Re: [sleuthkit-developers] Few clarifications
Brought to you by:
carrier
From: Brian C. <ca...@sl...> - 2014-11-13 14:13:19
|
Checkout the photorec module for packaging volatility. Basics are: - Make a 'release' folder in your NetBeans project folder and place the volatility folder in there - Find that file at runtime using something like this: File exeFile = InstalledFileLocator.getDefault().locate(executableToFindName, PhotoRecCarverFileIngestModule.class.getPackage().getName(), false); This searches for "executableToFindName" in your netbeans project / module. For the first pass at this to get it working, I'd suggest: - You make it a file-level ingest module - Add in the .lime files in as logical/local files. - Have the file-level ingest module ignore all files that do not have a .lime extension. On Nov 12, 2014, at 5:15 PM, Wiktor Sypniewski <wik...@gm...> wrote: > Hi Guys, > > I have it working somewhat. I want to know where should I keep > Volatility *.py files (at the moment hard coded) and how do I access > them? > > Also how to import the *.lime image and access it from the ingest module? > > Would my module be file ingest module or data source ingest module? > > Vic > ----------------------------------------------- > www.bluegreenblack.com > www.thisfeelsgreat.blogspot.com > http://www.vajrayanaireland.org/ > > For sensitive information please use encryption. > > Public key available at: http://pgp.mit.edu/ > Figerprint: 3D8C 48ED 42BD 4004 D23C C455 8D80 7FB4 2C4D 7801 > > > On 10 November 2014 14:58, Brian Carrier <ca...@sl...> wrote: >> And one other thing. We package the photorec executable up in the 'release' folder of the NetBeans module. It then gets automagically copied into the resulting JAR/NBM: >> >> https://github.com/sleuthkit/autopsy/tree/develop/Core/release >> >> On Nov 10, 2014, at 9:56 AM, Brian Carrier <ca...@sl...> wrote: >> >>> There have been some offline e-mails from Wiktor, but I wanted to reply to this one to the list for public archival and such. You can refer to our PhotoRec module code as an example of running a command line tool. It basically extracts the unallocated space files to local disk, runs PhotoRec on them, and parses the PhotoRec output. It does a lot more than you may need for the Volatility module, but it is a starting point. >>> >>> https://github.com/sleuthkit/autopsy/blob/develop/Core/src/org/sleuthkit/autopsy/modules/photoreccarver/PhotoRecCarverFileIngestModule.java >>> >>> For Volatility, you can either parse the output or simply refer the user to the output folder that you create. >>> >>> brian >>> >>> >>> >>> >>> >>> On Nov 3, 2014, at 5:41 PM, Brian Carrier <ca...@sl...> wrote: >>> >>>> Hi Wiktor, >>>> >>>> What you have below is basically the easiest way to get started. There is another way, but it is not well documented. You can create a "Data Source Processor" (http://sleuthkit.org/autopsy/docs/api-docs/3.1/interfaceorg_1_1sleuthkit_1_1autopsy_1_1corecomponentinterfaces_1_1_data_source_processor.html) to add the memory image in as a memory image and run Volatility at that point instead of as an ingest module, but it isn't documented as well as the other modules. >>>> >>>> Generally looks good. The big question for me has always been what to do with the output of volatility. You can either: >>>> >>>> - parse the output and make Blackboard artifacts for the processes, ports, etc. This will require new artifact types. >>>> - Drop the output into a folder and let the user browse it outside of Autopsy. You can call "Case.addReport()" to add a link to the output folder and then it will be shown in the Autopsy tree. >>>> >>>> brian >>>> >>>> >>>> >>>> On Nov 2, 2014, at 3:45 PM, Wiktor Sypniewski <wik...@gm...> wrote: >>>> >>>>> Hi Guys! >>>>> >>>>> (short reminder of what am I trying to do I want to take Volatility >>>>> Framework - in Python and implement it in Autopsy) >>>>> >>>>> I need few clarifications on what and how to do it: >>>>> >>>>> So the way I was going to proceed with this is to: >>>>> >>>>> 1. write File Ingest Module that will do points: 3 to 7 >>>>> 2. import *.lime image of mobile phone memory/ram >>>>> 3. access this image from within my module >>>>> 4. access Volatility Framework from within my module (*.py files) >>>>> 5. run relevant plugins in VF in the *.lime image >>>>> 6. pipe output to Autopsy DB / file on disk - maybe *.txt >>>>> 7. display output in Autopsy window >>>>> >>>>> Any suggestions? >>>>> >>>>> Regards >>>>> Vic >>>>> >>>>> ----------------------------------------------- >>>>> www.bluegreenblack.com >>>>> www.thisfeelsgreat.blogspot.com >>>>> http://www.vajrayanaireland.org/ >>>>> >>>>> For sensitive information please use encryption. >>>>> >>>>> Public key available at: http://pgp.mit.edu/ >>>>> Figerprint: 3D8C 48ED 42BD 4004 D23C C455 8D80 7FB4 2C4D 7801 >>>>> >>>>> ------------------------------------------------------------------------------ >>>>> _______________________________________________ >>>>> sleuthkit-developers mailing list >>>>> sle...@li... >>>>> https://lists.sourceforge.net/lists/listinfo/sleuthkit-developers >>>> >>>> >>>> ------------------------------------------------------------------------------ >>>> _______________________________________________ >>>> sleuthkit-developers mailing list >>>> sle...@li... >>>> https://lists.sourceforge.net/lists/listinfo/sleuthkit-developers >>> >>> >>> ------------------------------------------------------------------------------ >>> _______________________________________________ >>> sleuthkit-developers mailing list >>> sle...@li... >>> https://lists.sourceforge.net/lists/listinfo/sleuthkit-developers >> > > ------------------------------------------------------------------------------ > Comprehensive Server Monitoring with Site24x7. > Monitor 10 servers for $9/Month. > Get alerted through email, SMS, voice calls or mobile push notifications. > Take corrective actions from your mobile device. > http://pubads.g.doubleclick.net/gampad/clk?id=154624111&iu=/4140/ostg.clktrk > _______________________________________________ > sleuthkit-developers mailing list > sle...@li... > https://lists.sourceforge.net/lists/listinfo/sleuthkit-developers |