Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Save bigsnarfdude/5af050d145550fa92ed9b0d8e8beed09 to your computer and use it in GitHub Desktop.
Save bigsnarfdude/5af050d145550fa92ed9b0d8e8beed09 to your computer and use it in GitHub Desktop.
iocs
Here are some examples of IoCs:
Network IoCs:
Unusual network traffic patterns: Abnormal outbound network traffic, a sudden increase in traffic from a specific IP address, or communication with unknown or malicious domains.
Unusual DNS requests: Requests for known malicious domains or unusual DNS queries.
Mismatched port-application traffic: An application or process communicating over a network port it shouldn't be using.
Host-Based IoCs:
Unauthorized access to system resources: Access to servers, databases, or sensitive data without proper authorization.
Changes to system files or configurations: Unexplained or unauthorized modifications to system configurations or settings.
Unexpected software installations or updates: Unusual or unexpected software being installed or updated on a system.
Suspicious registry changes: Changes to the Windows registry that suggest malicious activity.
@bigsnarfdude
Copy link
Author

Claude Forensic Workstation Setup Guide

Architecture Overview

┌─────────────────────────────────────────────────────────────┐
│                 Forensic Workstation                        │
├─────────────────────────────────────────────────────────────┤
│  ┌─────────────┐  ┌─────────────┐  ┌─────────────────────┐  │
│  │ Claude Code │◄─┤ MCP Server  │◄─┤ Forensic Tools      │  │
│  │ CLI Client  │  │ Hub         │  │ • Volatility 3      │  │
│  └─────────────┘  └─────────────┘  │ • YARA              │  │
│         │                          │ • Strings           │  │
│         ▼                          │ • Binwalk           │  │
│  ┌─────────────────────────────────┤ • Custom Scripts    │  │
│  │         Evidence Storage        │ └─────────────────────┘  │
│  │ • Memory Dumps                  │                          │
│  │ • Disk Images                   │ ┌─────────────────────┐  │
│  │ • Network Captures              │ │ Analysis Database   │  │
│  │ • Log Files                     │ │ • IOCs              │  │
│  │ • Metadata                      │ │ • Timeline          │  │
│  └─────────────────────────────────┤ │ • Chain of Custody │  │
│                                    │ │ • Reports           │  │
│                                    │ └─────────────────────┘  │
└─────────────────────────────────────────────────────────────┘

Hardware Requirements

Minimum Specs

  • CPU: 8+ cores (memory analysis is CPU intensive)
  • RAM: 32GB+ (need 2x largest memory dump size)
  • Storage: 2TB+ SSD (fast I/O for large dumps)
  • Network: Gigabit+ (for evidence transfer)

Recommended Professional Setup

  • CPU: Intel i9/AMD Ryzen 9 (16+ cores)
  • RAM: 128GB+ DDR4/DDR5
  • Storage:
    • 1TB NVMe SSD (OS and tools)
    • 8TB+ Enterprise SSD (evidence storage)
    • External backup storage
  • GPU: Optional for ML-based analysis

Software Stack Installation

1. Base Operating System

# Ubuntu 22.04 LTS or Windows 11 Pro
# For Ubuntu:
sudo apt update && sudo apt upgrade -y

# Install essential tools
sudo apt install -y python3.11 python3-pip git curl wget \
    build-essential cmake ninja-build pkg-config \
    sqlite3 postgresql-client docker.io docker-compose

2. Python Environment Setup

# Create isolated forensics environment
python3.11 -m venv ~/.forensics-env
source ~/.forensics-env/bin/activate

# Install core dependencies
pip install --upgrade pip setuptools wheel
pip install mcp httpx volatility3 yara-python
pip install pandas numpy matplotlib seaborn
pip install requests beautifulsoup4 lxml

3. Volatility 3 Installation

# Clone and install Volatility 3
git clone https://github.com/volatilityfoundation/volatility3.git
cd volatility3
pip install -e .

# Download symbol tables
mkdir -p ~/.volatility3/symbols
# Download from: https://downloads.volatilityfoundation.org/

4. Claude Code Installation

# Install Claude Code (when available)
curl -fsSL https://anthropic.com/claude-code/install.sh | sh
# Or follow official installation instructions

5. MCP Servers Setup

# Clone the Volatility MCP Server
git clone https://github.com/bornpresident/Volatility-MCP-Server.git
cd Volatility-MCP-Server

# Configure paths
cp config.example.json config.json
# Edit config.json with your paths

Directory Structure

/opt/forensics/
├── evidence/              # Evidence storage
│   ├── case-001/
│   │   ├── memory/        # Memory dumps
│   │   ├── disk/          # Disk images
│   │   ├── network/       # PCAP files
│   │   └── metadata.json  # Case information
│   └── case-002/
├── tools/                 # Forensic tools
│   ├── volatility3/
│   ├── yara-rules/
│   └── custom-scripts/
├── output/                # Analysis results
│   ├── reports/
│   ├── iocs/
│   └── timelines/
├── databases/             # Analysis databases
│   ├── iocs.db
│   ├── cases.db
│   └── threat-intel.db
└── configs/               # Configuration files
    ├── mcp-servers.json
    ├── claude-config.json
    └── workflows/

