Skip to content

WiredPulse/AutomatedProfiler

Repository files navigation

AutomatedProfiler

Alt text
AutomatedProfiler will parse an image utilizing RegRipper, RECmd, and various PowerShell cmdlets. The output of the script will be in a text file called 'profiler.txt' and will contain information about said system such as system info, networking settings, firewall details, user data, autorun, service, and mru keys. The returned data will not provide you everything you need to do forensics on the image but it will present a lot of the data that you would find yourself looking for.

Usage

In order for this script to work, it will need to be in the same directory with the other supporting directories (RegRipper, RECmd, and plugins) that are included. A mounted image also needs to be available through FTK Imager.

  1. Mount an image using FTK Imager.
  2. Take note of the drive letter assigned to the mounted image.
  3. Download this repository.
  4. Unzip the contents of the zip.
  5. Verify that a folder called ‘AutomatedProfiler-master’ is what was unzipped.
  6. In PowerShell, navigate to the AutomatedProfiler-master directory and type '.\profiler.ps1'.
  7. When prompted, input the drive letter assigned to the image. This will be in the form of e:, d:, etc...
  8. Analyze the profiler.txt and mft.csv files once the script completes.

# Output Example output from this script is in the '__example_output.txt' within this repo.

About

Automated forensics written in PowerShell

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •  

Languages