Incident response and forensic tool Thank you for your interest. Please contact author for other essential files required to run this tool.
- Parse and process triage output files, saving them in pgsql
- Process memory captures using volatility
- Parse and process volatility output files, saving them in pgsql
- Perform baseline, long tail analysis and correlation using above data, stored in pgsql
- Identify CVE vulnerabilities based on software applications installed
- Upload file hashes to VT and automatically process unknown files through cuckoo
- Spoofed email identifier
- Windows Log Parser
- Windows malicious document identifier
These instructions will get you a copy of the project up and running on your local machine for development and testing purposes.
- Download Magneto Files from "https://github.com/padfoot999/magneto"
- Install Python 2.7 (32 bit)
- Configure Python Path in Windows System Environment Variables
- Install PostgreSQL
- Go to PGAdmin, create server with the following setting
Name: "magneto"
Host name/Add: "127.0.0.1"
User name: postgres
Password: kpmg@123 - Create "magneto" database within server
- Install all necessary python modules (i.e. Pandas, psycopg2) using pip
- Make sure that workstation has Powershell v4.0 and above installed
- Launch Ubuntu VM and process Memory (.raw) file using PROCESS_memory.py file. Dump Volatility output into the Evidence folder within each Incident folder.
- Process Event Logs using Windows Powershell (WINTEL.ps1) file.
- Run PROCESS_postTriage File (Outputs RegRipper, SRUM-DUMP, WebCache Files, MFT, JLECMD TSV File)
- Run submit.py file
- Run Baseline, ProcessDiff, ProcessNetworkConnections, AutoRunMerged, CVE Checker Python scripts
- Run Summary file
- Post Triage
python PROCESS_postTriage.py -d <Path to Incident folder> -p <Project Name (i.e. RADIUM)>
- Submitting Incident Folders into Postgresql database
python submit.py -d <Path to Incident folder> -p <Project Name (i.e. RADIUM)>
- Output Baseline
python OUTPUT_baselineCSV.py -p <Project Name (i.e. RADIUM)>
python OUTPUT_baselineXLSX.py -p <Project Name (i.e. RADIUM)>
- Output Process Difference
python OUTPUT_processDifference.py -p <Project Name (i.e. RADIUM)>
- Output Process Network Connections
python OUTPUT_processNetworkConn.py -p <Project Name (i.e. RADIUM)>
- Output Process Network Connections
python OUTPUT_processNetworkConn.py -p <Project Name (i.e. RADIUM)>
- Output Merged AutoRun Paths
python OUTPUT_autorunMerge.py -d <Path to Incident folder> -p <Project Name (i.e. RADIUM)>
- Output cveChecker
python OUTPUT_cveChecker.py -p <Project Name (i.e. RADIUM)>
python OUTPUT_cveChecker.py -p <Project Name (i.e. RADIUM)> -t <Image Name (i.e. 20170117115236 - AERO Incident)
- Output Summary File
python OUTPUT_summary.py -d <Path to Incident folder> -r <Output folder after running PROCESS_postTriage.py> -p <Project Name (i.e. RADIUM)>
python OUTPUT_summary.py -d "E:\\" -r "F:\\magneto v2\\results\\ARGON" -p ARGON
cd <Magneto WINTEL folder>
.\WINTEL_WindowsLogParser-v?.ps1 -logPath <...\Evidence\Logs)> -project <ARGON>