FECT

Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer

  • 所有者: jipegit/FECT
  • 平台:
  • 许可证: Other
  • 分类:
  • 主题:
  • 喜欢:
    0
      比较:

Github星跟踪图

Fast Evidence Collector Toolkit

Fast Evidence Collector Toolkit is a light incident response toolkit to collect evidences on a suspicious Windows computer.
Basically it is intended to be used by non-tech savvy people working with a journeyman Incident Handler.

It uses Microsoft autorunsc to identify binaries launched at windows startup and zip all the binaries to a zip archive.
It looks for all .exe/.com/.dll/.scr in users' home directories and add them to the zipball.
It also logs the output of some interesting network commands.

Finally the zip archive is xored to evade from AV.

Author

Jean-Philippe Teissier - @Jipe_

Development status

FECT is no longer maintained

How to install

Just copy all files from github

Dependencies

How to build

Edit FECT.py and fill the autorunsc_exe_hex_encoded variable with a hex encoded version of the autorunsc binary.
You can use the provided pyBinHexEncoder.py script to generate it.

Then type:
python setup py2exe

How to run

Just double click on it :)

If there is not Microsoft Visual C runtime DLL on the suspicious computer, you must add the Microsoft.VC90.CRT directory (containing both Microsoft.VC90.CRT.manifest and msvcr90.dll) in the same directory as FECT.exe

Default options passed to autorunsc are '-a -c -m -f' i.e. all entries with the respective hashes, except the one from Microsoft, output format is CSV.

FECT also acts as a wrapper for autorunsc. You can pass any specific options you want by using the -a option.
E.g.: FECT.py -a "-b -s -c -f"

Beware: double quotes are Mandatory. -c is mandatory as well.

Finally use pyXoredBinEn-Decoder.py to unXor the zipball.

Changelog

0.3.2

  • Autorunsc now scans all users' registry files

0.3.1

  • Handles zip archive > 2Gb
  • memory footprint reduced

0.3

0.2

  • Searches all .exe/.com/.dll/.scr in users' home directories
  • A log file is now generated
  • The outputs of 'netstat -an' and 'ipconfig /displaydns' have been added to the log file
  • The zip file is XORed to evade from AV doing their job. The default key is 0x42

0.1

  • Initial Release

License

FECT
Copyright (C) 2013 Jean-Philippe Teissier

This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program. If not, see http://www.gnu.org/licenses/.

FECT.ico comes from http://openiconlibrary.sourceforge.net/ and has its own license

主要指标

概览
名称与所有者jipegit/FECT
主编程语言Python
编程语言Python (语言数: 1)
平台
许可证Other
所有者活动
创建于2013-09-15 21:38:02
推送于2020-07-29 06:59:56
最后一次提交2020-07-29 08:59:56
发布数0
用户参与
星数42
关注者数7
派生数14
提交数14
已启用问题?
问题数0
打开的问题数0
拉请求数0
打开的拉请求数0
关闭的拉请求数0
项目设置
已启用Wiki?
已存档?
是复刻?
已锁定?
是镜像?
是私有?