Kali Linux

  1. The Kali Linux Toolkit: Forensics
    1. Digital Forensics Fundamentals
      1. Forensic Process Overview
        1. Chain of Custody
          1. Evidence Handling
            1. Forensic Imaging Principles
            2. Disk and File System Forensics
              1. Disk Imaging Tools
                1. dd
                  1. Basic Imaging
                    1. Advanced Options
                      1. Error Handling
                        1. Verification
                        2. dc3dd
                          1. Enhanced Features
                            1. Hash Calculation
                              1. Progress Monitoring
                              2. Guymager
                                1. GUI Interface
                                  1. Multiple Format Support
                                    1. Verification Features
                                  2. File System Analysis
                                    1. Sleuth Kit
                                      1. File System Investigation
                                        1. Timeline Analysis
                                          1. Deleted File Recovery
                                          2. Autopsy
                                            1. Case Management
                                              1. Automated Analysis
                                                1. Reporting Features
                                              2. Partition Analysis
                                                1. fdisk
                                                  1. parted
                                                    1. mmls
                                                  2. File Recovery and Carving
                                                    1. File Carving Tools
                                                      1. Foremost
                                                        1. File Type Detection
                                                          1. Custom Headers
                                                            1. Output Organization
                                                            2. Scalpel
                                                              1. Configuration Files
                                                                1. Performance Optimization
                                                                  1. Custom Signatures
                                                                  2. PhotoRec
                                                                    1. File Type Support
                                                                      1. Deep Scanning
                                                                        1. Damaged Media Recovery
                                                                      2. Deleted File Recovery
                                                                        1. extundelete
                                                                          1. testdisk
                                                                          2. Advanced Carving Techniques
                                                                            1. Bulk Extractor
                                                                              1. Custom Signature Development
                                                                            2. Memory Forensics
                                                                              1. Memory Acquisition
                                                                                1. LiME (Linux Memory Extractor)
                                                                                  1. Live Memory Capture
                                                                                    1. Format Options
                                                                                      1. Network Transfer
                                                                                      2. DumpIt
                                                                                        1. WinPmem
                                                                                        2. Memory Analysis
                                                                                          1. Volatility Framework
                                                                                            1. Profile Selection
                                                                                              1. Process Analysis
                                                                                                1. Network Connection Analysis
                                                                                                  1. Registry Analysis
                                                                                                    1. Malware Detection
                                                                                                      1. Timeline Creation
                                                                                                    2. Memory Analysis Techniques
                                                                                                      1. Process Listing
                                                                                                        1. DLL Analysis
                                                                                                          1. Handle Analysis
                                                                                                            1. String Extraction
                                                                                                          2. Network Forensics
                                                                                                            1. Packet Analysis
                                                                                                              1. Wireshark Forensics
                                                                                                                1. Evidence Extraction
                                                                                                                  1. Protocol Reconstruction
                                                                                                                    1. File Carving from Packets
                                                                                                                    2. NetworkMiner
                                                                                                                      1. Host Discovery
                                                                                                                        1. File Extraction
                                                                                                                          1. Credential Recovery
                                                                                                                        2. Log Analysis
                                                                                                                          1. System Log Analysis
                                                                                                                            1. Web Server Log Analysis
                                                                                                                              1. Firewall Log Analysis
                                                                                                                                1. IDS/IPS Log Analysis
                                                                                                                              2. Metadata and Document Analysis
                                                                                                                                1. Metadata Extraction
                                                                                                                                  1. exiftool
                                                                                                                                    1. Image Metadata
                                                                                                                                      1. Document Metadata
                                                                                                                                        1. GPS Data Extraction
                                                                                                                                        2. strings
                                                                                                                                          1. binwalk
                                                                                                                                          2. Document Analysis
                                                                                                                                            1. PDF Analysis
                                                                                                                                              1. pdfid
                                                                                                                                                1. pdf-parser
                                                                                                                                                  1. peepdf
                                                                                                                                                  2. Office Document Analysis
                                                                                                                                                    1. oledump
                                                                                                                                                      1. oletools
                                                                                                                                                    2. Steganography Detection
                                                                                                                                                      1. steghide
                                                                                                                                                        1. stegdetect
                                                                                                                                                          1. outguess
                                                                                                                                                        2. Mobile Device Forensics
                                                                                                                                                          1. Android Forensics
                                                                                                                                                            1. ADB (Android Debug Bridge)
                                                                                                                                                              1. Physical Acquisition
                                                                                                                                                                1. Logical Acquisition
                                                                                                                                                                  1. Application Analysis
                                                                                                                                                                  2. iOS Forensics
                                                                                                                                                                    1. iTunes Backup Analysis
                                                                                                                                                                      1. Physical Acquisition Challenges
                                                                                                                                                                        1. Application Data Analysis
                                                                                                                                                                      2. Timeline Analysis
                                                                                                                                                                        1. Timeline Creation
                                                                                                                                                                          1. log2timeline
                                                                                                                                                                            1. plaso
                                                                                                                                                                            2. Timeline Analysis Tools
                                                                                                                                                                              1. Timeline Explorer
                                                                                                                                                                                1. Super Timeline Analysis
                                                                                                                                                                                2. Event Correlation
                                                                                                                                                                                  1. Cross-System Timeline
                                                                                                                                                                                    1. Anomaly Detection
                                                                                                                                                                                  2. Forensic Reporting
                                                                                                                                                                                    1. Report Structure
                                                                                                                                                                                      1. Executive Summary
                                                                                                                                                                                        1. Technical Analysis
                                                                                                                                                                                          1. Evidence Documentation
                                                                                                                                                                                            1. Conclusions and Recommendations
                                                                                                                                                                                            2. Evidence Documentation
                                                                                                                                                                                              1. Chain of Custody Forms
                                                                                                                                                                                                1. Hash Verification
                                                                                                                                                                                                  1. Screenshot Documentation
                                                                                                                                                                                                  2. Case Management
                                                                                                                                                                                                    1. Evidence Tracking
                                                                                                                                                                                                      1. Case Notes
                                                                                                                                                                                                        1. Collaboration Tools