Difference between pages "Mdd" and "Plaso"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
(Status)
 
(Supported Formats)
 
Line 1: Line 1:
{{Deprecated Software}}
 
 
 
{{Infobox_Software |
 
{{Infobox_Software |
   name = mdd |
+
   name = plaso |
   maintainer = [[ManTech|ManTech International Corporation]] |
+
   maintainer = [[Kristinn Gudjonsson]], [[Joachim Metz]] |
   os = {{Windows}} |
+
   os = [[Linux]], [[Mac OS X]], [[Windows]] |
   genre = {{Memory Imaging}} |
+
   genre = {{Analysis}} |
   license = {{GPL}} |
+
   license = {{APL}} |
   website = [http://sourceforge.net/projects/mdd/ sourceforge.net/projects/mdd/] |
+
   website = [https://code.google.com/p/plaso/ code.google.com/p/plaso/] |
 
}}
 
}}
  
'''mdd''', also known as '''[[ManTech|ManTech dd]]''' or '''Memory dd''', is a command line program to acquire an image of the memory of a running [[Windows]] computer. The program has been included in the [[Helix]] incident response tool.
+
Plaso (plaso langar að safna öllu) is the Python based back-end engine used by tools such as log2timeline for automatic creation of a super timelines. The goal of log2timeline (and thus plaso) is to provide a single tool that can parse various log files and forensic artifacts from computers and related systems, such as network equipment to produce a single correlated timeline. This timeline can then be easily analysed by forensic investigators/analysts, speeding up investigations by correlating the vast amount of information found on an average computer system. Plaso is intended to be applied for creating super timelines but also supports creating [http://blog.kiddaland.net/2013/02/targeted-timelines-part-i.html targeted timelines].
 
+
== Status ==
+
The current version of mdd (mdd_1.3.exe) runs on Window XP to SP3 and Vista to SP 2, and may run on other versions. However, development seems to have stopped. For a more full-featured memory dumper, consider [[WinDD]].
+
 
+
The driver uses the [[Memory Imaging| Physical Memory Object Memory Imaging Mehod]] and returns a file handle to a user-mode program via an IOCTL on the device file named:
+
<pre>
+
\\.\memdd
+
</pre>
+
  
Once the file handle has been returned the driver and associated memdd device is no longer required and can be removed, which is what the mdd utility does.
+
The Plaso project site also provides [[4n6time]], formally "l2t_Review", which is a cross-platform forensic tool for timeline creation and review by [[David Nides]].
  
== Building from source ==
+
== Supported Formats ==
# Load the x64 Free Build Environment from the WDK (in start menu)
+
# Go to the mdd directory, e.g. C:\src\mdd\driver\mdd\ and run build
+
# You should now have mdd.sys in C:\src\mdd\driver\mdd\objfre_win7_amd64\amd64
+
  
=== Signing the driver ===
+
=== Image File Formats ===
* Make sure the WDK is installed, you need that for the signing.
+
Image File Format support will be moved to [[dfvfs]].
* Get the right cross certificate file, see [http://msdn.microsoft.com/en-us/windows/hardware/gg487315 Cross-Certificates for Kernel Mode Code Signing]
+
* [[Raw Image Format]]
* Convert the key you have to pfx, if its cert + key you want:
+
** setup a secure spot to put the private key, this should not be on corp or unprotected at any time
+
<pre>
+
openssl pkcs12 -export -out out.pfx -inkey in.key -in in.crt -certfile ca.crt
+
</pre>
+
** use a strong password
+
** shred the .key immediately after use
+
* Sign the driver by running:
+
<pre>
+
signTool sign /v /ac <crosscertificatefile> /f <pathtopfx> /p <pfx password> /t http://timestamp.verisign.com/scripts/timestamp.dll <driver.sys>
+
</pre>
+
  
Also see: [http://www.microsoft.com/whdc/winlogo/drvsign/kmsigning.mspx Digital Signatures for Kernel Modules on Windows]
+
=== Volume System Formats ===
 +
Volume System Format support will be moved to [[dfvfs]].
 +
* [[Windows Shadow Volumes]] using [[libvshadow]]
  
== Usage ==
+
=== File System Formats ===
To execute mdd, you must start cmd.exe. The options are:
+
File System Format support will be moved to [[dfvfs]].
* -o ''filename'' - required to actually run mdd
+
* uses [[sleuthkit]] and [[pytsk]]
* -w - license information
+
* -v - verbose
+
  
