awk -F '|' '
BEGIN{
# the '|'-delimited fields that contain BMC timestamps
fields[0]=11;
fields[1]=9;
fields[2]=10;
}
{
| #!/bin/bash | |
| # Extracts all INDX attributes from an NTFS image using Sleuthkit utilities | |
| # Willi Ballenthin <[email protected]>, 2013 | |
| # Updates provided by Stefan Kelm, 2013 | |
| usage() | |
| { | |
| cat <<EOF | |
| Usage: $0 offset /path/to/image/ /path/to/output/directory/ | |
| EOF |
| <?xml version="1.0" encoding="UTF-8"?> | |
| <opml version="1.0"> | |
| <head> | |
| <title>xolot1 subscriptions in Google Reader</title> | |
| </head> | |
| <body> | |
| <outline text="Believe the Lie" title="Believe the Lie" | |
| type="rss" xmlUrl="http://www.sygyzy.com/feed/" htmlUrl="http://www.sygyzy.com"/> | |
| <outline text="Life Is Too Short For Bad Code" | |
| title="Life Is Too Short For Bad Code" type="rss" |
| def parse_windows_timestamp(hex_str): | |
| """ | |
| @type hex_str: str | |
| @param hex_str: A string that contains a hex encoded QWORD (8 bytes) that are a Windows timestamp. | |
| @rtype: str | |
| @return: A string that contains an ISO formatted timestamp. | |
| """ | |
| import struct, binascii | |
| from datetime import datetime | |
| return datetime.utcfromtimestamp(float(struct.unpack_from("<Q", binascii.unhexlify(hex_str.replace(" ", "")))[0]) * 1e-7 - 11644473600).isoformat("T") |
| 0000 2A 2A 00 00 D0 09 00 00 19 68 00 00 00 00 00 00 **.......h...... | |
| 0010 64 82 38 8A FA 88 CC 01 0F 01 01 00 0C 01 84 30 d.8............0 | |
| 0020 7C 5E 26 02 00 00 00 00 00 00 84 30 7C 5E 67 73 |^&........0|^gs | |
| 0030 6B 9F C7 6D 8C BB A4 C5 45 C8 96 04 00 00 0F 01 k..m....E....... | |
| 0040 01 00 41 11 00 8A 04 00 00 4D 02 00 00 00 00 00 ..A......M...... | |
| 0050 00 BA 0C 05 00 45 00 76 00 65 00 6E 00 74 00 00 .....E.v.e.n.t.. | |
| 0060 00 87 00 00 00 06 6A 02 00 00 00 00 00 00 BC 0F ......j......... | |
| 0070 05 00 78 00 6D 00 6C 00 6E 00 73 00 00 00 05 01 ..x.m.l.n.s..... | |
| 0080 35 00 68 00 74 00 74 00 70 00 3A 00 2F 00 2F 00 5.h.t.t.p.:././. | |
| 0090 73 00 63 00 68 00 65 00 6D 00 61 00 73 00 2E 00 s.c.h.e.m.a.s... |
| python-evtx/scripts - [master] » python eid_record_numbers.py /tmp/Security.evtx 4624 | |
| 26902 | |
| 26907 | |
| 26909 | |
| 26912 | |
| 26914 | |
| 26916 | |
| 26919 | |
| 26921 | |
| 26924 |
| python-registry/samples - [master●] » python timeline.py --bodyfile /tmp/NTUSER.DAT | |
| 0|[Registry NTUSER] $$$PROTO.HIV|0|0|0|0|0|1307730644|0|0|0 | |
| 0|[Registry NTUSER] $$$PROTO.HIV\AppEvents|0|0|0|0|0|1281972745|0|0|0 | |
| 0|[Registry NTUSER] $$$PROTO.HIV\AppEvents\EventLabels|0|0|0|0|0|1289599433|0|0|0 | |
| 0|[Registry NTUSER] $$$PROTO.HIV\AppEvents\EventLabels\.Default|0|0|0|0|0|1281972745|0|0|0 | |
| 0|[Registry NTUSER] $$$PROTO.HIV\AppEvents\EventLabels\ActivatingDocument|0|0|0|0|0|1281981027|0|0|0 | |
| 0|[Registry NTUSER] $$$PROTO.HIV\AppEvents\EventLabels\AppGPFault|0|0|0|0|0|1281972745|0|0|0 | |
| 0|[Registry NTUSER] $$$PROTO.HIV\AppEvents\EventLabels\BlockedPopup|0|0|0|0|0|1281981027|0|0|0 | |
| 0|[Registry NTUSER] $$$PROTO.HIV\AppEvents\EventLabels\CCSelect|0|0|0|0|0|1281981027|0|0|0 | |
| 0|[Registry NTUSER] $$$PROTO.HIV\AppEvents\EventLabels\Close|0|0|0|0|0|1281972745|0|0|0 |
| python-registry/samples - [master●] » python regfetch.py /tmp/NTUSER.DAT "Software\\Sysinternals\\PsExec" EulaAccepted | |
| 1 |
| #!/bin/bash | |
| max_block_number=200781 # CHANGEME | |
| device=/dev/loop0 # CHANGEME | |
| offset=0; | |
| cont=1; | |
| while [[ cont -eq 1 ]]; do | |
| sudo mount -t ext3 -o ro,sb=$offset "$device" /mnt > /dev/null 2>&1; | |
| suc=$?; | |
| if [[ suc -ne 32 ]]; then |
| #!/usr/bin/python | |
| import sys | |
| from struct import unpack_from as old_unpack_from | |
| from struct import unpack_from as old_unpack | |
| from struct import calcsize | |
| from collections import OrderedDict | |
| # From: http://code.activestate.com/recipes/577197-sortedcollection/ | |
| from SortedCollection import SortedCollection |