8000 GitHub - n3l5/irFARTpull: PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
< 8000 div class="d-flex flex-nowrap flex-justify-end mb-3 px-3 px-lg-5" style="gap: 1rem;">

PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.

Notifications You must be signed in to change notification settings

n3l5/irFARTpull

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

54 Commits
 
 
 
 

Repository files navigation


() | /\ | | | | | _ _ | | / \ _ | | _ __ _ _| | | | | '_| / /\ \ | '| _| ' | | | | | | | | | | | / ____ | | | || |) | || | | | ||| ||// __| _| .__/ _,||| | |
|
|

IR Forensic ARTifact pull (irFArtpull)

DESCRIPTION:

irFArtpull is a PowerShell script utilized to pull several forensic artifacts from a live Windows 7, 8, Server 2008, and Server 2012 systems on your network.

Artifacts it grabs:

  • Disk Information
  • System Information
  • User Information
  • Network Configuration
  • Netstat info
  • Route Table, ARP Table, DNS Cache, HOSTS file
  • Running Processes
  • Services
  • Event Logs (System, Security, Application)
  • Prefetch Files
  • CCM_RecentlyUsedApps
  • $MFT
  • NTFS $LogFile
  • USN Journal
  • Amcache.hve
  • Registry Files
  • User NTUSER.dat files (from user profiles used within last 15 days)
  • Internet History Files (IE, Firefox, Chrome from user profiles used within last 15 days)

When done collecting the artifacts, it will 7zip the data and yank the info off the box for off-line analysis.

NOTEs:

  • All testing done on PowerShell v4+
  • Requires RawCopy.exe (x32) & RawCopy64.exe for the extraction of "in use" files. Version: RawCopy v1.0.0.15 (latest as of writing)
  • Requires ExtractUsnJrnl for the extraction of the NTFS change journal ($UsnJrnl)
  • Autorunsc - Command line version of Autoruns; shows the programs configure to run during login, system bootup, and application plug-ins.
  • Requires 7za.exe (7zip cmd line) for compression w/ password protection

Assumed Directories:

  • c:\windows\temp\IR - Where the work will be done (no need to create)

***As expected: Must be ran a user that will have Admin creds on the remote system. The assumption is that the target system is part of a domain.

LINKs:

irFARTpull main - https://github.com/n3l5/irFARTpull

Links to required tools:

Various tools for analysis of the artifacts:

About

PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published
0