Skip to content

This project is a beginner-friendly forensic analysis environment built using Kali Linux. It's designed for analyzing suspicious or unknown files in a controlled setting — without needing external drives or VMs.

Notifications You must be signed in to change notification settings

stfxn-303/forensic-sandbox

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🕵️ Forensic Sandbox (Kali Linux)

This project is a beginner-friendly forensic analysis environment built using Kali Linux. It's designed for analyzing suspicious or unknown files in a controlled setting — without needing external drives or VMs.

🔎 Example: Metadata Extraction with ExifTool

ExifTool Screenshot

📁 Project Structure

    ├── evidence_vault/ # Stores sample data for analysis 
    │ └── sample_data/ # Example files (txt, images, docs, etc.)
    ├── recovered_files/ # Output from recovery tools like foremost
    ├── logs/ # Stores analysis logs
    └── scripts/ # Any custom analysis or automation scripts

🧪 Tools Used

  • exiftool – metadata extraction
  • foremost – file carving / deleted file recovery
  • file – file type identification
  • strings – extract readable strings from binaries
  • hexdump – low-level file inspection

🛠️ Setup

  1. Make project directories:
   ```bash
      mkdir -p ~/forensic-sandbox/{evidence_vault/sample_data,recovered_files,logs,scripts}
  1. (Optional) Create test files:
   echo "Test file one" > ~/forensic-sandbox/evidence_vault/sample_data/test1.txt
   echo "Another sample" > ~/forensic-sandbox/evidence_vault/sample_data/test2.txt
  1. Install tools:
    sudo apt update
    sudo apt install exiftool foremost

🔍 Sample Analysis Workflow

  1. Identify file types:
```file ~/forensic-sandbox/evidence_vault/sample_data/*
  1. Extract metadata:
```exiftool ~/forensic-sandbox/evidence_vault/sample_data/test1.txt
  1. Carve for deleted files:
```sudo foremost -i ~/forensic-sandbox/evidence_vault/sample_data/test1.txt -o ~/forensic-sandbox/recovered_files/
  1. Extract strings:
```strings ~/forensic-sandbox/evidence_vault/sample_data/test1.txt
  1. Log your findings:
```echo "Sample findings..." >> ~/forensic-sandbox/logs/session1.log

About

This project is a beginner-friendly forensic analysis environment built using Kali Linux. It's designed for analyzing suspicious or unknown files in a controlled setting — without needing external drives or VMs.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published