// case type
account takeover (ATO)
credential stuffing → SIM swap → password reset chain → exfil. evidence lives in identity-provider logs, mailbox rules, and session artifacts.
start here · primary tools
ordered. work top-down. the first tool is the suggested entry point for this case type.
- okta log analyzerokta system log json · timeline · suspicious · mfa fatigue · tor/proxy · users · ips · policy · csv export · runs locally
- o365 audit log parserunified audit log json · timeline · suspicious · users · ips · mailbox · inbox rules · csv export · runs locally
- office365 audit log analyzerdrop m365 unified audit log json or csv · flag inbox forward rules · mailbox forwarding · bulk downloads · global admin role adds · high-scope consent · audit log disabled · runs locally
- microsoft 365 unified audit log analyzerdrop m365 unified audit log csv or json export · parse all audit events across exchange sharepoint teams onedrive and azure ad · surface suspicious operations privilege changes and data access events · reconstruct user activity timeline · runs locally
- mail rule parserdrop Outlook rules.dat or Thunderbird msgFilterRules.dat · rule names conditions actions · flag suspicious forward redirect · CSV export · runs locally
- password spray & brute force detectordrop security evtx csv · analyze authentication failure patterns · detect low-and-slow password spray · high-speed brute force · credential stuffing patterns · flag attacker ips · runs locally
- credential artifact scannerdrop a memory dump · scan for plaintext credentials · NTLM hashes · OAuth tokens · API keys · session cookies · Base64 secrets · export CSV · runs locally
- sim swap artifact forensic detectordetect evidence of SIM swapping across devices, carriers, or subscriber records · runs locally
also useful · secondary tools
supporting and follow-up tools. surface as the investigation widens.
- passive os fingerprinter from pcapdrop a pcap file · reconstruct the operating system of every host from tcp/ip stack behavior · ttl values · window sizes · tcp options ordering · ip flag patterns · no active probing · identify os from existing captured traffic · runs locally
- tls ja3 fingerprinterdrop a pcap file · extract tls client hellos · compute ja3 fingerprints · identify known clients and malware · database of known fingerprints · runs locally
- user agent analyzerpaste user agent strings · parse browser · OS · device · version · detect bots · spoofed agents · crawlers · headless browsers · inconsistencies · runs locally
- github audit log analyzerdrop github enterprise audit log json or csv export · parse repository and organization events · surface suspicious access patterns force pushes secret scanning alerts and member changes · reconstruct git activity timeline · runs locally
- github audit log parserjson or jsonl audit export · action actor org repo · repo org hook oauth protected branch secret scanning · suspicious flags · export csv · runs locally
- aws cloudtrail forensic deep analyzerdrop cloudtrail json logs · detect privilege escalation paths · credential theft · data exfiltration · lateral movement between services · unusual api patterns · flag attacker ips · runs locally
- aws cloudtrail log forensic analyzerdrop aws cloudtrail json log files or csv export · parse api call records across all aws services · surface credential abuse privilege escalation data exfiltration and infrastructure manipulation · reconstruct attacker activity timeline · runs locally
- case report generatorfill in case number · examiner · dates · findings · drop evidence files for auto hash · generates structured forensic report PDF · runs locally
run as a stack
skip the click-through. these presets are curated forensic pipelines you can save as a stack with one click and run on your evidence locally.
ATO — attacker fingerprint kit
7 stepsdrop M365 / Okta / cloudtrail log exports → extract IPs + UAs + ASNs → dedupe → triage → timeline → report
- 01evidence-manifest-generatorhash raw audit-log exports — most identity providers don't re-issue them
- 02ioc-extractorpull source IPs, user-agent fragments, originating ASNs from the log text
- 03ioc-deduplicator-normalizerdrop RFC1918 noise — what remains is the attacker's external infrastructure
- 04breach-ioc-normalizermerge with any pre-existing IOC list from the IdP's threat-intel feed (if provided as input)
- 05ioc-bulk-validator-and-triagescore the remaining IPs — high-severity hits are the attacker's persistent infra
- 06forensic-timeline-builderrebuild the login sequence so you can pinpoint patient-zero session
- 07case-report-generatordraft a report identifying the persistence window + recommended revocations
ATO — JWT HS256 secret assessment
5 stepsdrop captured JWT + wordlist export → HS256 bruteforce → extract session IOCs → timeline → report
- 01evidence-manifest-generatorhash the JWT artifact + wordlist before testing — investigative authorization required
- 02jwt-bruteforcerbatch HS256 verify against the provided wordlist — only tokens you are authorized to test
- 03ioc-extractorpull IPs, user-agents, and session identifiers from accompanying audit logs
- 04forensic-timeline-builderrebuild the login sequence around the compromised session window
- 05case-report-generatordraft a report documenting the token weakness + recommended revocations