John G. Asmussen

56 Followers
32 Following
56 Posts
Law Enforcement Officer, DFIR & Infosec practitioner, business entrepreneur, tech geek, electronic hobbyist, and amateur radio enthusiast.
Websitehttps://www.egatechnology.com
Githubhttps://github.com/jgasmussen
Twittodonhttps://twittodon.com/share.php?t=jgasmussen&[email protected]
Bloghttps://jgasmussen.blogspot.com
LinkedInhttps://www.linkedin.com/in/jgasmussen

misp-wireshark v1.1 released including support for tshark, installation error and various improvements.

misp-wireshark is a Lua plugin intended to help analysts extract data from Wireshark and convert it into the MISP Core format

https://github.com/MISP/misp-wireshark

#misp #wireshark #ThreatIntelligence #opensource #networkanalysis #dfir

GitHub - MISP/misp-wireshark: Lua plugin to extract data from Wireshark and convert it into MISP format

Lua plugin to extract data from Wireshark and convert it into MISP format - GitHub - MISP/misp-wireshark: Lua plugin to extract data from Wireshark and convert it into MISP format

GitHub

The long awaited CyberPipe is here. A ton of updates to the script. See the blog post for the updates, and the problems and solutions found along the way.

https://bakerstreetforensics.com/2023/01/16/kape-batch-mode-arm-memory-updates-to-csirt-collect-and-all-the-things-i-learned-along-the-way/

Then head over to the releases on GitHub and try it out for yourself.

#DFIR #PowerShell #Triage #RAM.

GitHub: https://github.com/dwmetz/CyberPipe

KAPE batch mode, ARM Memory, updates to CSIRT-Collect, and all the things I learned along the way.

Baker Street Forensics

#DFIR thoughts 💭

Data without context serves little to no purpose.

Had a case recently where images of interest were found in the #Android Chrome cache. These images were carved, by the paid #DigitalForensics tool, out of the cache files and that was it. When I looked at the source file I could see a URL as well as other data points. The URL was key since it established receipt of the files which fulfilled certain statutory requirements.

As examiners and tool makers we need provide the necessary context that brings the past to the present. Just parsing things out in categories is not enough. Information only has value when it is aggregated into knowledge.

Android Chrome cache parsing has been added to #ALEAPP.

Thanks to @joshua_hickman1 for his public data sets and testing in Windows.

Get ALEAPP here:
🔗 https://github.com/abrignoni/ALEAPP

GitHub - abrignoni/ALEAPP: Android Logs Events And Protobuf Parser

Android Logs Events And Protobuf Parser. Contribute to abrignoni/ALEAPP development by creating an account on GitHub.

GitHub

TIL - Just because your code works for you doesn't mean it will work for everyone. Coding is hard work. Coding for Open Source projects requires a lot of extra thought about how the end user will use your code and potentially break your code or wind up with unexpected outcomes from using your code in a way that was unintended.

Don't let this be a discouraging message though, because the success is worth the hard work.

Finally, take a moment to thank those open source developers for all their hard work!

#DFIR #python3 #FOSS

Another new free #DFIR tool! Check out the @hexordia Sysdiagnose Log Toolkit! This includes both the features of our Syslog Monitor Tool to live monitor iOS syslogs - PLUS the convenience of exporting sysdiagnose logs from the device. Learn more in this blog from @Noot https://www.hexordia.com/blog-1-1/introducing-the-hexordia-sysdiagnose-log-toolkit
Introducing the Hexordia Sysdiagnose Log Toolkit — Hexordia

Introducing the Hexordia Sysdiagnose Log Toolkit

Hexordia

Today, I am releasing Version 1.0 of Case_Notes.py - A cross-platform (Windows, macOS, & Linux) python script to help make the case documentation process easier.

Some of the main features:

Easy to install and use.

Lightweight - easy on CPU and memory resources.

Automatic OS detection.

Ability to take selective screenshots for case documentation.

Log file contains notes entries prepended with date/time stamps in UTC or Local Time format.

Case_Notes.py was originally designed to expedite the documentation process of a digital forensic examinations. However, this tool could also be used in:

Open Source Intelligence (OSINT) investigations.

Social Media Intelligence (SOCMINT) investigations.

Notes during penetration tests.

Capture the Flag (CTF) events.

General note taking.

And so much more!

The latest version of this tool can be found here:

https://github.com/jgasmussen/Case_Notes.py

In the next blog post, I will be sharing information about setting up and staging a DFIR kit. Stay tuned for more information.

Last but certainly not least, I want to publicly acknowledge Alexis Brignoni (@[email protected]) for his willingness to help me along on my Python journey. He helped review my code and offered of his time and talents. He also has a wealth of information on his blog https://abrignoni.blogspot.com. Give him a follow and checkout his GitHub page for some other awesome forensic tools, https://github.com/abrignoni.

GitHub - jgasmussen/Case_Notes.py: Case_Notes.py is a cross-platform (Windows, macOS, & Linux) python script to help make the documentation process easier.

Case_Notes.py is a cross-platform (Windows, macOS, & Linux) python script to help make the documentation process easier. - GitHub - jgasmussen/Case_Notes.py: Case_Notes.py is a cross-platform (...

GitHub
This is such a big deal for collegiate DFIR programs. Putting the tools into the hands of students is something every digital forensic company should be doing. More hands on training and familiarity with the tools = experience = better job opportunities. Bravo Belkasoft!!! http://bit.ly/3WbhLwl
Belkasoft academics

Things are looking good for the next release of CSIRT-Collect which incorporates the (now free) MAGNET DumpIt for Windows. #DFIR #PowerShell #KAPE #DumpIt
A New Year and a new blog post! Check it out here: https://jgasmussen.blogspot.com/2023/01/dfir-briefly-expained.html
DFIR Briefly Expained...

  Since we are going to be learning in future blog posts the specifics of Digital Forensics & Incident Response (DFIR), we first need to e...

DFIR parsing of protobuf data in Python

YouTube