Forensic Triage is rapid analysis during an incident to quickly understand what happened. Unlike full forensic investigation (which takes days/weeks), triage gives you answers in minutes/hours. The goal: determine scope, identify IOCs, and guide containment.
Think of triage like an ER doctor doing a quick assessment. They don't run every test immediately - they check vitals, ask key questions, and decide what's urgent. Similarly, forensic triage checks key artifacts to understand the situation fast.
Triage vs Full Forensics
Triage: Quick assessment during active incident. Focus on speed and actionable intel. Full forensics: Thorough investigation for legal proceedings or deep analysis. Focus on completeness and chain of custody.
Order of Volatility
Memory is Critical
Modern malware often runs only in memory ("fileless"). If you power off without memory capture, you lose the malware entirely. Always capture memory before shutdown if possible!
Memory Triage
Disk Triage
Key Artifacts
Triage Tools
Eric Zimmerman Tools
The "EZ Tools" are essential for Windows forensics. Download them all at ericzimmerman.github.io. Key tools: MFTECmd (MFT parsing), PECmd (Prefetch), RECmd (Registry), EvtxECmd (Event logs).
Linux Triage
Triage Methodology
Forensic Triage Workflow
1
Secure SceneIsolate system, document state
2
Capture MemoryMost volatile - do first!
3
Collect ArtifactsKAPE or similar for key files
4
Quick AnalysisProcess list, network, autoruns
5
Extract IOCsIdentify malware, C2, accounts
6
ReportDocument findings for IR team
7
DecideFull forensics needed or enough data?
Knowledge Check
Challenges
Key Takeaways
- Triage is fast assessment - answers key questions in minutes, not days
- Collect in order of volatility: memory first, then disk
- Memory reveals running processes, connections, and fileless malware
- Key Windows artifacts: Prefetch, Registry, Event Logs, MFT
- KAPE collects artifacts; Volatility analyzes memory
- Document everything - triage findings guide response actions