Quantcast
Channel: SANS Internet Storm Center, InfoCON: green
Viewing all articles
Browse latest Browse all 8255

Tool Tip: Kansa Stafford released, PowerShell for DFIR, (Mon, Aug 17th)

$
0
0

In his most recent post, Guy asked Are You a Hunter?. Heres one way to become one.

Dave Hull has just published the Stafford release of his exemplary PowerShell DFIR tool, Kansa. For the uninitiated, Kansa is amodular incident response framework in Powershell.(PS v3 or higher preferred)that uses Powershell Remoting to run user contributed modules across hosts in an enterprise to collect data for use during incident response, breach hunts, or for building an environmental
baseline.

Per Daves release notes for Stafford, Kansa.ps1has several new command line parameters, including:

  • -OutputFormat:an optional parameter that takes an argument that specifies the format of collected output. Valid values are CSV, JSON, TSV and XML (yuck).
  • -UseSSL:if present, this will be passed to the New-PSSession call and remote sessions will use Secure Sockets Layer. Note this does require that youve installed appropriate certificates.
  • -Port:an optional parameter that takes a port number. Use this when WinRM is configured to listen on a non-standard port.
  • -Authentication:an optional parameter that takes an argument that specifies what authentication mechanism should be used. Kerberos is still the default, but all WinRM authentication mechanisms are now supported. You can even do risky things like Basic or CredSSP, but I wouldnt recommend it.
  • -JSONDepth:an optional parameter that takes an integer argument specifying the level of depth for object serialization to JSON.

For more details you can read whyKansas Stafford release is more capable, more forensically sound, and more flexible via Daves TrustedSignal">|">@holisticinfosec

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Viewing all articles
Browse latest Browse all 8255

Trending Articles