MCP Server Configuration

Central MCP Hub Configuration

{
  "mcpServers": {
    "volatility": {
      "command": "python",
      "args": ["/opt/forensics/mcp-servers/volatility-server.py"],
      "env": {
        "VOLATILITY_PATH": "/opt/forensics/tools/volatility3",
        "EVIDENCE_PATH": "/opt/forensics/evidence"
      }
    },
    "threat-intel": {
      "command": "python",
      "args": ["/opt/forensics/mcp-servers/threat-intel-server.py"],
      "env": {
        "VT_API_KEY": "${VIRUSTOTAL_API_KEY}",
        "OTX_API_KEY": "${ALIENVAULT_API_KEY}"
      }
    },
    "ioc-manager": {
      "command": "python", 
      "args": ["/opt/forensics/mcp-servers/ioc-server.py"],
      "env": {
        "DB_PATH": "/opt/forensics/databases/iocs.db"
      }
    },
    "evidence-chain": {
      "command": "python",
      "args": ["/opt/forensics/mcp-servers/evidence-server.py"],
      "env": {
        "CHAIN_DB": "/opt/forensics/databases/cases.db"
      }
    }
  }
}

Security Considerations

Air-Gapped Setup (High Security)

# For sensitive cases - no internet access
# Use local threat intel databases
# Manual IOC updates via removable media
# Local documentation and tools only

Network-Connected Setup (Standard)

# Controlled internet access
# Automatic threat intel updates
# Cloud backup capabilities
# Remote collaboration features

Access Controls

# User authentication
sudo adduser forensics-analyst
sudo usermod -aG forensics,docker forensics-analyst

# File permissions
sudo chown -R forensics-analyst:forensics /opt/forensics
sudo chmod -R 750 /opt/forensics/evidence
sudo chmod -R 755 /opt/forensics/tools

Workflow Examples

Case Initialization

# Claude Code workflow
claude-code init-case \
  --case-id "CASE-2025-001" \
  --evidence-files "/import/memory.dmp,/import/disk.e01" \
  --analyst "john.doe" \
  --priority "high"

Automated Analysis

# Natural language analysis
claude-code analyze \
  --case "CASE-2025-001" \
  --query "Perform initial triage on all evidence and identify potential IOCs"

# Specific analysis
claude-code analyze \
  --memory-dump "memory.dmp" \
  --query "Look for signs of APT activity and lateral movement"

Report Generation

# Comprehensive incident report
claude-code report \
  --case "CASE-2025-001" \
  --template "incident-response" \
  --output "/opt/forensics/output/reports/"

Maintenance and Updates

Regular Maintenance

#!/bin/bash
# weekly-maintenance.sh

# Update tools
cd /opt/forensics/tools/volatility3 && git pull
pip install --upgrade volatility3 yara-python

# Update threat intel
python /opt/forensics/scripts/update-threat-intel.py

# Database maintenance
sqlite3 /opt/forensics/databases/iocs.db "VACUUM;"

# Clean temp files
find /tmp -name "vol_*" -mtime +7 -delete

Backup Strategy

# Evidence backup (daily)
rsync -av /opt/forensics/evidence/ /backup/forensics/evidence/

# Database backup (daily)
sqlite3 /opt/forensics/databases/iocs.db ".backup /backup/forensics/db/iocs-$(date +%Y%m%d).db"

# Configuration backup (weekly)
tar -czf /backup/forensics/configs-$(date +%Y%m%d).tar.gz /opt/forensics/configs/

Getting Started Checklist

Initial Setup

  • Install base operating system and updates
  • Configure hardware (adequate RAM, fast storage)
  • Install Python environment and dependencies
  • Install and configure Volatility 3
  • Install Claude Code
  • Clone and configure MCP servers
  • Set up directory structure and permissions
  • Configure threat intelligence API keys
  • Test basic functionality

First Case

  • Initialize case directory structure
  • Import evidence files
  • Run initial Claude Code analysis
  • Verify IOC extraction
  • Test threat intelligence lookup
  • Generate sample report
  • Document lessons learned

Production Readiness

  • Implement backup procedures
  • Configure monitoring and logging
  • Document standard operating procedures
  • Train analysts on Claude Code workflows
  • Establish case review processes
  • Plan maintenance schedules

Cost Considerations

Hardware (One-time)

  • Workstation: $3,000 - $8,000
  • Storage: $500 - $2,000
  • Backup solution: $300 - $1,000

Software (Annual)

  • Claude Code: TBD (when released)
  • Commercial forensic tools: $0 - $5,000
  • Threat intelligence feeds: $1,000 - $10,000
  • Cloud services (if used): $500 - $2,000

Training and Support

  • Analyst training: $2,000 - $5,000
  • Ongoing support: $1,000 - $3,000

This setup creates a powerful, Claude Code-enabled forensic workstation that can dramatically improve incident response capabilities while maintaining proper evidence handling procedures.