To run mdd, the account you are using must have administrator access to the machine you wish to image (however, it does not have to be the Administrator account; it only needs to be in the local Administrator group). The program works by installing a service, called mdd, although see below for problems.
+
=== File Formats ===
 +
* [[Property list (plist)|Binary property list (plist) format]] using [[binplist]]
 +
* [[Internet Explorer History File Format]] (also known as MSIE 4 - 9 Cache Files or index.dat) using [[libmsiecf]]
 +
* [[Windows Event Log (EVT)]] using [[libevt]]
 +
* [[Windows NT Registry File (REGF)]] using [[libregf]]
 +
* [[LNK|Windows Shortcut File (LNK) format]] using [[liblnk]]
 +
* [[Windows XML Event Log (EVTX)]] using [[libevtx]]
 +
* Syslog
  
== Known Issues ==
+
== History ==
These are the known problems with mdd.
+
Plaso is a Python-based rewrite of the Perl-based [[log2timeline]] initially created by [[Kristinn Gudjonsson]]. Plaso builds upon the [[SleuthKit]], [[libyal]] and other projects.
===Error 1073===
+
This is a Windows Service Manager error. mdd executes by registering itself as a service, so it can run as administrator, although this does not mean you can run mdd without having administrator access. At the end of a normal execution, the service is deleted. However, mdd can accidentally leave the service installed, and this prevents further imaging. This could be caused by the system crashing (or an intentional system crash) during imaging, or by attempting to stop the imaging with control-c.
+
If this happens, a knowledgeable Windows user will open up the Services tab in Computer Manager, but unfortunately, Windows has a wonderful feature that allows services, when they are registered, to state whether or not they wish to be seen in the Service Manager. This amazing concept allows services to run less visibly, and should be considered a class-a security flaw.
+
Fortunately, there's a way around this, using the command line (cmd.exe).
+
* Run cmd.exe
+
* In cmd.exe, run "sc help" to see the service manager command line tool
+
* Run "sc query" to see all of the currently registered services, but note that this list will overflow the default line buffer of cmd.exe (this is adjustable, but not necessary for our purposes)
+
* Run "sc query mdd" and - ta-da - you'll see the mdd service
+
* Run "sc delete mdd" and it's gone, and mdd can now be run again.
+
  
==Error 1062==
+
== See Also ==
John Judd will be entering text here.
+
* [[log2timeline]]
  
==Can't Use Network Share in Vista==
+
== External Links ==
In Vista, even if you are in the administrator group, you do not necessarily run programs with administrator access (this is actually a major improvement to the security model of Windows). You can start programs, including cmd.exe, with admin privileges, but in this case, that won't help. You will not be able to image to a Network Share from Vista. There is no known workaround. This problem may exist in Windows 7.
+
* [https://code.google.com/p/plaso/ Project site]
 +
* [https://sites.google.com/a/kiddaland.net/plaso/home Project documentation]
 +
* [http://blog.kiddaland.net/ Project blog]
 +
* [https://sites.google.com/a/kiddaland.net/plaso/usage/4n6time 4n6time]

Revision as of 03:31, 2 January 2014

plaso
Maintainer: Kristinn Gudjonsson, Joachim Metz
OS: Linux, Mac OS X, Windows
Genre: Analysis
License: APL
Website: code.google.com/p/plaso/

Plaso (plaso langar að safna öllu) is the Python based back-end engine used by tools such as log2timeline for automatic creation of a super timelines. The goal of log2timeline (and thus plaso) is to provide a single tool that can parse various log files and forensic artifacts from computers and related systems, such as network equipment to produce a single correlated timeline. This timeline can then be easily analysed by forensic investigators/analysts, speeding up investigations by correlating the vast amount of information found on an average computer system. Plaso is intended to be applied for creating super timelines but also supports creating targeted timelines.

The Plaso project site also provides 4n6time, formally "l2t_Review", which is a cross-platform forensic tool for timeline creation and review by David Nides.

Contents

Supported Formats

Image File Formats

Image File Format support will be moved to dfvfs.

Volume System Formats

Volume System Format support will be moved to dfvfs.

File System Formats

File System Format support will be moved to dfvfs.

File Formats

History

Plaso is a Python-based rewrite of the Perl-based log2timeline initially created by Kristinn Gudjonsson. Plaso builds upon the SleuthKit, libyal and other projects.

See Also

External Links