Login Password
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z #

Download SANS Investigative Forensic Toolkit Workstation v2.0

SANS Investigative Forensic Toolkit Workstation 2.0 VMware Appliance | 1.49GB

Faculty Fellow Rob Lee created the SANS Investigative Forensic Toolkit(SIFT) Workstation featured in the Computer Forensic Investigations and Incident Response course (FOR 508) in order to show that advanced investigations and investigating hackers can be accomplished using freely available open-source tools. The SANS SIFT Workstation is a VMware Appliance that is pre-configured with all the necessary tools to perform a detailed digital forensic examination. It is compatible with Expert Witness Format (E01), Advanced Forensic Format (AFF), and raw (dd) evidence formats. The brand new version has been completely rebuilt on an Ubuntu base with many additional tools and capabilities that can match any modern forensic tool suite.

Basic Configuration Information

Recommend to increase VMware Options for

* Download VMworkstation, Player, or Fusion

* Memory (Currently 1024K, increase to add more RAM as needed)

* CPUs (Currently 1, increase as needed for more power)

SIFT Login/Password

After downloading the toolkit, use the credentials below to gain access.

Login "sansforensics"

Password "forensics"

* $ sudo su -

o Use to elevate privileges to root while mounting disk images.

PTK login

* Login "admin"

* Password "forensics"

Host Machine Connectivity


* VM -> SETTINGS -> OPTIONS -> Shared Folders -> Always Enabled (Check)

* Access to Host System Found on Desktop

* VMware-Shared-Drive

Access from a Windows Machine

* Filesystem Shares \\SIFTWORKSTATION

o /mnt - Mount point for read-only examination of digital forensic evidence

o /cases - Directory to store evidence

SIFT Workstation Recommended Software Requirements

* VMware Player, Workstation, or Fusion (Free From www.vmware.com)

* SANS SIFT Workstation Capabilities

SIFT Workstation 2.0 Capabilities

Ability to securely examine raw disks, multiple file systems, evidence formats. Places strict guidelines on how evidence is examined (read-only) verifying that the evidence has not changed

File system support

* Windows (MSDOS, FAT, VFAT, NTFS)


* Solaris (UFS)

* Linux (EXT2/3)

Evidence Image Support

* Expert Witness (E01)

* RAW (dd)

* Advanced Forensic Format (AFF)

Software Includes

* The Sleuth Kit (File system Analysis Tools)

* log2timeline (Timeline Generation Tool)

* ssdeep & md5deep (Hashing Tools)

* Foremost/Scalpel (File Carving)

* WireShark (Network Forensics)

* Vinetto (thumbs.db examination)

* Pasco (IE Web History examination)

* Rifiuti (Recycle Bin examination)

* Volatility Framework (Memory Analysis)

* DFLabs PTK (GUI Front-End for Sleuthkit)

* Autopsy (GUI Front-End for Sleuthkit)

* PyFLAG (GUI Log/Disk Examination)

Key Directories in SANS SIFT Workstation

* /forensics

o Location of the files used for the Autopsy Toolset

* /usr/local/src

o Source files for Autopsy, The Sleuth Kit, and other tools

* /usr/local/bin

o Location of the forensic pre-compiled binaries

* /cases

o Location of your collected evidence

* /mnt/hack

o Location of the mount points for the file system images