digital-forensics
1
总安装量
1
周安装量
#47653
全站排名
安装命令
npx skills add https://smithery.ai
Agent 安装分布
kilo
1
claude-code
1
Skill 文档
Digital Forensics Skill
Digital forensics toolkit for analyzing systems, files, and artifacts.
When to Use
- Forensic analysis of files or systems
- Security incident investigation
- Evidence preservation, file integrity verification
- Keywords: “forensics”, “investigation”, “evidence”, “audit”
Core Capabilities
1. File System Analysis
- Directory structure, file access timeline
- Deleted file recovery traces
- Hidden file detection
2. Hash Verification
- MD5, SHA1, SHA256, SHA512 checksums
- File integrity verification
- Chain of custody documentation
3. Timeline Reconstruction
- Event timeline generation
- File operation sequences
- User activity patterns
4. Evidence Preservation
- Write-blocking recommendations
- Hash-based verification
- Chain of custody tracking
Quick Reference
Commands
# File metadata
stat <file>
file <file>
exiftool <file>
# File hashing
md5sum <file>
shasum -a 256 <file>
# Timeline analysis
find /path -type f -printf '%T@ %Tc %p\n' | sort -n
find /path -mtime -7 -type f
# Deleted file recovery
photorec /d /path/to/output /path/to/device
testdisk
Workflow
- Initial Assessment: Document state, calculate baseline hashes
- Data Collection: Extract metadata, generate file listings
- Analysis: Timeline reconstruction, pattern identification
- Reporting: Evidence documentation, findings summary
Best Practices
- â Always work on copies, never originals
- â Document every step
- â Maintain chain of custody
- â Hash verify all evidence
- â Never modify original evidence
- â Don’t skip documentation
Use Cases
- Security Incident: Baseline â Recent modifications â Login history â Timeline
- File Integrity: Calculate hashes â Compare baseline â Document results
- Data Recovery: Analyze journal â Check fragments â Assess recovery
Output Format
- Executive Summary: High-level findings
- Timeline: Chronological events
- Evidence List: All artifacts
- Hash Values: Examined files
- Recommendations: Next steps
Limitations
- Cannot recover physically overwritten data
- Encrypted data requires keys
- Anti-forensics may hide evidence
Integration
- metadata-extraction: File metadata analysis
- threat-hunting: Timeline reconstruction
- file-organization: Evidence preservation