improve tools.yaml
This commit is contained in:
parent
d8eb2b556b
commit
a3613327e2
2035
src/data/tools.yaml
2035
src/data/tools.yaml
File diff suppressed because it is too large
Load Diff
220
src/data/tools.yaml.example
Normal file
220
src/data/tools.yaml.example
Normal file
@ -0,0 +1,220 @@
|
|||||||
|
tools:
|
||||||
|
- name: Rapid Incident Response Triage on macOS
|
||||||
|
icon: 📋
|
||||||
|
type: method
|
||||||
|
description: >-
|
||||||
|
Spezialisierte Methodik für die schnelle Incident Response auf
|
||||||
|
macOS-Systemen mit Fokus auf die Sammlung kritischer forensischer
|
||||||
|
Artefakte in unter einer Stunde. Adressiert die Lücke zwischen
|
||||||
|
Windows-zentrierten IR-Prozessen und macOS-spezifischen
|
||||||
|
Sicherheitsarchitekturen. Nutzt Tools wie Aftermath für effiziente
|
||||||
|
Datensammlung ohne zeitaufwändige Full-Disk-Images. Besonders wertvoll für
|
||||||
|
Unternehmensumgebungen mit gemischten Betriebssystem-Landschaften.
|
||||||
|
domains:
|
||||||
|
- incident-response
|
||||||
|
- static-investigations
|
||||||
|
- malware-analysis
|
||||||
|
phases:
|
||||||
|
- data-collection
|
||||||
|
- examination
|
||||||
|
platforms: []
|
||||||
|
related_concepts: null
|
||||||
|
related_software:
|
||||||
|
- Aftermath
|
||||||
|
domain-agnostic-software: null
|
||||||
|
skillLevel: intermediate
|
||||||
|
accessType: null
|
||||||
|
url: >-
|
||||||
|
https://www.sans.org/white-papers/rapid-incident-response-on-macos-actionable-insights-under-hour/
|
||||||
|
projectUrl: null
|
||||||
|
license: null
|
||||||
|
knowledgebase: null
|
||||||
|
tags:
|
||||||
|
- macos
|
||||||
|
- rapid-response
|
||||||
|
- triage
|
||||||
|
- incident-response
|
||||||
|
- aftermath
|
||||||
|
- enterprise
|
||||||
|
- methodology
|
||||||
|
- apple
|
||||||
|
- name: Aftermath
|
||||||
|
icon: 📦
|
||||||
|
type: software
|
||||||
|
description: >-
|
||||||
|
Jamf's Open-Source-Tool für die schnelle Sammlung forensischer Artefakte
|
||||||
|
auf macOS-Systemen. Sammelt kritische Daten wie Prozessinformationen,
|
||||||
|
Netzwerkverbindungen, Dateisystem-Metadaten und Systemkonfigurationen ohne
|
||||||
|
Full-Disk-Imaging. Speziell entwickelt für die Rapid-Response-Triage in
|
||||||
|
Enterprise-Umgebungen mit macOS-Geräten. Normalisiert Zeitstempel und
|
||||||
|
erstellt durchsuchbare Ausgabeformate für effiziente Analyse.
|
||||||
|
domains:
|
||||||
|
- incident-response
|
||||||
|
- static-investigations
|
||||||
|
- malware-analysis
|
||||||
|
phases:
|
||||||
|
- data-collection
|
||||||
|
- examination
|
||||||
|
platforms:
|
||||||
|
- macOS
|
||||||
|
related_concepts:
|
||||||
|
- Hash Functions & Digital Signatures
|
||||||
|
related_software: null
|
||||||
|
domain-agnostic-software: null
|
||||||
|
skillLevel: intermediate
|
||||||
|
accessType: download
|
||||||
|
url: https://github.com/jamf/aftermath/
|
||||||
|
projectUrl: ''
|
||||||
|
license: Apache 2.0
|
||||||
|
knowledgebase: false
|
||||||
|
tags:
|
||||||
|
- macos
|
||||||
|
- incident-response
|
||||||
|
- triage
|
||||||
|
- artifact-collection
|
||||||
|
- rapid-response
|
||||||
|
- jamf
|
||||||
|
- enterprise
|
||||||
|
- commandline
|
||||||
|
- name: Regular Expressions (Regex)
|
||||||
|
icon: 🔤
|
||||||
|
type: concept
|
||||||
|
description: >-
|
||||||
|
Pattern matching language for searching, extracting, and manipulating
|
||||||
|
text. Essential for log analysis, malware signature creation, and data
|
||||||
|
extraction from unstructured sources. Forms the backbone of many forensic
|
||||||
|
tools and custom scripts.
|
||||||
|
domains:
|
||||||
|
- incident-response
|
||||||
|
- malware-analysis
|
||||||
|
- network-forensics
|
||||||
|
- fraud-investigation
|
||||||
|
phases:
|
||||||
|
- examination
|
||||||
|
- analysis
|
||||||
|
platforms: []
|
||||||
|
related_concepts: null
|
||||||
|
related_software: null
|
||||||
|
domain-agnostic-software: null
|
||||||
|
skillLevel: intermediate
|
||||||
|
accessType: null
|
||||||
|
url: https://regexr.com/
|
||||||
|
projectUrl: null
|
||||||
|
license: null
|
||||||
|
knowledgebase: true
|
||||||
|
tags:
|
||||||
|
- pattern-matching
|
||||||
|
- text-processing
|
||||||
|
- log-analysis
|
||||||
|
- string-manipulation
|
||||||
|
- search-algorithms
|
||||||
|
- name: SQL Query Fundamentals
|
||||||
|
icon: 🗃️
|
||||||
|
type: concept
|
||||||
|
description: >-
|
||||||
|
Structured Query Language for database interrogation and analysis.
