Difference between pages "Kali Linux" and "Plaso"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Created page with "== Features == Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrastructure has been put in place, all tools wer...")
 
m (File formats)
 
Line 1: Line 1:
== Features ==
+
{{Infobox_Software |
Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrastructure has been put in place, all tools were reviewed and packaged, and we use Git for our VCS.
+
  name = plaso |
 +
  maintainer = [[Kristinn Gudjonsson]], [[Joachim Metz]] |
 +
  os = [[Linux]], [[Mac OS X]], [[Windows]] |
 +
  genre = {{Analysis}} |
 +
  license = {{APL}} |
 +
  website = [https://code.google.com/p/plaso/ code.google.com/p/plaso/] |
 +
}}
  
* More than 300 penetration testing tools: After reviewing every tool that was included in BackTrack,
+
Plaso (plaso langar að safna öllu) is the Python based back-end engine used by tools such as log2timeline for automatic creation of a super timelines. The goal of log2timeline (and thus plaso) is to provide a single tool that can parse various log files and forensic artifacts from computers and related systems, such as network equipment to produce a single correlated timeline. This timeline can then be easily analysed by forensic investigators/analysts, speeding up investigations by correlating the vast amount of information found on an average computer system. Plaso is intended to be applied for creating super timelines but also supports creating [http://blog.kiddaland.net/2013/02/targeted-timelines-part-i.html targeted timelines].
we eliminated a great number of tools that either did not work or had other tools available that provided
+
similar functionality.
+
  
* Free and always will be: Kali Linux, like its predecessor, is completely free and always will be. You will
+
The Plaso project site also provides [[4n6time]], formerly "l2t_Review", which is a cross-platform forensic tool for timeline creation and review by [[David Nides]].
never, ever have to pay for Kali Linux.
+
  
* Open source Git tree: We are huge proponents of open source software and our development tree is
+
== Supported Formats ==
available for all to see and all sources are available for those who wish to tweak and rebuild packages.
+
  
* FHS compliant: Kali has been developed to adhere to the Filesystem Hierarchy Standard, allowing all
+
=== Storage Media Image File Formats ===
Linux users to easily locate binaries, support files, libraries, etc.
+
Storage Medis Image File Format support is provided by [[dfvfs]].
  
* Vast wireless device support: We have built Kali Linux to support as many wireless devices as we
+
=== Volume System Formats ===
possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with
+
Volume System Format support is provided by [[dfvfs]].
numerous USB and other wireless devices.
+
  
* Custom kernel patched for injection: As penetration testers, the development team often needs to
+
=== File System Formats ===
do wireless assessments so our kernel has the latest injection patches included.
+
File System Format support is provided by [[dfvfs]].
Secure development environment: The Kali Linux team is made up of a small group of trusted
+
individuals who can only commit packages and interact with the repositories while using multiple secure
+
protocols.
+
  
* GPG signed packages and repos: All Kali packages are signed by each individual developer when
+
=== File formats ===
they are built and committed and the repositories subsequently sign the packages as well.
+
<b>TODO expand this list</b>
Multi-language: Although pentesting tools tend to be written in English, we have ensured that Kali has
+
true multilingual support, allowing more users to operate in their native language and locate the tools
+
they need for the job.
+
  
* Completely customizable: We completely understand that not everyone will agree with our design
+
* Apple System Log (ASL)
decisions so we have made it as easy as possible for our more adventurous users to customize Kali Linux
+
* Basic Security Module (BSM)
to their liking, all the way down to the kernel.
+
* Bencode files
 +
* [[Google Chrome|Chrome cache files]]
 +
* [[Extensible Storage Engine (ESE) Database File (EDB) format]] using [[libesedb]]
 +
* [[Internet Explorer History File Format]] (also known as MSIE 4 - 9 Cache Files or index.dat) using [[libmsiecf]]
 +
* Java IDX
 +
* [[OLE Compound File]] using [[libolecf]]
 +
* [[Property list (plist)|Property list (plist) format]] using [[binplist]]
 +
* SQLite databases
 +
* Syslog
 +
* [[Windows Event Log (EVT)]] using [[libevt]]
 +
* [[Windows NT Registry File (REGF)]] using [[libregf]]
 +
* [[LNK|Windows Shortcut File (LNK) format]] using [[liblnk]]
 +
* [[Windows XML Event Log (EVTX)]] using [[libevtx]]
  
* ARMEL and ARMHF support: Since ARM-based systems are becoming more and more prevalent and
+
=== Bencode file formats ===
inexpensive, we knew that Kali’s ARM support would need to be as robust as we could manage, resulting
+
* Transmission
in working installations for both ARMEL and ARMHF systems. Kali Linux has ARM repositories integrated
+
* uTorrent
with the mainline distribution so tools for ARM will be updated in conjunction with the rest of the
+
distribution.
+
  
