This project is a beginner-friendly forensic analysis environment built using Kali Linux. It's designed for analyzing suspicious or unknown files in a controlled setting — without needing external drives or VMs.
├── evidence_vault/ # Stores sample data for analysis
│ └── sample_data/ # Example files (txt, images, docs, etc.)
├── recovered_files/ # Output from recovery tools like foremost
├── logs/ # Stores analysis logs
└── scripts/ # Any custom analysis or automation scripts
exiftool
– metadata extractionforemost
– file carving / deleted file recoveryfile
– file type identificationstrings
– extract readable strings from binarieshexdump
– low-level file inspection
- Make project directories:
```bash
mkdir -p ~/forensic-sandbox/{evidence_vault/sample_data,recovered_files,logs,scripts}
- (Optional) Create test files:
echo "Test file one" > ~/forensic-sandbox/evidence_vault/sample_data/test1.txt
echo "Another sample" > ~/forensic-sandbox/evidence_vault/sample_data/test2.txt
- Install tools:
sudo apt update
sudo apt install exiftool foremost
- Identify file types:
```file ~/forensic-sandbox/evidence_vault/sample_data/*
- Extract metadata:
```exiftool ~/forensic-sandbox/evidence_vault/sample_data/test1.txt
- Carve for deleted files:
```sudo foremost -i ~/forensic-sandbox/evidence_vault/sample_data/test1.txt -o ~/forensic-sandbox/recovered_files/
- Extract strings:
```strings ~/forensic-sandbox/evidence_vault/sample_data/test1.txt
- Log your findings:
```echo "Sample findings..." >> ~/forensic-sandbox/logs/session1.log