Thanks to visit codestin.com
Credit goes to github.com

Skip to content

codeyourweb/fastfinder

Repository files navigation

FastFinder - Incident Response - Fast suspicious file finder

Golang Linux windows

What is this project designed for?

FastFinder is a lightweight tool made for threat hunting, live forensics and triage on both Windows and Linux Platforms. It is focused on enpoint enumeration and suspicious file finding based on various criterias:

  • file path / name
  • md5 / sha1 / sha256 checksum
  • simple string content match
  • complex content condition(s) based on YARA

Installation

Compiled release of this software are available. If you want to compile from sources, it could be a little bit tricky because it strongly depends of go-yara and CGO compilation. Anyway, you'll find a detailed documentation for windows and for for linux

Usage

usage: fastfinder [-h|--help] [-c|--configuration "configuration.yaml"] [-b|--build
                  "path_to_package_bin"] [-o|--output "log_file.log"] [-n|--nowindow]
                  [-p|--showprogress] [-v|--version]

                  Incident Response - Fast suspicious file finder

Arguments:

  -h  --help           Print help information
  -c  --configuration  Fastfind configuration file. Default: configuration.yaml
  -b  --build          Output a standalone package with configuration and rules in a single binary
  -o  --output         Save fastfinder logs in the specified file
  -n  --nowindow       Hide fastfinder window
  -p  --showprogress   Display I/O analysis progress
  -v  --version        Display fastfinder version

Depending on where you are looking for files, FastFinder could be used with admin OR simple user rights.

Scan and export file match according to your needs

configuration examples are available there

input:
    path: [] # match file path AND / OR file name based on simple string 
    content:
        grep: [] # match literal string value inside file content
        yara: [] # use yara rule and specify rules path(s) for more complex pattern search (wildcards / regex / conditions) 
        checksum: [] # parse for md5/sha1/sha256 in file content 
options:
    contentMatchDependsOnPathMatch: true # if true, paths are a pre-filter for content searchs. If false, paths and content both generate matchs
    findInHardDrives: true	# enumerate hard drive content
    findInRemovableDrives: true # enumerate removable drive content 
    findInNetworkDrives: true # enumerate network drive content
    findInCDRomDrives: true # enumerate physical CD-ROM and mounted iso / vhd...
output:
    base64Files: true # base64 matched content before copy
    filesCopyPath: '' # empty value will copy matched files in the fastfinder.exe folder

Note for input path:

  • '?' for simple char and '\*' for multiple chars wildcards are available for simple string
  • environment variables are also available
  • regular expression are allowed , they should be enclosed by //
  • input path are always case INSENSITIVE
  • input content grep strings are always case SENSITIVE
  • backslashes haven't to be escaped on simple string pattern (see example)

About this project

I initially created this project to automate the creation of fastfind on a wide computer network. It fulfills the needs I have today, nevertheless if you have complementary ideas, do not hesitate to ask for, I will see to implement them if they can be useful for everyone. On the other hand, pull request will be studied carefully.

Future releases

I don't plan to add any additional features right now. The next release will be focused on:

  • Stability / performance improvements
  • Unit testing / Code testing coverage / CI
  • Build more examples based on live malwares tradecraft and threat actor campaigns

About

Incident Response - Fast suspicious file finder

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published