Author: Kayla Green
Front-end wrapper for The Volatility Framework.
This tool acts as an interactive, easier-to-use wrapper around the already popular Volatility framework. Currently the tool is written in python and uses subprocess calls (ew, I know) due to the cumbersome nature of the Volatility libraries.
Call/Run program using:
./tessera
After booting, Tessera will ask if you'd like to make a case.
Creating a case means that all information entered will be stored in a file for easy record keeping.
Choosing no skips the case building option.
>
Choosing yes brings you into the case building menu. Case takes a string for input.
Enter case name: Case#067 - Mark Phillips
Enter investigator names: John Doe
Mary Sue
.
Enter full path to image: /home/john/forensics/mark.imgTessera then will hash the image using the SHA-1 algorithm. This hash will be displayed to you. If you chose to build a case, this information will be stored in a file at the end of the Tessera run.
Tessera then takes the image and runs imageinfo on it to get a list of profiles. It automatically lists these and then asks you to choose a number. If no number is specified (you just hit enter), it will grab the first option. If you choose OTHER, it will prompt for a profile name. This must be a valid profile that Volatility knows about.
Profile appears to be:
1. WIN7SP0x64
2. WIN7SP1x64
3. OTHER
Choose profile: 3
Enter profile: WIN2008R2SP0x64
<code> Case successfully built.
From here on out, Tessera will ask questions about what type of information you want to get from the image. List of supported plugins can be found in the plugins.txt file. By default, this is the same list of plugins in the standalone copy of the Volatility Framework. To call a plugin, simply type in its name.
Information gathered will be found in a directory located in the CWD where the image file sits in this format:
/IMAGE_LOCATION/Tessera/case_file/output
In addition, a hail mary option is available to drill through all available plugins. This is not a smart function and does not perform OS detection; use at your own risk.
- Create log of volatility commands utilized on backend (FINISHED)
- Create base Tessera config file to store commonly chosen items (investigator names, etc.)
- Generate LaTeX-built Forensic Reports of Collected Information and Commands Issued
- Rebuild in C++ for Speed and easier transport