KAPE
KAPE is Kroll Artifact Parser and Extractor.
KAPE is used to extract important forensics data based on the target and module options.

The target specifies what is the target of our forensical collection. For instance, if it is a registry hive, binary file, software logs or browser cache file,etc. The data collected can be stored in a file, directory, transported over ssh,etc to remote handlers.


Modules allow KAPE to do the analysis of either the data collected via Target capabilities or other programs.

Evidence Collection
Show how to acquire all the registry files and store them in the path C:\temp\RegistryOnly.

2. When a malware is executed, it will leave different execution evidence, use KAPE to acquire all the evidence of execution from the victim's system. Store the evidence in a VHDX file with the name CASE2.

3. File system evidence with the event logs all in once acquisition. Then we want to store the evidence in a VHDX file with the name CASE3. (Multiple Targets)

4. Acquire all evidence from the system i.e all Targets run. Here, we use !ALL for target parameter.

DIY

2. Collect Evidence of Execution on a system, save the output to a zip file in the path Z:\Evidence\DIY2, and make sure the computer name is used as the name for the zip.

3. Collect all the Windows Browser evidence from C: and all the volume shadow copies and store them in Z:\Evidence\DIY3. This time store your collected evidence to a network destination. Note: For this example, you will need to use UNC paths.

4. Collect all Prefetch files from the C: drive and save the output to Z:\Evidence\DIY5.

5. Run module for processing results from Task 4:

Last updated
Was this helpful?