}

Ukaguzi wa Kina wa Aina Maalum za Faili na Programu

Ikiwa una faili ambayo ni ya kutatanisha, basi kulingana na aina ya faili na programu iliyoiunda, mbinu kadhaa zinaweza kuwa na manufaa.
Soma ukurasa ufuatao kujifunza mbinu za kuvutia:

{% content-ref url="specific-software-file-type-tricks/" %} specific-software-file-type-tricks {% endcontent-ref %}

Nataka kutoa kumbukumbu maalum kwa ukurasa:

{% content-ref url="specific-software-file-type-tricks/browser-artifacts.md" %} browser-artifacts.md {% endcontent-ref %}

Ukaguzi wa Dump ya Kumbukumbu

{% content-ref url="memory-dump-analysis/" %} memory-dump-analysis {% endcontent-ref %}

Ukaguzi wa Pcap

{% content-ref url="pcap-inspection/" %} pcap-inspection {% endcontent-ref %}

Mbinu za Anti-Kisheria

Kumbuka matumizi yanayowezekana ya mbinu za anti-kisheria:

{% content-ref url="anti-forensic-techniques.md" %} anti-forensic-techniques.md {% endcontent-ref %}

Uwindaji wa Vitisho

{% content-ref url="file-integrity-monitoring.md" %} file-integrity-monitoring.md {% endcontent-ref %}

{% hint style="success" %} Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}