Difference between pages "Training Courses and Providers" and "Plaso"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(COMMERCIAL TRAINING)
 
(File formats)
 
Line 1: Line 1:
This is the list of Training Providers, who offer training courses of interest to practitioners and researchers in the field of Digital Forensics.   Conferences which may include training are located on the [[Upcoming_events]] page.
+
{{Infobox_Software |
 +
  name = plaso |
 +
  maintainer = [[Kristinn Gudjonsson]], [[Joachim Metz]] |
 +
   os = [[Linux]], [[Mac OS X]], [[Windows]] |
 +
  genre = {{Analysis}} |
 +
  license = {{APL}} |
 +
  website = [https://code.google.com/p/plaso/ code.google.com/p/plaso/] |
 +
}}
  
<b>PLEASE READ BEFORE YOU EDIT THE LIST BELOW</b><br>
+
Plaso (plaso langar að safna öllu) is the Python based back-end engine used by tools such as log2timeline for automatic creation of a super timelines. The goal of log2timeline (and thus plaso) is to provide a single tool that can parse various log files and forensic artifacts from computers and related systems, such as network equipment to produce a single correlated timeline. This timeline can then be easily analysed by forensic investigators/analysts, speeding up investigations by correlating the vast amount of information found on an average computer system. Plaso is intended to be applied for creating super timelines but also supports creating [http://blog.kiddaland.net/2013/02/targeted-timelines-part-i.html targeted timelines].
Some training providers offer on-going training courses that are available in an on-line "any time" format. Others have regularly scheduled training that is the same time each month.  Others have recurring training but are scheduled at various times throughout the year. Providers training courses should be listed in alphabetical order, and should be listed in the appropriate section.  Non-Commercial training is typically offered by governmental agencies or organizations that directly support law enforcement. Tool Vendor training is training offered directly by a specific tool vendor, which may apply broadly, but generally is oriented to the vendor's specific tool (or tool suite). Commercial Training is training offered by commercial companies which may or may not be oriented to a specific tool/tool suite, but is offered by a company other than a tool vendor.
+
  
<i>Some training opportunities may be <u>limited</u> to <b>Law Enforcement Only</b> or to a specific audience.  Such restrictions should be noted when known.</i>
+
The Plaso project site also provides [[4n6time]], formerly "l2t_Review", which is a cross-platform forensic tool for timeline creation and review by [[David Nides]].
== On-going / Continuous Training ==
+
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
|- style="background:#bfbfbf; font-weight: bold"
+
! width="40%"|Title
+
! width="20%"|Date/Location
+
! width="40%"|Website
+
|-
+
|- style="background:pink;align:left"
+
! DISTANCE LEARNING
+
|-
+
|Basic Computer Examiner Course - Computer Forensic Training Online
+
|Distance Learning Format
+
|http://www.cftco.com
+
|-
+
|Linux Data Forensics Training
+
|Distance Learning Format
+
|http://www.crazytrain.com/training.html
+
|-
+
|SANS On-Demand Training
+
|Distance Learning Format
+
|http://www.sans.org/ondemand/?portal=69456f95660ade45be29c00b0c14aea1
+
|-
+
|Champlain College - CCE Course
+
|Online / Distance Learning Format
+
|http://extra.champlain.edu/cps/wdc/alliances/cce/landing/
+
|-
+
|Las Positas College
+
|Online Computer Forensics Courses
+
|http://www.laspositascollege.edu
+
|-
+
|- style="background:pink;align:left"
+
!RECURRING TRAINING
+
|-
+
|MaresWare Suite Training
+
|First full week every month<br>Atlanta, GA
+
|http://www.maresware.com/maresware/training/maresware.htm
+
|-
+
|Evidence Recovery for Windows Vista&trade;
+
|First full week every month<br>Brunswick, GA
+
|http://www.internetcrimes.net
+
|-
+
|Evidence Recovery for Windows Server&reg; 2003 R2
+
|Second full week every month<br>Brunswick, GA
+
|http://www.internetcrimes.net
+
|-
+
|Evidence Recovery for the Windows XP&trade; operating system
+
|Third full week every month<br>Brunswick, GA
+
|http://www.internetcrimes.net
+
|-
+
|Computer Forensics Training and CCE&trade; Testing for Litigation Support Professionals
+
|Third weekend of every month(Fri-Mon)<br>Dallas, TX
+
|http://www.md5group.com
+
|-
+
|}
+
==NON-COMMERCIAL TRAINING==
+
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
|- style="background:#bfbfbf; font-weight: bold"
+
! width="40%"|Title
+
! width="40%"|Website
+
! width="20%"|Limitation
+
|-
+
|Defense Cyber Investigations Training Academy (DCITA)
+
|http://www.dc3.mil/dcita/dcitaAbout.php
+
|Limited To Certain Roles within US Government Agencies[http://www.dc3.mil/dcita/dcitaRegistration.php (1)]
+
|-
+
|Federal Law Enforcement Training Center
+
|http://www.fletc.gov/training/programs/technical-operations-division
+
|Limited To Law Enforcement
+
|-
+
|MSU National Forensics Training Center
+
|http://www.security.cse.msstate.edu/ftc
+
|Limited To Law Enforcement
+
|-
+
|IACIS
+
|http://www.iacis.com/training/course_listings
+
|Limited To Law Enforcement and Affiliate Members of IACIS
+
|-
+
|SEARCH
+
|http://www.search.org/programs/hightech/courses/
+
|Limited To Law Enforcement
+
|-
+
|National White Collar Crime Center
+
|http://www.nw3c.org/ocr/courses_desc.cfm
+
|Limited To Law Enforcement
+
|-
+
|}
+
  