* Kali is currently available for the following ARM devices:
+
=== ESE database file formats ===
** rk3306 mk/ss808
+
* Internet Explorer WebCache format
** Raspberry Pi
+
** ODROID U2/X2
+
** Samsung Chromebook
+
  
* Kali is specifically tailored to penetration testing and therefore, all documentation on this site assumes prior
+
=== OLE Compound File formats ===
knowledge of the Linux operating system.
+
* Document summary information
 +
* Summary information (top-level only)
 +
 
 +
=== Property list (plist) formats ===
 +
<b>TODO expand this list</b>
 +
* Airport
 +
* Apple Account
 +
* iPod/iPhone
 +
* Install History
 +
* Mac User
 +
* Software Update
 +
* Spotlight
 +
* Spotlight Volume Information
 +
* Timemachine
 +
 
 +
=== SQLite database file formats ===
 +
* Android call logs
 +
* Android SMS
 +
* Chrome cookies
 +
* Chrome browsing and downloads history
 +
* Firefox browsing and downloads history
 +
* Google Drive
 +
* Launch services quarantine events
 +
* MacKeeper
 +
* Mac OS X document versions
 +
* Skype
 +
* Zeitgeist activity
 +
 
 +
=== Windows Registry formats ===
 +
<b>TODO expand this list</b>
 +
* AppCompatCache
 +
* CCleaner
 +
* MountPoints2
 +
* MSIE Zone
 +
* MSIE Zone Software
 +
 
 +
== History ==
 +
Plaso is a Python-based rewrite of the Perl-based [[log2timeline]] initially created by [[Kristinn Gudjonsson]]. Plaso builds upon the [[SleuthKit]], [[libyal]], [[dfvfs]] and various other projects.
 +
 
 +
== See Also ==
 +
* [[dfvfs]]
 +
* [[log2timeline]]
 +
 
 +
== External Links ==
 +
* [https://code.google.com/p/plaso/ Project site]
 +
* [https://sites.google.com/a/kiddaland.net/plaso/home Project documentation]
 +
* [http://blog.kiddaland.net/ Project blog]
 +
* [https://sites.google.com/a/kiddaland.net/plaso/usage/4n6time 4n6time]

Revision as of 02:39, 3 June 2014

plaso
Maintainer: Kristinn Gudjonsson, Joachim Metz
OS: Linux, Mac OS X, Windows
Genre: Analysis
License: APL
Website: code.google.com/p/plaso/

Plaso (plaso langar að safna öllu) is the Python based back-end engine used by tools such as log2timeline for automatic creation of a super timelines. The goal of log2timeline (and thus plaso) is to provide a single tool that can parse various log files and forensic artifacts from computers and related systems, such as network equipment to produce a single correlated timeline. This timeline can then be easily analysed by forensic investigators/analysts, speeding up investigations by correlating the vast amount of information found on an average computer system. Plaso is intended to be applied for creating super timelines but also supports creating targeted timelines.

The Plaso project site also provides 4n6time, formerly "l2t_Review", which is a cross-platform forensic tool for timeline creation and review by David Nides.

Supported Formats

Storage Media Image File Formats

Storage Medis Image File Format support is provided by dfvfs.

Volume System Formats

Volume System Format support is provided by dfvfs.

File System Formats

File System Format support is provided by dfvfs.

File formats

TODO expand this list

Bencode file formats

  • Transmission
  • uTorrent

ESE database file formats

  • Internet Explorer WebCache format

OLE Compound File formats

  • Document summary information
  • Summary information (top-level only)

Property list (plist) formats

TODO expand this list

  • Airport
  • Apple Account
  • iPod/iPhone
  • Install History
  • Mac User
  • Software Update
  • Spotlight
  • Spotlight Volume Information
  • Timemachine

SQLite database file formats

  • Android call logs
  • Android SMS
  • Chrome cookies
  • Chrome browsing and downloads history
  • Firefox browsing and downloads history
  • Google Drive
  • Launch services quarantine events
  • MacKeeper
  • Mac OS X document versions
  • Skype
  • Zeitgeist activity

Windows Registry formats

TODO expand this list

  • AppCompatCache
  • CCleaner
  • MountPoints2
  • MSIE Zone
  • MSIE Zone Software

History

Plaso is a Python-based rewrite of the Perl-based log2timeline initially created by Kristinn Gudjonsson. Plaso builds upon the SleuthKit, libyal, dfvfs and various other projects.

See Also

External Links