@bigsnarfdude
Copy link
Author

Summary: Claude Code for Digital Forensics & IOC Detection

Key Discussion Points

1. Memory Forensics Foundation

  • Volatility 3 as the core memory analysis framework
  • Memory acquisition methods: WinPmem, DumpIt, FTK Imager
  • Analysis techniques: Process analysis, network connections, malware detection, registry examination
  • IOC extraction from memory artifacts for threat hunting

2. Claude Code Integration Strategy

  • Natural language interface to complex forensic tools
  • Automated workflow orchestration instead of manual command sequences
  • Complex pattern recognition across multiple data sources
  • Intelligent correlation of findings with threat intelligence

3. MCP (Model Context Protocol) Tools Architecture

We identified 5 essential MCP tools:

  • volatility-mcp: Memory analysis automation
  • threat-intel-mcp: IOC enrichment and reputation checking
  • ioc-manager-mcp: IOC storage, search, and management
  • sysinfo-collector-mcp: Live system data collection
  • evidence-chain-mcp: Chain of custody and integrity tracking

4. Existing Implementation

  • Found Volatility-MCP-Server project that already bridges Volatility 3 with Claude
  • Provides natural language interface to memory forensics
  • Addresses forensic case backlogs through automation

5. Forensic Workstation Requirements

  • Hardware: 32GB+ RAM, fast SSDs, multi-core CPU
  • Software stack: Python environment, Volatility 3, Claude Code, MCP servers
  • Architecture: Centralized workstation with all tools and evidence access
  • Security: Air-gapped options, proper access controls, backup procedures

Potential Gaps & Missing Elements

Technical Gaps:

  1. Timeline Correlation: How to correlate events across multiple evidence sources (memory, disk, network, logs)
  2. Automated Reporting: Structured incident reports with evidence linking
  3. Case Management: Multi-case tracking, analyst assignment, progress monitoring
  4. Quality Assurance: Validation of automated findings, false positive handling

Integration Gaps:

  1. SIEM Integration: Connecting findings back to security monitoring platforms
  2. Threat Intelligence Platforms: MISP, OpenCTI, commercial TI platform integration
  3. Ticketing Systems: ServiceNow, Jira integration for case tracking
  4. Evidence Management: Integration with existing digital evidence management systems

Operational Gaps:

  1. Scalability: How to handle multiple concurrent investigations
  2. Collaboration: Multi-analyst workflows, knowledge sharing
  3. Training: Analyst onboarding for Claude Code workflows
  4. Compliance: Meeting legal/regulatory requirements for digital evidence

Advanced Capabilities:

  1. Machine Learning: Behavioral analysis, anomaly detection, threat classification
  2. Real-time Monitoring: Live memory analysis during active incidents
  3. Cross-Platform: Linux, macOS memory analysis capabilities
  4. Mobile Forensics: Android/iOS memory analysis integration

Next Steps Recommendations

Phase 1: Foundation (Immediate)

  • Set up forensic workstation with basic specs
  • Install and configure Volatility-MCP-Server
  • Test Claude Code integration with sample memory dumps
  • Document basic workflows and procedures

Phase 2: Enhancement (Short-term)

  • Develop threat-intel-mcp and ioc-manager-mcp tools
  • Add automated IOC extraction and enrichment
  • Implement basic reporting capabilities
  • Create evidence integrity tracking

Phase 3: Integration (Medium-term)

  • Connect to organizational threat intelligence feeds
  • Integrate with existing security tools and workflows
  • Develop advanced correlation capabilities
  • Add multi-case management features

Phase 4: Advanced (Long-term)

  • Machine learning-based threat detection
  • Real-time incident response capabilities
  • Multi-platform forensic support
  • Enterprise-scale deployment

Key Benefits Summary

For Analysts:

  • Reduced learning curve for complex forensic tools
  • Faster investigation times through automation
  • Natural language interaction with technical systems
  • Automated correlation and pattern recognition

For Organizations:

  • Improved incident response times
  • Better utilization of junior staff
  • Consistent analysis procedures
  • Enhanced threat intelligence utilization

For the Forensics Field:

  • Democratization of advanced forensic capabilities
  • Address expert shortage through AI assistance
  • Improved case throughput and backlog reduction
  • Better knowledge retention and sharing

Critical Success Factors

  1. Tool Quality: Reliable MCP implementations that don't introduce errors
  2. Security: Proper evidence handling and chain of custody maintenance
  3. Training: Analysts understanding both capabilities and limitations
  4. Integration: Seamless workflow with existing tools and processes
  5. Validation: Methods to verify automated findings and catch false positives

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment