added files that I found

This commit is contained in:
2018-06-16 22:09:34 +02:00
parent 54ba25befb
commit e18a19b8ac
17 changed files with 227 additions and 0 deletions
+3
View File
@@ -0,0 +1,3 @@
.gitignore export-ignore
.gitattributes export-ignore
doc/ export-ignore
Binary file not shown.
+211
View File
@@ -0,0 +1,211 @@
@echo off
:: FILE: ldfw-short.bat
:: DESCRIPTION: Life Digital Forensics for Windows (short version)
:: USAGE: Just execute with admin rights
:: OPTIONS: None
:: EXIT STATES: Microsoft Windows defaults
:: REQUIREMENTS: Windows and the tools folder
:: AUTHOR: Anonymous ID 193
:: VERSION: 1.0
:: CREATED: 08.12.2017
:: COPYRIGHT (C): 2017 - Mr. "193"
:: LICENSE: GPL3 (http://www.gnu.org/licenses/)
:: WARRANTY: WITHOUT ANY WARRANTY
:: TODO: The batch journey ends here!
:: HISTORY: 1.0 - Mr. "193" - Initial (for the peer reviewer eyes only) release
rem Empty evil PATH variable
set PATH=
rem Determine as what this script was startet
C:\Windows\System32\net.exe FILE 1>NUL 2>NUL
if '%errorlevel%' == '0' (
set mode=admin
) else (
set mode=user
)
rem Change to the device and then directory of the script
%~d0
cd "%~p0"
rem Create a target directory
set DAY=%DATE:~0,2%
set MONTH=%DATE:~3,2%
set YEAR=%DATE:~6%
set HOUR=%TIME:~0,2%
set HOUR=%HOUR: =0%
set MIN=%TIME:~3,2%
set SEC=%TIME:~6,2%
set TARGET=%YEAR%%MONTH%%DAY%%HOUR%%MIN%%SEC%
mkdir %TARGET%
rem Log start date and time
call :tee "#######################################################################"
call :tee "# %~nx0 (Live Digital Forensics for Windows [short version])"
call :tee "# startet on %DATE% at %TIME%"
call :tee "#######################################################################"
rem Do not give away valuable time. Safe caches immediately!
call :exec_redir ipconfig-displaydns, "C:\Windows\System32\ipconfig.exe /displaydns"
call :tee "-----------------------------------------------------------------------"
call :exec_redir arp-a, "C:\Windows\System32\ARP.EXE -a"
call :tee "-----------------------------------------------------------------------"
rem Detect bitness
set Bitness=64
if %PROCESSOR_ARCHITECTURE% == x86 (
if not defined ProgrammW6432 set Bitness=32
)
call :tee "Operation System arch is %Bitness% bit."
rem Read case data from keyboard and write to stdout and file
echo Please enter case info...
set /p caseNumber=Case number:
set /p description=Description:
set /p evidenceNumber=Evidence number:
set /p examinerName=Examiner name:
set /p notes=Notes:
set /p currentTime=Current time:
call :tee "#######################################################################"
call :tee "# Informations about the case"
call :tee "#----------------------------------------------------------------------"
call :tee "# Case number: %caseNumber%"
call :tee "# Description: %description%"
call :tee "# Evidence number: %evidenceNumber%"
call :tee "# Examiner name: %examinerName%"
call :tee "# Notes: %notes%"
call :tee "# Current Time: %currentTime%"
call :tee "#######################################################################"
rem Gather information that is difficult to get out of a ram capture
call :exec_redir systeminfo, "C:\Windows\System32\systeminfo.exe"
call :tee "-----------------------------------------------------------------------"
rem Skip winpmem if we are only a simple user
if %mode% == user goto COMMANDS
rem Capture ram or do the commands (not and!)
echo Do you want to capture the memory now? [y/n]
set /p memory=
if %memory% NEQ y goto COMMANDS
:: needs admin rights!
call :tee "Capture memory was chosen..."
call :tee "... skipping insideclipboard, pslist, cports and openedfilesview!"
call :tee "-----------------------------------------------------------------------"
call :exec_direct winpmem, "tools\winpmem_1.6.2.exe %TARGET%\memory_dump.raw", memory_dump.raw
call :tee "-----------------------------------------------------------------------"
goto CONTINUE
:COMMANDS
call :tee "Capture memory was NOT or could NOT be chosen..."
call :tee "... skipping winpmem!"
call :tee "-----------------------------------------------------------------------"
call :exec_direct insideclipboard-1, "tools\InsideClipboard_v115.exe /stext %TARGET%\insideclipboard.txt", insideclipboard.txt
call :tee "-----------------------------------------------------------------------"
call :exec_direct insideclipboard-2, "tools\InsideClipboard_v115.exe /saveclp %TARGET%\backup.clp", backup.clp
call :tee "-----------------------------------------------------------------------"
if %Bitness% == 64 (
call :exec_redir pslist-t, "tools\pslist_v14_x64.exe -t -accepteula"
) else (
call :exec_redir pslist-t, "tools\pslist_v14_x86.exe -t -accepteula"
)
call :tee "-----------------------------------------------------------------------"
if %Bitness% == 64 (
call :exec_direct cports, "tools\cports_v236_x64.exe /scomma %TARGET%\cports.csv", cports.csv
) else (
call :exec_direct cports, "tools\cports_v236_x86.exe /scomma %TARGET%\cports.csv", cports.csv
)
call :tee "-----------------------------------------------------------------------"
rem Skip openedfilesview if we are only a simple user
if %mode% == user goto CONTINUE
if %Bitness% == 64 (
:: needs admin rights!
