Q3 2024 Cyber Threat Landscape Virtual Briefing
Our quarterly threat landscape reports are fuelled by frontline incident response intel from elite analysts.
Primarily a triage program, Kroll’s Artifact Parser and Extractor (KAPE) will target both device or storage locations to find the most forensically relevant artifacts (based on your needs) and parse them within a few minutes. Thus, arming investigators with the right tool to find and prioritize the more critical systems to their case.
"KAPE serves two primary functions: 1) collect files and 2) process collected files with one or more programs. By itself, KAPE does not do anything in relation to either of these functions, rather, they are achieved by reading configuration files on the fly, and based on the contents of these files, collecting and processing files. This makes KAPE very extensible in adding or extending functionality." – Eric Zimmerman .
This page will hold official documentation as well as the latest KAPE news, webcasts, tutorials, and more. See list below:
The Kroll Artifact Parser and Extractor (KAPE) has assisted investigators in solving insider threats faster than ever before due to its ability to process forensic artifacts within minutes.
Learn from two of our resident experts, Anthony Knutson and Aaron Read, as they discuss how best KAPE is used during insider threat investigations, its efficiencies for their teams and how it’s changing the landscape of forensic analysis.
Watch the full Insider Threat Investigations Using KAPE webcast.
In this session, KAPE creator Eric Zimmerman showcases how key Windows artifacts can be collected from a live or forensic image, parsed and reviewed in a few minutes using KAPE. Additionally, Eric demonstrates how to make custom targets to collect child exploitation material such as .jpgs, .pngs, .mp4s, etc. These examples can then be extended to meet the requirements of even the most complex cases.
Watch the full Child Exploitation Investigation with KAPE webcast.
In this webcast replay, KAPE instructor and Digital Forensics and Incident Response (DFIR) expert Mari DeGrazia showcases how key Windows artifacts can be collected from a live or forensic image, parsed and structured into a mini timeline in just a few minutes using KAPE.
Watch the full Express Artifact Analysis Timeline Development with KAPE webcast.
How much time are you spending manually parsing and sorting event logs? In this webcast, Kroll’s Andrew Rathbun demonstrates how to run EvtxECmd through KAPE to expedite event log analysis and how to create your custom maps.
Watch the full Enhancing Event Log Analysis with EvtxECmd using KAPE webcast
Kroll instructors conduct frequent KAPE Intensive Training and Certification to help you and your team get started. Our experts are also available to address your KAPE questions, assist with customizations and more via [email protected].
Please note: The solo edition of the Kroll Artifact Parser and Extractor (KAPE) allows the tool to be used at no cost by any local, state or international government agency, and by educational or research organization, or for internal company purposes. An enterprise license is required when KAPE is used on a third-party network and/or as part of a paid engagement.
Page last updated: Jan 15, 2021
Find, collect and process forensically useful artifacts in minutes.
For individuals or business interested in using KAPE for commercial purposes.
Our quarterly threat landscape reports are fuelled by frontline incident response intel from elite analysts.
Volatile public markets and continued uncertainty in the global macroeconomic environment, place increased pressure on exercising informed judgment when valuing private investments. You’re invited to join esteemed speakers on Thursday, December 5 at 8:30 a.m. as we explore this topic.
by Eric Zimmerman
by Eric Zimmerman
by Eric Zimmerman
by Eric Zimmerman