Skip to content

Latest commit

 

History

History

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 

README.md

KAPE (Kroll Artifact Parser and Extractor)

Kape

Toolset Download

Working with KAPE

  • When trying to access a network drive via cmd: pushd \\vmware-host\Shared Folders

  • When viewing files in excel, start by freezing top row AND autofilter.

  • With RECmd, in Registry/\*.csv check the Deleted column.

  • With Amcache, in ProgramExecution\*AssociatedFileEntires, nice to see what else a program installed.

  • With PECmd, check the \*PECmd_Output{,_Timeline}.csv

  • In EventLogs\EvtxECmd_Output.csv you can find the correlated Computer Username ('@Name":"Username","#text":""') and User's SID ('@Name":"UserSid","#text":"S-1-5-21....')

  • Can run multiple targets/modules at once with comma seperated list.

  • Should include this RECmd_Batch_MC for the RECmd Module.

  • View *.csv's with Timeline Explorer

    Useful Cmds

    PS> reg add HKLM\Software\Classes\.tkape /v PerceivedType /d text # Open files in File Explorer's preview pane
    PS> reg add HKLM\Software\Classes\.mkape /v PerceivedType /d text
    
    C:>kape --mlist . # List KAPE's Modules
    C:>kape --tlist . # List KAPE's Targets
    C:>kape --sync    # Update KAPE's Targets and Modules from Github
    
    # Ran KAPE on WinToolTester for collection step
    C:>kape --tsource c --target !BasicCollection --tdest Z:\WinToolTester\KAPE_output 
    
    # Ran KAPE on Investigator machine after transfering collected files from VMware shared folder
    C:>kape --msource c:\Users\investigator\Desktop\KAPE_output\c --module !EZParser --mdest C:\Users\investigator\Desktop\KAPE_output\module.output 
    
    # Src: <https://dfirtnt.wordpress.com/2020/06/09/find-evil-in-5-easy-steps-part2/amp/>
    RECmd.exe --d  "C:\Temp\Cases\inc123\files\C" --regex --sa "(\\programdata\\.+\.|\\temp\\.+\.|\\users\\.+\.)(exe|bat|lnk|ps1|cmd|com|vbs|js|jse|wsh|mht|htm|hta|vba|vbe|scr|cpl|msc|jar|vb|reg)"