DIGITAL FORENSICS ANALYZER PROJECT- AMIT PERSKY
This project involved the creation of a comprehensive program for digital forensic analysis. Focused on automated hard disk drive (HDD) and memory investigations, it was designed to identify, extract, and display crucial data elements like network traffic or human-readable information. Additionally, the program integrates with the Volatility software for in-depth memory analysis and outputs detailed reports. It also features a dedicated function to install necessary forensic tools, ensuring smooth operation.
In the Digital forensics analyzer Project.pdf, you can see how the script is working and behaving.
Here are the instructions for using the Memory Analysis Tool, which will be placed on GitHub for users to understand how to use it. The tool leverages a shell script to automate memory analysis using Volatility and other forensic tools.
This project provides a comprehensive tool for memory analysis using a cyber forensic approach. The tool automates the process of analyzing a memory dump file (with a .mem
extension) and integrates with Volatility for in-depth memory analysis. The results are saved in a specified directory, and the process can be customized by modifying certain variables in the script.
- Linux operating system (preferably Kali Linux).
- Root privileges.
- Necessary forensic tools installed (
figlet
,bulk-extractor
,binwalk
,foremost
,exiftool
,binutils
). - Volatility installed in the same directory as the script.
- Memory dump file (
.mem
extension).
- Place the memory dump file (with
.mem
extension) into theMemorytool
folder. - Download or clone this repository to your local machine.
- Ensure that the script
Digitalforensicsproject.sh
is executable. You can set the executable permission by running:chmod +x Digitalforensicsproject.sh
-
Navigate to the directory:
cd /path/to/Memorytool
-
Run the script:
sudo ./Digitalforensicsproject.sh
Ensure you have root privileges, as the tool checks and exits if not run as root.
-
Root Check:
- The script starts by verifying if the user has root permissions. If not, it exits.
-
File Selection:
- The user is prompted to enter the filename for analysis. The script checks for the file's existence in the current directory.
-
Tool Installation:
- The script installs necessary forensic tools if they are not already installed.
-
Data Extraction:
- The script provides options to use different carvers (
exiftool
,foremost
,binwalk
,bulk_extractor
,strings
) to extract data from the memory dump file. - The results are saved in an
Output
directory on the desktop.
- The script provides options to use different carvers (
-
Network Traffic Analysis:
- The script attempts to find network traffic files and displays their locations and sizes.
-
Human-Readable Strings Extraction:
- The script allows the user to search for specific strings within the files and outputs any matches.
-
Memory Analysis with Volatility:
- The script checks if the file can be analyzed using Volatility.
- It identifies the memory profile and displays running processes, network connections, and registry information.
-
Results Compilation:
- The script displays general statistics about the analysis, including the time taken and the number of files found.
- All results are saved in a report and zipped into
Your_Results.zip
on the desktop.
- Users may need to modify the
HOME
variable and other paths within the script to match their environment. - The script is designed to be flexible and can be adjusted according to specific needs or configurations.
This tool simplifies the process of memory analysis by automating the extraction and analysis of data from memory dump files. Users can customize the script to fit their environment and requirements, making it a versatile tool for digital forensic investigations.
By following these instructions, users can effectively utilize the Memory Analysis Tool for their forensic analysis needs.