Difference between pages "Introduction to Steganography: Steganography and Data Exfiltration" and "Plaso"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
 
(Property list (plist) formats)
 
Line 1: Line 1:
'''Introduction to Steganography:  Steganography and Data Exfiltration'''[http://www.wetstonetech.com/cgi-bin/shop.cgi?view,22]
+
{{Infobox_Software |
 +
  name = plaso |
 +
  maintainer = [[Kristinn Gudjonsson]], [[Joachim Metz]] |
 +
  os = [[Linux]], [[Mac OS X]], [[Windows]] |
 +
  genre = {{Analysis}} |
 +
  license = {{APL}} |
 +
  website = [https://code.google.com/p/plaso/ code.google.com/p/plaso/] |
 +
}}
  
 +
Plaso (plaso langar að safna öllu) is the Python based back-end engine used by tools such as log2timeline for automatic creation of a super timelines. The goal of log2timeline (and thus plaso) is to provide a single tool that can parse various log files and forensic artifacts from computers and related systems, such as network equipment to produce a single correlated timeline. This timeline can then be easily analysed by forensic investigators/analysts, speeding up investigations by correlating the vast amount of information found on an average computer system. Plaso is intended to be applied for creating super timelines but also supports creating [http://blog.kiddaland.net/2013/02/targeted-timelines-part-i.html targeted timelines].
  
==  ==
+
The Plaso project site also provides [[4n6time]], formerly "l2t_Review", which is a cross-platform forensic tool for timeline creation and review by [[David Nides]].
  
This virtual one-day class will introduce you to the latest methods,techniques and threats posed by steganography. Students will learn how steganography has evolved, where it is going and how it is being used by criminals and terrorist organizations. Learn about the latest techniques to detect, shunt, disrupt and destroy steganography communications. Identify those using steganography and stop the leak of vital information from your organization.
+
== Supported Formats ==
  
 +
=== Storage Media Image File Formats ===
 +
Storage Medis Image File Format support is provided by [[dfvfs]].
  
 +
=== Volume System Formats ===
 +
Volume System Format support is provided by [[dfvfs]].
  
'''Steganography is Global Threat!'''
+
=== File System Formats ===
 +
File System Format support is provided by [[dfvfs]].
  
Steganography is capable of concealing the mere existence of  incriminating  information and/or covert communications. Steganography weapons are easy to use, and are readily available to our adversaries.
+
=== File formats ===
 +
<b>TODO expand this list</b>
  
When Steganogpraphy is used in conjunction with the internet, it becomes a globally effective tool for command control communication and intelligence.
+
* Apple System Log (ASL)
 +
* Basic Security Module (BSM)
 +
* Bencode files
 +
* [[Google Chrome|Chrome cache files]]
 +
* [[Extensible Storage Engine (ESE) Database File (EDB) format]] using [[libesedb]]
 +
* [[Internet Explorer History File Format]] (also known as MSIE 4 - 9 Cache Files or index.dat) using [[libmsiecf]]
 +
* [[OLE Compound File]] using [[libolecf]]
 +
* [[Property list (plist)|Property list (plist) format]] using [[binplist]]
 +
* SQLite databases
 +
* Syslog
 +
* [[Windows Event Log (EVT)]] using [[libevt]]
 +
* [[Windows NT Registry File (REGF)]] using [[libregf]]
 +
* [[LNK|Windows Shortcut File (LNK) format]] using [[liblnk]]
 +
* [[Windows XML Event Log (EVTX)]] using [[libevtx]]
  
Criminals are armed with the ability to…
+
=== Bencode file formats ===
 +
* Transmission
 +
* uTorrent
  
▫ Conceal incriminating information
+
=== ESE database file formats ===
▫ Covertly communicate with accomplices
+
* Internet Explorer WebCache format
▫ Innocuously share large amounts of potentially dangerous information
+
+
  
'''Who Should Attend?'''
+
=== OLE Compound File formats ===
 +
* Document summary information
 +
* Summary information (top-level only)
  
▫ Forensic Investigators
+
=== Property list (plist) formats ===
▫ Local, state and federal law enforcement
+
<b>TODO expand this list</b>
▫ Private investigators
+
▫ IT security professionals
+
▫ Security auditors
+
  
 +
=== SQLite database file formats ===
 +
* Android call logs
 +
* Android SMS
 +
* Chrome cookies
 +
* Chrome browsing and downloads history
 +
* Firefox browsing and downloads history
 +
* Google Drive
 +
* Launch services quarantine events
 +
* MacKeeper
 +
* Mac OS X document versions
 +
* Skype
 +
* Zeitgeist activity
  
Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.
+
=== Windows Registry formats ===
 +
<b>TODO expand this list</b>
  
 +
== History ==
 +
Plaso is a Python-based rewrite of the Perl-based [[log2timeline]] initially created by [[Kristinn Gudjonsson]]. Plaso builds upon the [[SleuthKit]], [[libyal]] and other projects.
  
----
+
== See Also ==
 +
* [[dfvfs]]
 +
* [[log2timeline]]
  
'''Contact Information:'''
+
== External Links ==
 
+
* [https://code.google.com/p/plaso/ Project site]
1-877-WETSTONE ext 2
+
* [https://sites.google.com/a/kiddaland.net/plaso/home Project documentation]
 
+
* [http://blog.kiddaland.net/ Project blog]
www.wetstonetech.com [https://www.wetstonetech.com/index.html]
+
* [https://sites.google.com/a/kiddaland.net/plaso/usage/4n6time 4n6time]

Revision as of 02:33, 3 June 2014

plaso
Maintainer: Kristinn Gudjonsson, Joachim Metz
OS: Linux, Mac OS X, Windows
Genre: Analysis
License: APL
Website: code.google.com/p/plaso/

Plaso (plaso langar að safna öllu) is the Python based back-end engine used by tools such as log2timeline for automatic creation of a super timelines. The goal of log2timeline (and thus plaso) is to provide a single tool that can parse various log files and forensic artifacts from computers and related systems, such as network equipment to produce a single correlated timeline. This timeline can then be easily analysed by forensic investigators/analysts, speeding up investigations by correlating the vast amount of information found on an average computer system. Plaso is intended to be applied for creating super timelines but also supports creating targeted timelines.

The Plaso project site also provides 4n6time, formerly "l2t_Review", which is a cross-platform forensic tool for timeline creation and review by David Nides.

Supported Formats

Storage Media Image File Formats

Storage Medis Image File Format support is provided by dfvfs.

Volume System Formats

Volume System Format support is provided by dfvfs.

File System Formats

File System Format support is provided by dfvfs.

File formats

TODO expand this list

Bencode file formats

  • Transmission
  • uTorrent

ESE database file formats

  • Internet Explorer WebCache format

OLE Compound File formats

  • Document summary information
  • Summary information (top-level only)

Property list (plist) formats

TODO expand this list

SQLite database file formats

  • Android call logs
  • Android SMS
  • Chrome cookies
  • Chrome browsing and downloads history
  • Firefox browsing and downloads history
  • Google Drive
  • Launch services quarantine events
  • MacKeeper
  • Mac OS X document versions
  • Skype
  • Zeitgeist activity

Windows Registry formats

TODO expand this list

History

Plaso is a Python-based rewrite of the Perl-based log2timeline initially created by Kristinn Gudjonsson. Plaso builds upon the SleuthKit, libyal and other projects.

See Also

External Links