Skip to content

ronwellman/AutomatedProfiler

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

35 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

AutomatedProfiler

Alt text
AutomatedProfiler will parse an image utilizing RegRipper, RECmd, and various PowerShell cmdlets. The output of the script will be in a text file called 'profiler.txt' and will contain information about said system such as system info, networking settings, firewall details, user data, autorun, service, and mru keys. The returned data will not provide you everything you need to do forensics on the image but it will present a lot of the data that you would find yourself looking for.

Usage

In order for this script to work, it will need to be in the same directory with the other supporting directories (RegRipper, RECmd, and plugins) that are included. A mounted image also needs to be available through FTK Imager.

  1. Mount an image using FTK Imager.
  2. Take note of the drive letter assigned to the mounted image.
  3. Download this repository.
  4. Unzip the contents of the zip.
  5. Verify that a folder called ‘AutomatedProfiler-master’ is what was unzipped.
  6. In PowerShell, navigate to the AutomatedProfiler-master directory and type '.\profiler.ps1'.
  7. When prompted, input the drive letter assigned to the image.
  8. Analyze the profiler.txt file once the script completes.

$drive_letter = read-host "Input drive letter of the attached drive with Registry hives (example - e:)"


# Output Example output from this script is in the '__example_output.txt' within this repo.

About

Automated forensics written in PowerShell

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Perl 97.3%
  • Other 2.3%
  • PowerShell 0.4%