All Projects → kd8bny → Limeaide

kd8bny / Limeaide

Licence: gpl-3.0
A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local host.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Limeaide

pyaff4
The Python implementation of the AFF4 standard.
Stars: ✭ 37 (-74.31%)
Mutual labels:  digital-forensics
Velociraptor
Digging Deeper....
Stars: ✭ 680 (+372.22%)
Mutual labels:  digital-forensics
Tcpflow
TCP/IP packet demultiplexer. Download from:
Stars: ✭ 1,231 (+754.86%)
Mutual labels:  digital-forensics
artifactcollector
🚨 The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system
Stars: ✭ 140 (-2.78%)
Mutual labels:  digital-forensics
Thehivedocs
Documentation of TheHive
Stars: ✭ 353 (+145.14%)
Mutual labels:  digital-forensics
Whatfiles
Log what files are accessed by any Linux process
Stars: ✭ 800 (+455.56%)
Mutual labels:  digital-forensics
Red-Rabbit-V4
The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate other peoples tools like the aircrack suite or the wifite framework, it rather has its own code and is raw source with over 270+ options. This framework might just be your everyday key to your workflow
Stars: ✭ 123 (-14.58%)
Mutual labels:  digital-forensics
C Aff4
An AFF4 C++ implementation.
Stars: ✭ 126 (-12.5%)
Mutual labels:  digital-forensics
Cortex
Cortex: a Powerful Observable Analysis and Active Response Engine
Stars: ✭ 676 (+369.44%)
Mutual labels:  digital-forensics
Beagle
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Stars: ✭ 976 (+577.78%)
Mutual labels:  digital-forensics
CASE
Cyber-investigation Analysis Standard Expression (CASE) Ontology
Stars: ✭ 46 (-68.06%)
Mutual labels:  digital-forensics
Kuiper
Digital Forensics Investigation Platform
Stars: ✭ 257 (+78.47%)
Mutual labels:  digital-forensics
Artifacts
📇 Digital Forensics Artifact Repository (forensicanalysis edition)
Stars: ✭ 21 (-85.42%)
Mutual labels:  digital-forensics
catalyst
Catalyst is an open source SOAR system that helps to automate alert handling and incident response processes
Stars: ✭ 91 (-36.81%)
Mutual labels:  digital-forensics
Kobackupdec
Huawei backup decryptor
Stars: ✭ 94 (-34.72%)
Mutual labels:  digital-forensics
ForensicsTools
A list of free and open forensics analysis tools and other resources
Stars: ✭ 392 (+172.22%)
Mutual labels:  digital-forensics
Memlabs
Educational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+383.33%)
Mutual labels:  digital-forensics
Thehive4py
Python API Client for TheHive
Stars: ✭ 143 (-0.69%)
Mutual labels:  digital-forensics
Awesome Forensics
A curated list of awesome forensic analysis tools and resources
Stars: ✭ 1,775 (+1132.64%)
Mutual labels:  digital-forensics
Forensic Tools
CIRCL system forensic tools or a jumble of tools to support forensic
Stars: ✭ 27 (-81.25%)
Mutual labels:  digital-forensics

LiMEaide

v2.0

by Daryl Bennett - kd8bny[at]gmail[dot]com

About

LiMEaide is a python application designed to remotely or locally dump RAM of a Linux client and create a volatility profile for later analysis on your local host. I hope that this will simplify Linux digital forensics in a remote environment. In order to use LiMEaide all you need to do is feed a remote Linux client IP address, sit back, and consume your favorite caffeinated beverage.

LiMEaide has 3 primary modes of operation

  1. Remote - Initiates connection with SSH and transfers data over SFTP
  2. Socket - Initiates a connection with SSH but transfers the memory image over a TCP socket. This means that the image is NOT written to disk. Tools are still transfered over SFTP.
  3. Locally - Have a copy of LiMEiade on a flash drive or other device. Does not transfer any data to the client, maintain execution in its working directory. All transfers are completed with internal methods and no network sockets are opened.

Wiki

For more detailed usage checkout the wiki

How To

TL;DR

Remote

python3 limeaide.py <IP>

and magic happens.

Local

python3 limeaide.py local

and local magic happens.

Local transfer requires the machine to have python 3 installed and dependencies. I recommend using python3-virtualenv to provide dependencies without installing on the system.

Detailed usage

limeaide.py [OPTIONS] REMOTE_IP
-h, --help
    Shows the help dialog

-u, --user : <user>
    Execute memory grab as sudo user. This is useful when root privileges are not granted.

-k, --key : <path to key> 
    Use a SSH Key to connect

-s, --socket : <port> 
    Use a TCP socket instead of a SFTP session to transfer data. Does not write the memory image to disk, but will transfer other needed files.

-o, --output : <Name desired for output> 
    Name the output file

-f, --format : <Format for LiME>
    Change the output format. Valid options are raw|lime|padded

-d, --digest : <digest>
    Use a different digest algorithm. See LiME docs for valid options
    Use 'None' to disable. 

-C, --compress
    Compress transfer over the wire. This will not work with socket or local transfers.

-p, --profile : <distro> <kernel version> <arch>
    Skip the profiler by providing the distribution, kernel version, and architecture of the remote client.

-N, --no-profiler
    Do NOT run profiler and force the creation of a new module/profile for the client.

-c, --case : <case num>
    Append case number to front of output directory.

-v, --verbose
    Display verbose output

--force-clean
    If previous attempt failed then clean up client
  • For more detailed usage checkout the wiki
  • For editing the configuration file see here
  • To import modules or external modules, just copy the module *.ko into the profiles directory. After you copy run LiMEaide and the profiler will recognize the new profile.
./profiles/

Set-up

Dependencies

python

  • DEB base
sudo apt-get install python3-paramiko python3-termcolor
  • RPM base
sudo yum install python3-paramiko python3-termcolor
  • pip3
sudo pip3 install paramiko termcolor

Installing dwarfdump

In order to build a volatility profile we need to be able to read the debugging symbols in the LKM. For this we need to install dwarfdump. If you encounter any issues finding/installing dwarfdump see the volatility page here

  • DEB package manager
sudo apt-get install dwarfdump
  • RPM package manager
sudo yum install libdwarf-tools

LiME

Auto-Install

By default LiMEaide will automatically download and place LiME in the correct directory. However, if you are disconnected from a network proceed with manual installation method in the section below.

Manually install LiME

In order to use LiME you must download and move the source into the LiMEaide/tools directory. Make sure the the LiME folder is named LiME. The full path should be as follows:

LiMEaide/tools/LiME/

How to...

  1. Download LiME v1.8.1
  2. Extract into LiMEaide/tools/
  3. Rename folder to LiME

Limits at this time

  • Only supports bash. Use other shells at your own risk
  • Modules must be built on remote client. Therefore remote client must have proper headers installed.
    • Unless you follow this guide for compiling external kernel modules. Once compiled, copy module .ko to LiMEaide profiles directory.

Special Thanks and Notes

  • The idea for this application was built upon the concept dreamed up by and the Linux Memory Grabber project
  • And of course none of this could be possible without the amazing LiME project
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].