Use this skill when:
Do not use this skill for live threat hunting (use EDR/SIEM) or network forensics.
Collect evidence from most volatile to least volatile:
1. System memory (RAM) - Most volatile
2. Network connections and routing tables
3. Running processes and open files
4. Disk contents (file system)
5. Removable media
6. Logs and backup data - Least volatile
Memory Acquisition:
# WinPMEM (Windows)
winpmem_mini_x64.exe memdump.raw
# FTK Imager - Create memory capture via GUI
# File → Capture Memory → Destination path → Capture Memory
# Linux (LiME kernel module)
sudo insmod lime.ko "path=/evidence/memory.lime format=lime"
Volatile Data Collection:
# Capture running processes
Get-Process | Export-Csv "evidence\processes.csv" -NoTypeInformation
tasklist /v > "evidence\tasklist.txt"
# Capture network connections
netstat -anob > "evidence\netstat.txt"
Get-NetTCPConnection | Export-Csv "evidence\tcp_connections.csv"
# Capture logged-on users
query user > "evidence\logged_users.txt"
# Capture scheduled tasks
schtasks /query /fo CSV /v > "evidence\scheduled_tasks.csv"
# Capture services
Get-Service | Export-Csv "evidence\services.csv"
# Capture DNS cache
ipconfig /displaydns > "evidence\dns_cache.txt"
# FTK Imager - Create forensic disk image
# File → Create Disk Image → Physical Drive → E01 format
# Always verify image hash (MD5/SHA1) matches source
# dd (Linux)
sudo dc3dd if=/dev/sda of=/evidence/disk.dd hash=sha256 log=/evidence/imaging.log
# Verify image integrity
sha256sum /evidence/disk.dd
# Compare with hash generated during imaging
# Identify OS profile
vol -f memdump.raw windows.info
# List running processes
vol -f memdump.raw windows.pslist
vol -f memdump.raw windows.pstree
# Find hidden processes
vol -f memdump.raw windows.psscan
# Analyze network connections
vol -f memdump.raw windows.netscan
# Detect process injection
vol -f memdump.raw windows.malfind
# Extract command line arguments
vol -f memdump.raw windows.cmdline
# Analyze DLLs loaded by processes
vol -f memdump.raw windows.dlllist --pid 1234
# Extract files from memory
vol -f memdump.raw windows.filescan | grep -i "suspicious"
vol -f memdump.raw windows.dumpfiles --pid 1234
# Detect credential theft
vol -f memdump.raw windows.hashdump
vol -f memdump.raw windows.lsadump
# Registry analysis from memory
vol -f memdump.raw windows.registry.printkey --key "Software\Microsoft\Windows\CurrentVersion\Run"
Key forensic artifacts and their tools:
Prefetch Files (C:\Windows\Prefetch\):
Tool: PECmd.exe (Eric Zimmerman)
Shows: Program execution history with timestamps and run counts
Command: PECmd.exe -d "C:\Windows\Prefetch" --csv output\
ShimCache (AppCompatCache):
Tool: AppCompatCacheParser.exe
Shows: Programs that existed on system (even if deleted)
Command: AppCompatCacheParser.exe -f SYSTEM --csv output\
AmCache (C:\Windows\appcompat\Programs\Amcache.hve):
Tool: AmcacheParser.exe
Shows: Program execution with SHA1 hashes and install timestamps
Command: AmcacheParser.exe -f Amcache.hve --csv output\
NTFS artifacts ($MFT, $UsnJrnl, $LogFile):
Tool: MFTECmd.exe
Shows: Complete file system timeline including deleted files
Command: MFTECmd.exe -f "$MFT" --csv output\
Event Logs:
Tool: EvtxECmd.exe
Shows: Security, System, PowerShell, Sysmon events
Command: EvtxECmd.exe -d "C:\Windows\System32\winevt\Logs" --csv output\
Registry Hives (SAM, SYSTEM, SOFTWARE, NTUSER.DAT):
Tool: RECmd.exe with batch files
Shows: User accounts, services, installed software, USB history
Command: RECmd.exe -d "C:\Windows\System32\config" --bn BatchExamples\RECmd_Batch_MC.reb --csv output\
# Use KAPE for automated artifact collection
kape.exe --tsource C: --tdest C:\evidence\kape_output \
--target KapeTriage --module !EZParser
# Create super timeline with plaso/log2timeline
log2timeline.py timeline.plaso disk_image.E01
psort.py -o l2tcsv timeline.plaso -w timeline.csv
# Filter timeline around incident timeframe
psort.py -o l2tcsv timeline.plaso "date > '2026-02-20' AND date < '2026-02-22'" -w filtered_timeline.csv
Structure forensic report:
1. Executive Summary
2. Scope and Methodology
3. Evidence Inventory (with chain of custody)
4. Timeline of Events
5. Findings and Analysis
- Initial access vector
- Persistence mechanisms
- Lateral movement
- Data access/exfiltration
6. Indicators of Compromise (IOCs)
7. Recommendations
8. Appendices (tool output, hashes, raw evidence)
| Term | Definition |
|---|---|
| Order of Volatility | Evidence collection priority from most volatile (RAM) to least volatile (backups) |
| Chain of Custody | Documented record of evidence handling from collection to presentation |
| Write Blocker | Hardware or software device that prevents modification of source evidence |
| Super Timeline | Consolidated chronological view of all artifact timestamps for incident reconstruction |
| Prefetch | Windows artifact recording program execution history |
| ShimCache | Application compatibility artifact tracking program existence on endpoint |