DFIR Workflow Cheatsheet
Investigation Phases Overview
Phase
Name
Primary Focus
Key Outputs
Stage
Phases
Objective
Phase 1: Incident Detection & Initial Triage
1.1 Detection Sources
Source
Indicators
Priority
1.2 Initial Triage Questions
1.3 Rapid Triage Commands
1.4 Triage Decision Matrix
Finding
Risk Level
Immediate Action
Phase 2: Evidence Collection & Preservation
2.1 Order of Volatility
2.2 Live Evidence Collection Script
2.3 Memory Acquisition
2.4 Disk Imaging
Phase 3: Live System Analysis
3.1 Process Investigation
3.2 Network Investigation
3.3 User Account Investigation
Phase 4: Filesystem Analysis
4.1 File Timeline Analysis
4.2 Suspicious File Locations
4.3 Binary Analysis
4.4 Web Shell Detection
4.5 What to Look For - Filesystem
Phase 5: Log Analysis
5.1 Key Log Locations
Log File
Content
Distribution
5.2 Authentication Log Analysis
5.3 System Log Analysis
5.4 Binary Log Analysis
5.5 Shell History Analysis
5.6 Journald Analysis
5.7 What to Look For - Logs
Phase 6: Memory Forensics
6.1 Memory Acquisition
6.2 Memory Analysis with Volatility 3
6.3 What to Look For - Memory
Phase 7: Persistence Mechanism Analysis
7.1 Cron-Based Persistence
7.2 Systemd Persistence
7.3 Init Script Persistence
7.4 Shell Configuration Persistence
7.5 SSH Persistence
7.6 Library Preloading Persistence
7.7 Kernel Module Persistence
7.8 Additional Persistence Locations
7.9 Persistence Detection Summary
Location
Check Command
Risk Level
Phase 8: Timeline Analysis
8.1 Timeline Generation
8.2 Timeline Correlation
8.3 Timeline Analysis Focus Areas
Phase 9: Root Cause Analysis
9.1 Attack Vector Identification
Vector
Evidence Sources
Key Indicators
9.2 Vulnerability Assessment
9.3 Attack Reconstruction
9.4 Impact Assessment
9.5 Root Cause Categories
Category
Examples
Remediation Focus
Phase 10: Containment & Remediation Recommendations
10.1 Immediate Containment Actions
10.2 Remediation Checklist
10.3 Indicators of Compromise (IOC) Documentation
IOC Summary Template
File Indicators
Type
Value
Context
Network Indicators
Type
Value
Context
Host Indicators
Type
Value
Context
Behavioural Indicators
Quick Reference: Essential Commands
System Overview
Process Hunting
Network Hunting
File Hunting
Log Hunting
Persistence Hunting
Appendix A: Tool Installation
Essential DFIR Tools
LiME Installation
Volatility 3 Installation
Appendix B: Investigation Documentation Template
Linux DFIR Investigation Report
Case Information
Executive Summary
Timeline of Events
Date/Time
Event
Source
Notes
Technical Findings
Initial Access
Persistence Mechanisms
Lateral Movement
Data Impact
Indicators of Compromise
Root Cause Analysis
Recommendations
Evidence Inventory
Item
Description
Hash
Location
Appendices
Last updated