==TOOL VENDOR TRAINING==
+
== Supported Formats ==
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
The information below is based of version 1.1.0
|- style="background:#bfbfbf; font-weight: bold"
+
! width="40%"|Title
+
! width="40%"|Website
+
! width="20%"|Limitation
+
|-
+
|AccessData (Forensic Tool Kit FTK)
+
|http://www.accessdata.com/courses.html
+
|-
+
|ASR Data (SMART)
+
|http://www.asrdata.com/training/
+
|-
+
|BlackBag Technologies (Macintosh Forensic Suite and MacQuisition Boot Disk)
+
|http://www.blackbagtech.com/training/forensics/
+
|-
+
|Cellebrite (UFED)
+
|http://www.forwarddiscovery.com
+
|-
+
|CPR Tools (Data Recovery)
+
|http://www.cprtools.net/training.php
+
|-
+
|e-fense, Inc. (Helix3 Pro)
+
|http://www.e-fense.com/training/index.php
+
|-
+
|Guidance Software (EnCase)
+
|http://www.guidancesoftware.com/computer-forensics-training-courses.htm
+
|-
+
|Micro Systemation (XRY)
+
|http://www.msab.com/training/
+
|-
+
|Nuix (eDiscovery)
+
|http://www.nuix.com.au/eDiscovery.asp?active_page_id=147
+
|-
+
|Paraben (Paraben Suite)
+
|http://www.paraben-training.com/training.html
+
|-
+
|Software Analysis & Forensic Engineering (CodeSuite)
+
|http://www.safe-corp.biz/training.htm
+
|-
+
|Technology Pathways(ProDiscover)
+
|http://www.techpathways.com/DesktopDefault.aspx?tabindex=6&tabid=9
+
|-
+
|SubRosaSoft (MacForensicsLab)
+
|http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=index&cPath=2
+
|-
+
|WetStone Technologies (Gargoyle, Stego Suite, LiveWire Investigator)
+
|https://www.wetstonetech.com/trainings.html
+
|-
+
|X-Ways Forensics (X-Ways Forensics)
+
|http://www.x-ways.net/training/
+
|-
+
|}
+
  
==COMMERCIAL TRAINING==
+
=== Storage Media Image File Formats ===
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
Storage Medis Image File Format support is provided by [[dfvfs]].
|- style="background:#bfbfbf; font-weight: bold"
+
 
