The artifactcollector project provides a software that collects forensic artifacts on systems. These artifacts can be used in forensic investigations to understand attacker behavior on compromised computers.
The artifactcollector offers the following features
git clone https://github.com/forensicanalysis/artifactcollector
cd artifactcollector
go install . If you want to extract the raw artifacts or process the collected data have a look.
git clone https://github.com/forensicanalysis/artifactcollector.go generate to download all artifacts.pack/artifacts. Do not edit the artifact definitions, as they will be overwritten.pack/ac.yaml and add the artifacts you want to collect.go generate. This might yield some errors or problems in your artifacts.cp resources\artifactcollector.syso .) to enable the icon for the executable and the UAC popup.go build . to generates an executable.Binaries can be added to pack/bin and than included into the artifactcollector in the go generate step. Additionally a corresponding COMMAND artifact like the following is required.
name: Autoruns
sources:
- type: COMMAND
attributes:
cmd: autorunsc.exe
args: ["-x"]
supported_os: [Windows] Currently the output to stdout and stderr is saved, but generated files are not collected.
Cross compilation is a bit more difficult, as a cross compiler like MinGW is required by CGO.
Example cross compilation for Windows:
CGO_ENABLED=1 CC=i686-w64-mingw32-gcc GOOS=windows GOARCH=386 go build .
CGO_ENABLED=1 CC=x86_64-w64-mingw32-gcc GOOS=windows GOARCH=amd64 go build . General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…
If you are a Linux user, you have probably seen commands like chmod 777 while…
Vim and Vi are among the most powerful text editors in the Linux world. They…
Working with compressed files is a common task for any Linux user. Whether you are…
In the digital era, an email address can reveal much more than just a contact…