Managed Detection and Response (MDR) Buyer’s Guide
Oct 31, 2022
by Marc Brawner, Mark Nicholls

KAPE Quarterly Update – Q2 2022
Jul 19, 2022
by Eric Zimmerman, Andrew Rathbun

Mon, Oct 17, 2022
KAPE had several updates during Q3 2022. Below, please find a recap of all the important enhancements and news from July through September 2022.
Eric Zimmerman and Andrew Rathbun have been working on creating manuals for the EZ Tools suite. Given that they are some of the most widely used and taught tools in the DFIR community, it only seemed fitting for official manuals to be created. On October 1, 2022, we released EZ Tools Manuals on Leanpub. Any issues with the book can be reported here.
We will continually update the manuals, so “check” the “New version available” box to be notified for new releases.
Another module for an EZ Tool has been added to KAPE. iisGeoLocate now has a Module that can be used against IIS Logs. Combined with the IISLogFiles Target, KAPE can acquire IIS Logs and parse them with iisGeoLocate. Please note that iisGeoLocate is not added to !EZParser at this time as the IISLogFiles Target isn’t a part of KapeTriage.
In addition, a Module was created for Reg_hunter, which is a Registry threat hunting tool. There are multiple Modules within KAPE to leverage the power of this tool.
Modules for Hayabusa have been updated, renamed and moved into their own dedicated folder. Hayabusa is similar to Chainsaw in that it leverages Sigma rules as well as its own Hayabusa Rules, which can be found here.
Chainsaw 2.0 has also been released. The Chainsaw Module has been updated to reflect the new syntax in Chainsaw 2.0 and newer.
Lastly, a Module was created for WMI-Parser. Combined with the WBEM Target, examiners can obtain OBJECTS.DATA and parse it with WMI-Parser with hopes to locate threat actor persistence.
Here is an overview of the changes to the KapeFiles GitHub repository from July 1, 2022 to September 30, 2022.
Our experts recommend “watching” the following GitHub repositories for KAPE-related updates:
Looking for the EZ button to keep KAPE, EZ Tools and the ancillary files associated with your instance(s) of KAPE? Check out the PowerShell script created by Kroll’s Andrew Rathbun here to ensure your copy of KAPE is being updated.
If you need additional KAPE support, explore our virtual live training and certification opportunities or contact our experts at [email protected]. An enterprise license is required when KAPE is used on a third-party network and/or as part of a paid engagement.
This article was written by Andrew Rathbun, a vice president in Kroll's Cyber Risk practice.
Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.
Find, collect and process forensically useful artifacts in minutes.
Kroll is the largest global IR provider with experienced responders who can handle the entire security incident lifecycle.
Kroll's expertise establishes whether data was compromised and to what extent. We uncover actionable information, leaving you better prepared to manage a future incident.
Kroll delivers more than a typical incident response retainer—secure a true cyber risk retainer with elite digital forensics and incident response capabilities and maximum flexibility for proactive and notification services.
Kroll's computer forensics experts ensure that no digital evidence is overlooked and assist at any stage of an investigation or litigation, regardless of the number or location of data sources.
The latest KAPE tutorials, webcasts and guides created by Kroll instructors.
Learn how to jumpstart your forensic investigations and find meaningful data fast with a live KAPE training session led by a Kroll instructor.
Kroll’s elite security leaders deliver rapid responses for over 3,000 incidents per year and have the resources and expertise to support the entire incident lifecycle.