From cybersecurity-skills
Performs endpoint forensics: memory acquisition, volatile data collection, disk imaging, artifact analysis, timeline reconstruction for incident response and evidence gathering.
npx claudepluginhub mukul975/anthropic-cybersecurity-skills --plugin cybersecurity-skillsThis skill uses the workspace's default tool permissions.
Use this skill when:
Applies Acme Corporation brand guidelines including colors, fonts, layouts, and messaging to generated PowerPoint, Excel, and PDF documents.
Builds DCF models with sensitivity analysis, Monte Carlo simulations, and scenario planning for investment valuation and risk assessment.
Calculates profitability (ROE, margins), liquidity (current ratio), leverage, efficiency, and valuation (P/E, EV/EBITDA) ratios from financial statements in CSV, JSON, text, or Excel for investment analysis.
Use this skill when:
Do not use this skill for live threat hunting (use EDR/SIEM) or network forensics.
Collect evidence from most volatile to least volatile:
1. System memory (RAM) - Most volatile
2. Network connections and routing tables
3. Running processes and open files
4. Disk contents (file system)
5. Removable media
6. Logs and backup data - Least volatile
Memory Acquisition:
# WinPMEM (Windows)
winpmem_mini_x64.exe memdump.raw
# FTK Imager - Create memory capture via GUI
# File → Capture Memory → Destination path → Capture Memory
# Linux (LiME kernel module)
sudo insmod lime.ko "path=/evidence/memory.lime format=lime"
Volatile Data Collection:
# Capture running processes
Get-Process | Export-Csv "evidence\processes.csv" -NoTypeInformation
tasklist /v > "evidence\tasklist.txt"
# Capture network connections
netstat -anob > "evidence\netstat.txt"
Get-NetTCPConnection | Export-Csv "evidence\tcp_connections.csv"
# Capture logged-on users
query user > "evidence\logged_users.txt"
# Capture scheduled tasks
schtasks /query /fo CSV /v > "evidence\scheduled_tasks.csv"
# Capture services
Get-Service | Export-Csv "evidence\services.csv"
# Capture DNS cache
ipconfig /displaydns > "evidence\dns_cache.txt"
# FTK Imager - Create forensic disk image
# File → Create Disk Image → Physical Drive → E01 format
# Always verify image hash (MD5/SHA1) matches source
# dd (Linux)
sudo dc3dd if=/dev/sda of=/evidence/disk.dd hash=sha256 log=/evidence/imaging.log
# Verify image integrity
sha256sum /evidence/disk.dd
# Compare with hash generated during imaging
# Identify OS profile
vol -f memdump.raw windows.info
# List running processes
vol -f memdump.raw windows.pslist
vol -f memdump.raw windows.pstree
# Find hidden processes
vol -f memdump.raw windows.psscan
# Analyze network connections
vol -f memdump.raw windows.netscan
# Detect process injection
vol -f memdump.raw windows.malfind
# Extract command line arguments
vol -f memdump.raw windows.cmdline
# Analyze DLLs loaded by processes
vol -f memdump.raw windows.dlllist --pid 1234
# Extract files from memory
vol -f memdump.raw windows.filescan | grep -i "suspicious"
vol -f memdump.raw windows.dumpfiles --pid 1234
# Detect credential theft
vol -f memdump.raw windows.hashdump
vol -f memdump.raw windows.lsadump
# Registry analysis from memory
vol -f memdump.raw windows.registry.printkey --key "Software\Microsoft\Windows\CurrentVersion\Run"
Key forensic artifacts and their tools:
Prefetch Files (C:\Windows\Prefetch\):
Tool: PECmd.exe (Eric Zimmerman)
Shows: Program execution history with timestamps and run counts
Command: PECmd.exe -d "C:\Windows\Prefetch" --csv output\
ShimCache (AppCompatCache):
Tool: AppCompatCacheParser.exe
Shows: Programs that existed on system (even if deleted)
Command: AppCompatCacheParser.exe -f SYSTEM --csv output\
AmCache (C:\Windows\appcompat\Programs\Amcache.hve):
Tool: AmcacheParser.exe
Shows: Program execution with SHA1 hashes and install timestamps
Command: AmcacheParser.exe -f Amcache.hve --csv output\
NTFS artifacts ($MFT, $UsnJrnl, $LogFile):
Tool: MFTECmd.exe
Shows: Complete file system timeline including deleted files
Command: MFTECmd.exe -f "$MFT" --csv output\
Event Logs:
Tool: EvtxECmd.exe
Shows: Security, System, PowerShell, Sysmon events
Command: EvtxECmd.exe -d "C:\Windows\System32\winevt\Logs" --csv output\
Registry Hives (SAM, SYSTEM, SOFTWARE, NTUSER.DAT):
Tool: RECmd.exe with batch files
Shows: User accounts, services, installed software, USB history
Command: RECmd.exe -d "C:\Windows\System32\config" --bn BatchExamples\RECmd_Batch_MC.reb --csv output\
# Use KAPE for automated artifact collection
kape.exe --tsource C: --tdest C:\evidence\kape_output \
--target KapeTriage --module !EZParser
# Create super timeline with plaso/log2timeline
log2timeline.py timeline.plaso disk_image.E01
psort.py -o l2tcsv timeline.plaso -w timeline.csv
# Filter timeline around incident timeframe
psort.py -o l2tcsv timeline.plaso "date > '2026-02-20' AND date < '2026-02-22'" -w filtered_timeline.csv
Structure forensic report:
1. Executive Summary
2. Scope and Methodology
3. Evidence Inventory (with chain of custody)
4. Timeline of Events
5. Findings and Analysis
- Initial access vector
- Persistence mechanisms
- Lateral movement
- Data access/exfiltration
6. Indicators of Compromise (IOCs)
7. Recommendations
8. Appendices (tool output, hashes, raw evidence)
| Term | Definition |
|---|---|
| Order of Volatility | Evidence collection priority from most volatile (RAM) to least volatile (backups) |
| Chain of Custody | Documented record of evidence handling from collection to presentation |
| Write Blocker | Hardware or software device that prevents modification of source evidence |
| Super Timeline | Consolidated chronological view of all artifact timestamps for incident reconstruction |
| Prefetch | Windows artifact recording program execution history |
| ShimCache | Application compatibility artifact tracking program existence on endpoint |