PowerTriage Linux

Lightweight and standalone forensic triage for Linux systems. Designed for DFIR analysis in servers, cloud environments, and critical production systems.

PowerTriage Linux Screenshot
PowerTriage Linux execution on Linux (Bash)

What is PowerTriage Linux?

PowerTriage Linux is the version for Linux systems of the PowerTriage family. Developed in Bash, it allows performing rapid forensic triage without external dependencies, even in minimal or restricted environments.

It is oriented towards servers, cloud infrastructures, critical systems, and scenarios where installing additional tools is not viable.

Optimized for Production

PowerTriage Linux prioritizes secure and non-intrusive execution, reducing the impact on production systems during a forensic investigation.

Common Use Cases

Designed for real Linux environments and complex DFIR scenarios.

  • Forensic triage on compromised Linux servers
  • Analysis in cloud environments and hybrid infrastructures
  • Incident response on production systems
  • Post-mortem analysis from mounted volumes
  • DFIR investigations in air-gapped environments

Collected Forensic Artifacts

System & Kernel

OS Release, Kernel info, Uptime, Timezone, and resources (CPU/Mem).

Users & Activity

Shell History (Bash/Zsh/Vim), Active Sessions, Sudoers, and Accounts.

Network & Connections

Active Connections (SS/Netstat), Open Ports, Interfaces, DNS, and Hosts.

Processes & Persistence

Process Tree, Cron Jobs, Systemd Services/Timers, and Open Files (lsof).

Software & Containers

Installed Packages (dpkg/rpm/apk) and Docker/Podman/K8s (Crictl) status.

File System & SSH

File Timeline, Logs (/var/log), and SSH Keys (authorized_keys/known_hosts).

Execution Modes

Live

Direct execution on running systems.

Offline

Analysis from mounted volumes or systems.

Minimal

Execution compatible with minimal environments and BusyBox.

Custom

Selective activation of modules according to the investigation.

Output and Formats

Structured results ready for subsequent forensic analysis.

  • Export to JSON (ForensicCatalog)
  • Native integration with PowerForensics Platform
  • SHA256 hash of all collected evidence
  • Separate audit and error logs

Output Structure

The script generates a set of text files, JSON, and compressed archives:

File / Folder Description
user_history_files/User Activity: Histories (.bash_history, .zsh_history) per user.
00_avml_...txtAudit: Documentation on AVML download (if applicable).
00_metadata_pre_triage.txtChain of Custody: Pre-triage timestamps and metadata.
containers.txtContainers: Status and images of Docker, Podman, and Crictl (K8s).
directory_and_files.txtFilesystem: Complete file listing (excluding proc/sys/dev).
ForensicCatalog.jsonIntegration: JSON catalog for PowerForensics Analysis Platform.
hashes.txtChain of Custody: SHA256 hashes of all evidence.
home.tar.gzArchive: Compressed /home directory (Full mode only).
installed_packages.txtSoftware: Package inventory (dpkg, rpm, apk).
logs.tar.gzArchive: Compressed /var/log directory.
memory.memMemory: RAM dump via AVML (if enabled).
network_info.txtNetwork: Interfaces, Ports, Routes, ARP, DNS (resolv.conf, hosts).
open_files_lsof.txtProcesses: List of open files (requires lsof).
persistence.txtPersistence: Cron, Init, Systemd, SSH keys, Kernel modules.
powertriage.logLog: Detailed execution log.
processes.txtProcesses: Process tree (pstree) and full list (ps).
root.tar.gzArchive: Compressed /root directory.
system_info.txtSystem: OS details, Uptime, Users, Groups.
timeline_file.csvTimeline: Filesystem timeline (MACB).
users_local.txtUsers: Shadow status, Sudoers, Wheel group.

Fit within PowerForensics

PowerTriage Linux acts as an acquisition and triage component for Linux systems within the PowerForensics ecosystem, providing base data for timeline analysis and correlation in broader investigations.

Technical Documentation

Consult requirements, parameters, and usage examples of PowerTriage Linux.