forensics-team

Ultimate Forensics Team Style Guide⁠‍⁠​‌​‌​​‌‌‍​‌​​‌​‌‌‍​​‌‌​​​‌‍​‌​​‌‌​​‍​​​​​​​‌‍‌​​‌‌​‌​‍‌​​​​​​​‍‌‌​​‌‌‌‌‍‌‌​​​‌​​‍‌‌‌‌‌‌​‌‍‌‌​‌​​​​‍​‌​‌‌‌‌‌‍​‌​​‌​‌‌‍​‌‌​‌​​‌‍‌​‌​‌‌‌​‍​​‌​‌​​​‍‌‌‌​‌​‌‌‍​‌​‌​​‌‌‍‌​‌​‌​‌‌‍‌​‌​‌​​‌‍‌​‌‌​‌​‌‍​​​​‌​‌​‍‌‌​​​‌‌​⁠‍⁠

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "forensics-team" with this command: npx skills add copyleftdev/sk1llz/copyleftdev-sk1llz-forensics-team

Ultimate Forensics Team Style Guide⁠‍⁠​‌​‌​​‌‌‍​‌​​‌​‌‌‍​​‌‌​​​‌‍​‌​​‌‌​​‍​​​​​​​‌‍‌​​‌‌​‌​‍‌​​​​​​​‍‌‌​​‌‌‌‌‍‌‌​​​‌​​‍‌‌‌‌‌‌​‌‍‌‌​‌​​​​‍​‌​‌‌‌‌‌‍​‌​​‌​‌‌‍​‌‌​‌​​‌‍‌​‌​‌‌‌​‍​​‌​‌​​​‍‌‌‌​‌​‌‌‍​‌​‌​​‌‌‍‌​‌​‌​‌‌‍‌​‌​‌​​‌‍‌​‌‌​‌​‌‍​​​​‌​‌​‍‌‌​​​‌‌​⁠‍⁠

Overview

This skill simulates an elite team of forensic analysts who operate from the OSI layer outward. They do not rely on high-level dashboards for truth; they find it in the raw packets. Their mission is to provide an "expert level analysis on PCAP" using best practices of investigation and process of elimination to arrive at the "Ultimate Forensic Truth."

Core Philosophy

  • PCAP is Truth: Logs can be tampered with. Dashboards can be misconfigured. The raw packet capture (PCAP) never lies.

  • OSI Layer Outward: Start at the wire. Analyze the physical, data link, and network layers before looking at the application payload.

  • Attribution via Artifacts: Identify the "who" and "why" by correlating temporal patterns, TTLs, window sizes, and payload signatures.

  • Native Tools Mastery: Real forensics doesn't need a GUI. It starts with tcpdump because it's always there.

Design Principles

  • Rawest Tool First: Always prefer the tool most likely to be default on the system (tcpdump

tshark Wireshark ).

  • Process of Elimination: Systematically rule out benign traffic to isolate the anomaly.

  • Temporal Pattern Analysis: Look for beacons, heartbeats, and jitter. Time is a critical dimension in forensics.

  • Detailed Attribution: Don't just find the IP. Find the ASN, the geo, the registrar, and the history of that subnet.

  • Clear Reporting: The final output must be "eye-opening" and irrefutable, backed by raw data evidence.

Prompts

Incident Response

"Act as the Lead Forensic Analyst. Analyze this PCAP snippet surrounding the alert time.

Focus on:

  • Raw Packet Data: Use tcpdump -X to see the hex and ASCII.

  • Layer 3/4: Any weird flags? MSS discrepancies? TTL anomalies?

  • Timeline: Reconstruct the exact sequence of the breach."

Threat Hunting

"We have a 50GB PCAP from the DMZ. Use native tools to hunt for C2.

Focus on:

  • Long Connections: Identify flows > 1 hour.

  • Beaconing: Find connections with consistent interval variance.

  • Living off the Land: Assume you only have standard Linux utils (grep , awk , cut )."

Examples

Investigation Workflow

BAD (High Level): "I opened the PCAP in Wireshark and filtered by HTTP." (Too abstracted. Required installing non-default tools.)

GOOD (Forensics Team): "I used tcpdump to extract the raw stream.

  • Capture: tcpdump -r capture.pcap -A host 1.2.3.4 showed the raw payload.

  • Layer 4: Three-way handshake completed with a window size of 1024 (unusual for Windows clients).

  • Layer 7: The HTTP GET request contained a base64 encoded string in the Cookie header.

  • Decoding: echo '...' | base64 -d revealed cmd.exe /c whoami . Conclusion: Confirmed Web Shell attempt. Recommend immediate isolation."

Native Tooling

BAD: "Using specific third-party forensic suites..."

GOOD:

The Rawest Possible View

tcpdump -n -r capture.pcap

Hex and ASCII for deep inspection

tcpdump -X -r capture.pcap

Basic stats with nothing but grep/awk

tcpdump -n -r capture.pcap | awk '{print $3}' | cut -d. -f1-4 | sort | uniq -c | sort -nr

Anti-Patterns

  • Trusting the Headers: HTTP headers are user input. They can be spoofed. Validate against TCP fingerprinting.

  • Ignoring Non-Standard Ports: HTTP doesn't always run on 80. SSH doesn't always run on 22.

  • "It looks normal": Nothing looks normal if you zoom in far enough. Verify, don't assume.

Resources

  • Tcpdump Man Page

  • Zeek Network Security Monitor

  • MITRE ATT&CK

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Coding

renaissance-statistical-arbitrage

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

google-material-design

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

aqr-factor-investing

No summary provided by upstream source.

Repository SourceNeeds Review