Skip to content

maxspl/WinForMindmap

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 

Repository files navigation

WinForMindmap

Windows forensics mindmap composed of personal notes and other mindmaps, including :

This is not a guide for forensic windows, but simply centralized knowledge. So, to find out what to look for on a system, don't hesitate to use the SANS cheat sheets (included in the mindmap).

The mindmap consists of two pages: forensic artifacts and tools. Note that not all of Eric Zimmerman's tools are in the mindmap, so keep in mind that for most artifacts, there's a tool made by E. Zimmerman https://ericzimmerman.github.io/#!index.md.

In fact, there are other pages still under construction, not to be considered.

It's easier to use the mindmap via xmind (.xmind file is in the archive), especially to be able to CTRL + F. However, a png version is still available.

Alt text Alt text

Usage

Let's say you're analyzing a disk copy of a compromised Windows 10 workstation and want to look for evidence of lateral movements with psexec.

The first step is to search the SANS cheat sheets to find out which artifacts might be useful for proving lateral movement: Alt text

The SANS Hunt Evil cheat sheet indicates that ShimCache may contain traces of psexec. Alt text

For details on this artifact, open the dedicated section of the mindmap: Alt text

Now that we know where the file is and what it contains, we can find a tool to parse it in the tools sheet. Alt text

About

Windows forensics all-in-one mindmap

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published