Blue Team Toolkit
  • 👊Welcome!
  • application-security
    • Application Security
  • DFIR Toolkit
  • Incident Response
    • Containment, Eradication, and Recovery
    • Network Analysis
    • MITRE ATT&CK Framework
    • post-incident
    • preparation
  • network-hardening
    • Basic Network Tools
    • Basic Port Info
    • NMAP
    • Wireshark
  • Phishing Analysis
    • Basic Email Info
    • Email Headers
  • reversing
    • gdb
    • reversing
  • Security Information and Event Monitoring
    • DeepBlueCLI
    • Linux Log Analysis
    • Log Review Approach
    • Network Device Log Analysis
    • Other Tools
    • SIFT Workstation
    • Splunk
    • Syslog
    • Sysmon
    • Web Server Log Analysis
    • Windows Log Analysis
  • Systems Forensics
    • Autopsy
    • Basic File Metadata
    • Browser History Capturer
    • Browser History Viewer
    • Digital Evidence Handling
    • Exiftool
    • File Hashing
    • File Systems
    • forensics-workstation
    • FTK Imager
    • John the Ripper
    • JumpList Explorer
    • KAPE
    • Linux Artifacts
    • Memory File Analysis
    • Prefetch Explorer Command Tool PECmd.exe
    • Scalpel
    • Steghide
    • Sysinternals
    • Volatility
    • Windows Artifacts
    • Windows File Analyzer
    • YARA
  • systems-hardening
    • Active Directory Hardening
    • linux-hardening
    • windows-hardening
Powered by GitBook
On this page
  1. Systems Forensics

Digital Evidence Handling

  • Digital Evidence Process: Identification -> Preservation -> Collection -> Analysis -> Reporting

  • Forms of Digital Evidence:

    • Email

    • Digital Photographs

    • Logs

    • Documents

    • Messages

    • Files

    • Browser History

    • Databases

    • Backups

    • Disk Images

    • Video/audio files

  • Digital evidence handling tenants:

    • No altering of original evidence

    • Use write-blockers

    • Document the process

  • Order of Volatility: olatile data includes running memory or the Address Resolution Protocol (ARP) cache

    • Registers & Cache: CPU cache contents

    • Memory: RAM contents

    • Disk (HDD and SSD)

    • Remote Logging and Monitoring Data

    • Physical Configuration, Network Topology, Archival Media

  • Follow chain of custody by:

    • Using Evidence Integrity Hashing

    • Taking a Forensic Copy

    • Storing Digital Evidence securely

    • Using Chain of Custody Form

PreviousBrowser History ViewerNextExiftool

Last updated 2 years ago