1、根据所有取证数据和事件日志一次性生成事件时间轴; 2、识别组件中的异常情况; 3、在虚拟机磁盘中执行勒索软件加密事件响应; 4、在几小时内对上千台主机执行复杂的IoC检测; 5、将Bitlocker加密磁盘中的所有USN日志记录导出到Splunk,而无需等待解密; 6、直接从虚拟机管理程序收集所有实时虚拟机的取证数据; 7、支持将所有的分析数据导出为任何数据格式,例如CSV、JSON或Avro等,也可以直接传输到Splunk或Elastic;
git clone https://github.com/fox-it/dissect.git
pip install dissect
docker run -it --rm -v /path/to/targets/:/mnt:ro ghcr.io/fox-it/dissect:3.2$ target-<TAB>target-fs target-query target-shelltarget-dd target-mount target-reg
$ target-query /mnt/SCHARDT.001 -f hostname,domain,os,version,ips -d ';'<Target /mnt/SCHARDT.001> N-1A9ODN6ZXK4LQ;None;windows;Microsoft Windows XP (NT 5.1) 2600 ;['192.168.1.111']
$ target-query /mnt/SCHARDT.001 -f users<windows/user hostname='N-1A9ODN6ZXK4LQ' domain=None sid='S-1-5-18' name='systemprofile' home='%systemroot%\\system32\\config\\systemprofile'><windows/user hostname='N-1A9ODN6ZXK4LQ' domain=None sid='S-1-5-19' name='LocalService' home='%SystemDrive%\\Documents and Settings\\LocalService'><windows/user hostname='N-1A9ODN6ZXK4LQ' domain=None sid='S-1-5-20' name='NetworkService' home='%SystemDrive%\\Documents and Settings\\NetworkService'><windows/user hostname='N-1A9ODN6ZXK4LQ' domain=None sid='S-1-5-21-2000478354-688789844-1708537768-1003' name='Mr. Evil' home='%SystemDrive%\\Documents and Settings\\Mr. Evil'>
$ target-shell /mnt/SCHARDT.001N-1A9ODN6ZXK4LQ /> infoOS Plugin : WindowsPluginDisks :- <SplitContainer size=4871268352 vs=<DissectVolumeSystem serial=3965578333>>Volumes :- <Volume name='part_00007e00' size=4869333504 fs=<NtfsFilesystem>>Hostname : N-1A9ODN6ZXK4LQOS : Microsoft Windows XP (NT 5.1) 2600Domain : NoneIPs : ['192.168.1.111']N-1A9ODN6ZXK4LQ /> cd sysvolN-1A9ODN6ZXK4LQ /sysvol> cat boot.ini[boot loader]timeout=30default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS[operating systems]multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fastdetectN-1A9ODN6ZXK4LQ /sysvol> cd Documents and SettingsN-1A9ODN6ZXK4LQ /sysvol/Documents and Settings> lsAll UsersDefault UserLocalServiceMr. EvilNetworkService
$ target-fs targets/MSEDGEWIN10.tar cat "C:\Windows\System32\Drivers\null.sys" | sha256sum32c714dd5588e5cdacc6980044d2a66a28c42b0d5208ac2ffbac5d64be95568 -
$ target-reg targets/MSEDGEWIN10.tar -k "HKLM\\SYSTEM\\CURRENTCONTROLSET\\ENUM\\USB\\VID_0E0F&PID_0003&MI_00"+ 'VID_0E0F&PID_0003&MI_00' (2020-12-09 12:06:15.867247+00:00)+ '7&3ae26960&0&0000' (2022-08-17 10:56:49.798122+00:00)- 'DeviceDesc' '@input.inf,%hid.devicedesc%;USB Input Device'- 'LocationInformation' '000b.0000.0000.005.000.000.000.000.000'- 'Capabilities' 128- 'Address' 5- 'ContainerID' '{ee33e11a-3a16-11eb-bde6-806e6f6e6963}'- 'HardwareID' ['USB\\VID_0E0F&PID_0003&REV_0102&MI_00', 'USB\\VID_0E0F&PID_0003&MI_00']- 'CompatibleIDs' ['USB\\Class_03&SubClass_00&Prot_00', 'USB\\Class_03&SubClass_00', 'USB\\Class_03']- 'ClassGUID' '{745a17a0-74d3-11d0-b6fe-00a0c90f57da}'- 'Service' 'HidUsb'- 'Driver' '{745a17a0-74d3-11d0-b6fe-00a0c90f57da}\\0000'- 'Mfg' '@input.inf,%stdmfg%;(Standard system devices)'- 'ConfigFlags' 0- 'ParentIdPrefix' '8&367bfb7c&0'
dissect.cim dissect.clfs dissect.cstruct dissect.esedb dissect.etl dissect.eventlog dissect.evidence dissect.executable dissect.extfs dissect.fat dissect.ffs dissect.hypervisor dissect.ntfs dissect.ole dissect.regf dissect.sql dissect.squashfs dissect.target dissect.thumbcache dissect.util dissect.vmfs dissect.volume dissect.xfs
https://try.dissect.tools/