! width="40%"|Title
+
=== Volume System Formats ===
! width="40%"|Website
+
Volume System Format support is provided by [[dfvfs]].
! width="20%"|Limitation
+
 
|-
+
=== File System Formats ===
|Computer Forensic Training Center Online (CFTCO)
+
File System Format support is provided by [[dfvfs]].
|http://www.cftco.com/
+
 
|-
+
=== File formats ===
|CCE Bootcamp
+
* Apple System Log (ASL)
|http://www.cce-bootcamp.com/
+
* Basic Security Module (BSM)
|-
+
* Bencode files
|Dera Forensics Group
+
* [[Google Chrome|Chrome cache files]]
|http://www.deraforensicgroup.com/courses.htm
+
* CUPS IPP
|-
+
* [[Extensible Storage Engine (ESE) Database File (EDB) format]] using [[libesedb]]
|e-fense Training
+
* Firefox Cache
|http://www.e-fense.com/training/index.php
+
* Java IDX
|-
+
* MacOS-X Application firewall
|Forward Discovery, Inc.
+
* MacOS-X Keychain
|http://www.forwarddiscovery.com
+
* MacOS-X Securityd
|-
+
* MacOS-X Wifi
|Hoffmann Advanced Forensic Sessions
+
* ([[SleuthKit]]) mactime logs
|http://en.hoffmannbv.nl/index.cfm/t/Hoffmann_Advanced_Forensic_Sessions/vid/990B3B29-FD6A-6F79-58B3C841381DB7AF
+
* McAfee Anti-Virus Logs
|-
+
* Microsoft [[Internet Explorer History File Format]] (also known as MSIE 4 - 9 Cache Files or index.dat) using [[libmsiecf]]
|H-11 Digital Forensics
+
* [[OLE Compound File]] using [[libolecf]]
|http://www.h11-digital-forensics.com/training/viewclasses.php
+
* Opera Browser history
|-
+
* OpenXML
|High Tech Crime Institute
+
* Pcap files
|http://www.gohtci.com
+
* Popularity Contest log
|-
+
* [[Property list (plist)|Property list (plist) format]] using [[binplist]]
|Infosec Institute
+
* SELinux audit logs
|http://www.infosecinstitute.com/courses/security_training_courses.html
+
* SkyDrive log and error log files
|-
+
* [[SQLite database format]] using [[SQLite]]
|ManTech Computer Security Training
+
* Symantec AV Corporate Edition and Endpoint Protection log
|http://www.mantech.com/capabilities/comptraining.asp
+
* Syslog
|-
+
* UTMP
|Mobile Forensics, Inc
+
* UTMPX
|http://mobileforensicsinc.com/
+
* [[Windows Event Log (EVT)]] using [[libevt]]
|-
+
* Windows Firewall
|NTI (an Armor Forensics Company)
+
* Windows Job files (also known as "at jobs")
|http://www.forensics-intl.com/training.html
+
* Windows Prefetch files
|-
+
* Windows Recycle bin (INFO2 and $I/$R)
|Security University
+
* [[Windows NT Registry File (REGF)]] using [[libregf]]
|http://www.securityuniversity.net/classes.php
+
* [[LNK|Windows Shortcut File (LNK) format]] using [[liblnk]]
|-
+
* [[Windows XML Event Log (EVTX)]] using [[libevtx]]
|Steganography Analysis and Research Center (SARC)
+
* Xchat and Xchat scrollback files
|http://www.sarc-wv.com/training.aspx
+
 
|-
+
=== Bencode file formats ===
|SysAdmin, Audit, Network, Security Institute (SANS)
+
* Transmission
|http://computer-forensics.sans.org/course/
+
* uTorrent
|-
+
 
|<s>Vigilar</s>Company Re-organization - Intense School closed
+
=== ESE database file formats ===
|<s>www.vigilar.com/training/</s> http://www.ashimmy.com/2009/12/message-from-barry-on-intense-school.html
+
* Internet Explorer WebCache format
|-
+
 
|Zeidman Consulting (MCLE)
+
=== OLE Compound File formats ===
|http://www.zeidmanconsulting.com/speaking.htm
+
* Document summary information
|-
+
* Summary information (top-level only)
|}
+
 
 +
=== Property list (plist) formats ===
 +
* Airport
 +
* Apple Account
 +
* Bluetooth
 +
* Install History
 +
* iPod/iPhone
 +
* Mac User
 +
* Safari history
 +
* Software Update
 +
* Spotlight
 +
* Spotlight Volume Information
 +
* Timemachine
 +
 
