Acquire Triage Image Using KAPE
Acquiring a Triage Image With KAPE
Setup: Download KAPE from Kroll’s site or GitHub. Run it from a USB or local folder with admin privileges on your forensic workstation.
Target: Choose your source—e.g., C: for a live system or a mounted image’s drive letter (use Arsenal Image Mounter for E01 files).
Command: Open an admin command prompt, navigate to KAPE’s directory, and run:
.\kape.exe --tsource C: --tdest "F:\EvidenceCollector\" --tflush --target !SANS_Triage --vhdx PC02 --mflush --guiOR
kape.exe --tsource C: --target KapeTriage --tdest D:\TriageOutput --vhdx TriageImage.vhdx --vss--tsource C:: Source drive to triage.
--target KapeTriage: Grabs key artifacts (registry, event logs, etc.).
--tdest D:\TriageOutput: Output folder.
--vhdx TriageImage.vhdx: Saves as a VHDX file.
--vss: Includes Volume Shadow Copies for locked/historical data.
Execution: Takes minutes depending on system size. Logs are saved in D:\TriageOutput.
Verify: Mount TriageImage.vhdx (right-click > Mount in Windows) or open in FTK Imager/Autopsy to analyse.
Tips: Add --tflush to wipe the destination first. Customise targets in the Targets folder (e.g., RegistryHives or !BasicCollection). For parsing, add --module !EZParser --mdest D:\Parsed. Ready for triage!
KAPE Cheatsheet
Basic Commands
Target
KAPE Target Extraction
Module: Live Response
Memory Dump
Live Response Command and Scanner
Module: Parsing & Scanning
All-in-one Artifact Parsing
Warning: Super Slow!
EventLog - Log Scanning & Parsing
Program Execution
File Folder Activity
NTFS and FileSystem Parsing
System Activity
Mounted Image Scanner
Last updated