|
||||||
|
Critical for examining application databases, SQLite artifacts from
|
||||||
|
mobile devices, and browser history databases. Enables complex
|
||||||
|
correlation and filtering of large datasets.
|
||||||
|
domains:
|
||||||
|
- incident-response
|
||||||
|
- mobile-forensics
|
||||||
|
- fraud-investigation
|
||||||
|
- cloud-forensics
|
||||||
|
phases:
|
||||||
|
- examination
|
||||||
|
- analysis
|
||||||
|
platforms: []
|
||||||
|
related_concepts: null
|
||||||
|
related_software: null
|
||||||
|
domain-agnostic-software: null
|
||||||
|
skillLevel: intermediate
|
||||||
|
accessType: null
|
||||||
|
url: https://www.w3schools.com/sql/
|
||||||
|
projectUrl: null
|
||||||
|
license: null
|
||||||
|
knowledgebase: false
|
||||||
|
tags:
|
||||||
|
- database-analysis
|
||||||
|
- query-language
|
||||||
|
- data-correlation
|
||||||
|
- mobile-artifacts
|
||||||
|
- browser-forensics
|
||||||
|
- name: Hash Functions & Digital Signatures
|
||||||
|
icon: 🔐
|
||||||
|
type: concept
|
||||||
|
description: >-
|
||||||
|
Cryptographic principles for data integrity verification and
|
||||||
|
authentication. Fundamental for evidence preservation, malware
|
||||||
|
identification, and establishing chain of custody. Understanding of MD5,
|
||||||
|
SHA, and digital signature validation.
|
||||||
|
domains:
|
||||||
|
- incident-response
|
||||||
|
- static-investigations
|
||||||
|
- malware-analysis
|
||||||
|
- cloud-forensics
|
||||||
|
phases:
|
||||||
|
- data-collection
|
||||||
|
- examination
|
||||||
|
platforms: []
|
||||||
|
related_concepts: null
|
||||||
|
related_software: null
|
||||||
|
domain-agnostic-software: null
|
||||||
|
skillLevel: advanced
|
||||||
|
accessType: null
|
||||||
|
url: https://en.wikipedia.org/wiki/Cryptographic_hash_function
|
||||||
|
projectUrl: null
|
||||||
|
license: null
|
||||||
|
knowledgebase: false
|
||||||
|
tags:
|
||||||
|
- cryptography
|
||||||
|
- data-integrity
|
||||||
|
- evidence-preservation
|
||||||
|
- malware-identification
|
||||||
|
- chain-of-custody
|
||||||
|
domains:
|
||||||
|
- id: incident-response
|
||||||
|
name: Incident Response & Breach-Untersuchung
|
||||||
|
- id: static-investigations
|
||||||
|
name: Datenträgerforensik & Ermittlungen
|
||||||
|
- id: malware-analysis
|
||||||
|
name: Malware-Analyse & Reverse Engineering
|
||||||
|
- id: fraud-investigation
|
||||||
|
name: Betrugs- & Finanzkriminalität
|
||||||
|
- id: network-forensics
|
||||||
|
name: Netzwerk-Forensik & Traffic-Analyse
|
||||||
|
- id: mobile-forensics
|
||||||
|
name: Mobile Geräte & App-Forensik
|
||||||
|
- id: cloud-forensics
|
||||||
|
name: Cloud & Virtuelle Umgebungen
|
||||||
|
- id: ics-forensics
|
||||||
|
name: Industrielle Kontrollsysteme (ICS/SCADA)
|
||||||
|
phases:
|
||||||
|
- id: data-collection
|
||||||
|
name: Datensammlung
|
||||||
|
description: Imaging, Acquisition, Remote Collection Tools
|
||||||
|
- id: examination
|
||||||
|
name: Auswertung
|
||||||
|
description: Parsing, Extraction, Initial Analysis Tools
|
||||||
|
- id: analysis
|
||||||
|
name: Analyse
|
||||||
|
description: Deep Analysis, Correlation, Visualization Tools
|
||||||
|
- id: reporting
|
||||||
|
name: Bericht & Präsentation
|
||||||
|
description: >-
|
||||||
|
Documentation, Visualization, Presentation Tools (z.B. QGIS für Geodaten,
|
||||||
|
Timeline-Tools)
|
||||||
|
domain-agnostic-software:
|
||||||
|
- id: collaboration-general
|
||||||
|
name: Übergreifend & Kollaboration
|
||||||
|
description: Cross-cutting tools and collaboration platforms
|
||||||
|
- id: specific-os
|
||||||
|
name: Betriebssysteme
|
||||||
|
description: Operating Systems which focus on forensics
|
||||||
|
scenarios:
|
||||||
|
- id: registry
|
||||||
|
icon: 🗃️
|
||||||
|
friendly_name: "Registry-Analyse"
|
||||||
|
- id: memory-forensics
|
||||||
|
icon: 🧠
|
||||||
|
friendly_name: "Memory-Forensik"
|
Loading…
x
Reference in New Issue
Block a user