Introduction to KAPE

Поділитися
Вставка
  • Опубліковано 25 лип 2024
  • As a continuation of the "Introduction to Windows Forensics" series, this episode covers an exciting new tool from Kroll and Eric Zimmerman called KAPE. From the developer, KAPE is an efficient and highly configurable triage program that will target essentially any device or storage location, find forensically useful artifacts, and parse them within a few minutes.
    ** If you enjoy this video, please consider supporting 13Cubed on Patreon at patreon.com/13cubed. **
    Introducing KAPE (Kroll Website):
    www.kroll.com/en/insights/pub...
    Introducing KAPE (Eric Zimmerman's Blog):
    binaryforay.blogspot.com/2019...
    Background Music Courtesy of Anders Enger Jensen:
    / hariboosx
    #Forensics #DigitalForensics #DFIR #ComputerForensics #WindowsForensics #KAPE
  • Наука та технологія

КОМЕНТАРІ • 27

  • @s.8494
    @s.8494 2 місяці тому

    Your videos are really valuable, thank you for the content you provide.

  • @christianjohansen9068
    @christianjohansen9068 4 роки тому

    Great intro video, thanks for taking the time!

  • @lautarob
    @lautarob 4 роки тому +1

    Excellent video, as usual. Thanks!

  • @ivanbogdasaebersold4690
    @ivanbogdasaebersold4690 5 років тому +1

    Excelent video and explanation, thank you!

  • @richmcelroy2382
    @richmcelroy2382 5 років тому +3

    Thanks. I just downloaded to test and your video made starting much easier. Keep up the good work

  • @gerardocaudillo1902
    @gerardocaudillo1902 5 років тому

    Awesome videos! Thank you so much

  • @IBITZEE
    @IBITZEE 5 років тому +2

    Great video.. Thanks...
    I was testing the EZ tools individually but this aggregation too seems more useful...
    Please make a video about he available modules and what they do...
    Thanks again...

  • @emran5897
    @emran5897 5 років тому +1

    Thanks for the video.........Sulthan

  • @TheMeltzz
    @TheMeltzz Рік тому +1

    Is so easy to understand with your video

  • @SajidKiani1
    @SajidKiani1 5 років тому

    Thanks for this great video. When you'll share the next of this for detail of all features?

  • @commandblocker2266
    @commandblocker2266 3 роки тому +1

    Thanks. great tool for fast evidence collection and finding leads. can you pl post something on creating and applying new modules?

    • @13Cubed
      @13Cubed  3 роки тому

      Interesting suggestion - I will consider a future episode that covers those topics.

  • @SecureTheWorld
    @SecureTheWorld 5 років тому

    Excellent Video, could you please list software used to edit your videos!

    • @13Cubed
      @13Cubed  5 років тому

      An iMac Pro and ScreenFlow primarily, and FCPX in the future for more advanced things.

  • @adkleiner
    @adkleiner 5 років тому +1

    When you run this on a live system, isn't there a concern of mistakenly modifying evidence? I know that this is a method of logical acquistion but I assume it can also run against targets which are mounted read only (from a physical acquisition previously done)?

    • @13Cubed
      @13Cubed  5 років тому +1

      Sure, when you run *anything* on a live system, including a memory capture, you are technically changing evidence. This cannot be helped, but the most important thing you can do is to document, document, document, especially if you suspect the investigation could be criminal or referred to law enforcement. Of course, as you stated, you could grab memory, verify encryption isn't in play, power off the system, and then create a triage image with KAPE against the drive connected via a write blocker.

  • @AnmutMossie
    @AnmutMossie Рік тому

    Target !ALL doesn't work in the newer versions. Any explanation?

  • @Calm_Energy
    @Calm_Energy 5 років тому +1

    Surprised you're not using powershell!

    • @Calm_Energy
      @Calm_Energy 5 років тому +1

      oh I see you switched to ps at the very end, just wondering if there was any particular reason not to use it from the beginning? I read cmd prompt will be getting phased out? Thanks for such great quality videos!

    • @13Cubed
      @13Cubed  5 років тому +2

      ​@@Calm_Energy No reason, I'm just old school. :)

  • @harshpanchal2202
    @harshpanchal2202 5 років тому

    Can this be used with docker?

    • @13Cubed
      @13Cubed  5 років тому +1

      Harsh Panchal Are you asking if it can be used to forensicate a Docker image, or if you can run it within Docker?

    • @harshpanchal2202
      @harshpanchal2202 5 років тому

      @@13CubedYes sorry, I meant if it can run with Docker?

    • @13Cubed
      @13Cubed  5 років тому +1

      ​@@harshpanchal2202 To be honest, I've never tried. Some testing will be required :)

    • @harshpanchal2202
      @harshpanchal2202 5 років тому

      @@13Cubed cool no worries mate. I'm planning to try that out so thought let me ask you. But please if you do let me know how it goes. Thanks

  • @kape5469
    @kape5469 4 роки тому

    My name