 +
=== SQLite database file formats ===
 +
* Android call logs
 +
* Android SMS
 +
* Chrome cookies
 +
* [[Google Chrome|Chrome browsing and downloads history]]
 +
* [[Mozilla Firefox|Firefox browsing and downloads history]]
 +
* Google Drive
 +
* Launch services quarantine events
 +
* MacKeeper cache
 +
* Mac OS X document versions
 +
* Skype text conversations
 +
* [[Zeitgeist|Zeitgeist activity database]]
 +
 
 +
=== [[Windows Registry]] formats ===
 +
* [[Windows Application Compatibility|AppCompatCache]]
 +
* CCleaner
 +
* Less Frequently Used
 +
* MountPoints2
 +
* MRUList and MRUListEx (no shell item support)
 +
* [[Internet Explorer|MSIE Zones]]
 +
* Office MRU
 +
* Outlook Search
 +
* Run Keys
 +
* Services
 +
* Terminal Server MRU
 +
* Typed URLS
 +
* USBStor
 +
* UserAssist
 +
* WinRar
 +
* Windows version information
 +
 
 +
== History ==
 +
Plaso is a Python-based rewrite of the Perl-based [[log2timeline]] initially created by [[Kristinn Gudjonsson]]. Plaso builds upon the [[SleuthKit]], [[libyal]], [[dfvfs]] and various other projects.
 +
 
 +
== See Also ==
 +
* [[dfvfs]]
 +
* [[log2timeline]]
 +
 
 +
== External Links ==
 +
* [https://code.google.com/p/plaso/ Project site]
 +
* [https://sites.google.com/a/kiddaland.net/plaso/home Project documentation]
 +
* [http://blog.kiddaland.net/ Project blog]
 +
* [https://sites.google.com/a/kiddaland.net/plaso/usage/4n6time 4n6time]

Revision as of 00:47, 4 June 2014

plaso
Maintainer: Kristinn Gudjonsson, Joachim Metz
OS: Linux, Mac OS X, Windows
Genre: Analysis
License: APL
Website: code.google.com/p/plaso/

Plaso (plaso langar að safna öllu) is the Python based back-end engine used by tools such as log2timeline for automatic creation of a super timelines. The goal of log2timeline (and thus plaso) is to provide a single tool that can parse various log files and forensic artifacts from computers and related systems, such as network equipment to produce a single correlated timeline. This timeline can then be easily analysed by forensic investigators/analysts, speeding up investigations by correlating the vast amount of information found on an average computer system. Plaso is intended to be applied for creating super timelines but also supports creating targeted timelines.

The Plaso project site also provides 4n6time, formerly "l2t_Review", which is a cross-platform forensic tool for timeline creation and review by David Nides.

Supported Formats

The information below is based of version 1.1.0

Storage Media Image File Formats

Storage Medis Image File Format support is provided by dfvfs.

Volume System Formats

Volume System Format support is provided by dfvfs.

File System Formats

File System Format support is provided by dfvfs.

File formats

Bencode file formats

  • Transmission
  • uTorrent

ESE database file formats

  • Internet Explorer WebCache format

OLE Compound File formats

  • Document summary information
  • Summary information (top-level only)

Property list (plist) formats

  • Airport
  • Apple Account
  • Bluetooth
  • Install History
  • iPod/iPhone
  • Mac User
  • Safari history
  • Software Update
  • Spotlight
  • Spotlight Volume Information
  • Timemachine

SQLite database file formats

Windows Registry formats

  • AppCompatCache
  • CCleaner
  • Less Frequently Used
  • MountPoints2
  • MRUList and MRUListEx (no shell item support)
  • MSIE Zones
  • Office MRU
  • Outlook Search
  • Run Keys
  • Services
  • Terminal Server MRU
  • Typed URLS
  • USBStor
  • UserAssist
  • WinRar
  • Windows version information

History

Plaso is a Python-based rewrite of the Perl-based log2timeline initially created by Kristinn Gudjonsson. Plaso builds upon the SleuthKit, libyal, dfvfs and various other projects.

See Also

External Links