call :exec_direct openedfilesview, "tools\OpenedFilesView_v170_x64.exe /scomma %TARGET%\openedfilesview.csv", openedfilesview.csv
) else (
:: needs admin rights!
call :exec_direct openedfilesview, "tools\OpenedFilesView_v170_x86.exe /scomma %TARGET%\openedfilesview.csv", openedfilesview.csv
)
call :tee "-----------------------------------------------------------------------"
:CONTINUE
rem Do the rest
call :exec_redir ipconfig-all, "C:\Windows\System32\ipconfig.exe /all"
call :tee "-----------------------------------------------------------------------"
if %Bitness% == 64 (
call :exec_direct usbdeview, "tools\USBDeview_v272_x64.exe /stext %TARGET%\usbdeview.txt", usbdeview.txt
) else (
call :exec_direct usbdeview, "tools\USBDeview_v272_x86.exe /stext %TARGET%\usbdeview.txt", usbdeview.txt
)
call :tee "-----------------------------------------------------------------------"
if %Bitness% == 64 (
call :exec_direct driveletterview, "tools\DriveLetterView_v146_x64.exe /stext %TARGET%\driveletterview.txt", driveletterview.txt
) else (
call :exec_direct driveletterview, "tools\DriveLetterView_v146_x86.exe /stext %TARGET%\driveletterview.txt", driveletterview.txt
)
call :tee "-----------------------------------------------------------------------"
rem Detect encryption
if %mode% == admin (
:: needs admin rights!
call :exec_redir edd, "tools\EDD_v211.exe /batch /accepteula"
)
C:\Windows\System32\findstr.exe /C:"*** Encrypted volumes and/or processes were detected by EDD. ***" "%TARGET%\edd.txt" 1>NUL 2>NUL
if '%errorlevel%' == '0' (
echo ALERT !!! Do not shutdown this system !!! ALERT
echo ENCRYPTION !!! Call for an expert !!! ENCRYPTION
echo ALERT !!! Do not shutdown this system !!! ALERT >> "%TARGET%\ldfw-short.log"
echo ENCRYPTION !!! Call for an expert !!! ENCRYPTION >> "%TARGET%\ldfw-short.log"
)
rem Log end date and time
call :tee "#######################################################################"
call :tee "# %~nx0 (Live Digital Forensics for Windows [short version])"
call :tee "# finished on %DATE% at %TIME%"
call :tee "#######################################################################"
rem Keep window open unless return
set /p close=Press enter to close window
exit /b %ERRORLEVEL%
::
:: functions:
::
:tee
:: text with spaces surrounded by "" to write to stdout and file
echo %~1
echo %~1 >> "%TARGET%\ldfw-short.log"
exit /b 0
:: :execute
:exec_redir
:: %1 = filename compatible version of command incl. params
:: %~2 = command incl. spaces and params sourrounded by ""
call :tee "execution of %1 startet on %DATE% at %TIME%"
%~2 > "%TARGET%\%1.txt"
call :tee "output was written to %TARGET%\%1.txt"
call :tee "execution of %1 finished on %DATE% at %TIME%"
exit /b 0
:exec_direct
:: %1 = filename compatible version of command incl. params
:: %~2 = command incl. spaces and params sourrounded by ""
:: %3 = result file name
call :tee "execution of %1 startet on %DATE% at %TIME%"
%~2
call :tee "output was written to %TARGET%\%3"
call :tee "execution of %1 finished on %DATE% at %TIME%"
exit /b 0
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
+13
View File
@@ -0,0 +1,13 @@
SHA256(.\tools\cports_v236_x64.exe)= 1ca540a1a6c4014a2005665fcf3d72e1f705045b9648ceacaa656606856c0248
SHA256(.\tools\cports_v236_x86.exe)= 1f576522af90c5eabfb2d822587d97fc0aabc0f25c916649ec6e91cf9a591830
SHA256(.\tools\DriveLetterView_v146_x64.exe)= a36885e04b3ad2609f36d9095c64d69516ec1981e1b181b0429fa47499270b0c
SHA256(.\tools\DriveLetterView_v146_x86.exe)= 5747fd12096ef5220ae4c0c7bb08b25307f5ed0f93fba8aef76b334e2a219be6
SHA256(.\tools\EDD_v211.exe)= 3d5f467e3f875cda356ef9af1f1d38af6ba5782baa30b23d4347946b7e3f8ea5
SHA256(.\tools\InsideClipboard_v115.exe)= b74d220e672cbc2d23235ef5cf9047077288b0f6074a0d61440810cac6a16340
SHA256(.\tools\OpenedFilesView_v170_x64.exe)= cd878e1ba5a5318cbe00a9d1171af063639ea9d65f67467aec578468ac6d5358
SHA256(.\tools\OpenedFilesView_v170_x86.exe)= d6a0a6dc55bcc3b64cfb409d22892b70fe474742601f73d4a21bfe471bfefba9
SHA256(.\tools\pslist_v14_x64.exe)= e6901e8423da3e54bab25f7c90f60d3979bfa5bb61bcc46059662736253b8c72
SHA256(.\tools\pslist_v14_x86.exe)= 9927831e111ac61fd7645bf7efa1787db1a3e85b6f64a274ca04b213dc27fd08
SHA256(.\tools\USBDeview_v272_x64.exe)= b47352cfcdf0d58386c291687928fb6ffecce47e27f4ff950a247dd0061d9f92
SHA256(.\tools\USBDeview_v272_x86.exe)= b694f844f9cb2d4d2368c5a4e225b61b758e815c007faf14fc00f9b3e8ea9b8f
SHA256(.\tools\winpmem_1.6.2.exe)= 447502ac949e8d326603fe2d6555deca1057fb5b3bc5a73b3485a4e910bc348e