xmount挂载e01

xmount --in ewf --out vdi --cache ./Disk.cache ./PLEXTOR\ PX-128M5Pro.e01 ./mnt/

输出的vdi格式文件可以通过virtualbox 还原

  • —out vdi 为输出镜像格式
  • ./Disk.cache ./**.e01 为检材文件格式,有关更多E01格式可参考
  • ./mnt 为目标挂在卷,输出的vdi格式镜像将会被挂载到此目录下

bulk_extractor取证

  • 内存取证

bulk_extractor -o ./out DESKTOP-D7AP30M-20200605-082800.raw

获取url访问历史、电话号码、email等信息并输出到./out目录下 有关bulk_extractor详细用法可参考

volatility 内存取证

volatility文档command

  1. volatility -f DESKTOP-D7AP30M-20200605-082800.raw imageinfo #获取镜像信息
  2. volatility -f DESKTOP-D7AP30M-20200605-082800.raw --profile=Win10x64_17134 pslist #列出进程
  3. volatility -f DESKTOP-D7AP30M-20200605-082800.raw --profile=Win10x64_14393 truecryptsummary #列出加密摘要

url_decode

  1. # coding:utf-8
  2. import urllib.parse
  3. with open('url_keyword.txt') as f:
  4. result = f.read()
  5. print(urllib.parse.unquote(result))