What is Acquire

A digital artifact extraction framework for extracting data from volatile memory (RAM) samples, providing visibility into the runtime state of a system.

Acquire: A Tool for Collecting Forensic Artifacts Efficiently

Acquire is a specialized tool that enables the rapid collection of forensic artifacts from disk images or live systems. It efficiently stores these artifacts in a lightweight container, facilitating easy access and analysis.

This makes Acquire an excellent tool for digital forensic triage

This makes Acquire an excellent tool for various purposes, including speeding up the process of digital forensic triage.

It uses dissect to gather information from raw disk data

It utilizes dissect to extract information from the raw disk whenever feasible. Acquire collects artifacts based on specific modules.

Understanding Module Paths and Profiles in Filesystems

These modules represent paths or globs within a filesystem that acquisition attempts are designed to gather. Multiple modules can be executed at the same time, and these modules are grouped together within a profile.

Understanding the Various Profiles Associated with --profile

The profiles associated with --profile include full, default, minimal, and none. Depending on the operating system that is detected, different artifacts are collected accordingly.

Basic Usage of the Acquire Command

To use the acquire command in its most straightforward form, type the following in your terminal: user@dissect~$ sudo acquire

The tool needs administrative access to operate correctly

The tool needs administrative access to directly read raw disk data instead of depending on the operating system for file access.

Alternative Options for Operating System Use

There are several options available to use the operating system as a backup solution. For instance, you can utilize the commands --fallback or --force-fallback.

For Additional Information, Please Refer to the Documentation

For additional information, please refer to the documentation for further insights and details.

Project Requirements Overview

This project is a part of the Dissect framework and requires the use of Python. For details about the supported Python versions, please refer to the documentation.
 

Acquire Reviews

Write a Review

No reviews yet. Be the first to review this tool!

Write a Review

Share your experience with Acquire tool and help others make informed decisions.

Featured

Specops Software
Free

Specops Software View Specops Software

Specops Software empowers organizations to fortify their IT security by addressing the critical vulnerability of password management and authentication. As a premier vendor, Specops Software provides advanced solutions designed to proactively block weak passwords, enforce robust authentication protocols, and ensure compliance with stringent industry standards like CJIS and HITRUST. With deep native integration into Active Directory and on-premises data storage, Specops Software offers unparalleled security and control for sensitive business data.

Active Directory password policy auditing against compliance standards
Breached password detection for over 900 million known compromised passwords
Zero-trust access evaluation and enhancement
Infisical
Free

Infisical View Infisical

Infisical is the premier open-source platform designed for unified management of secrets, certificates, and configurations across your entire organization. It seamlessly integrates into your development workflows, CI/CD pipelines, and cloud infrastructure, ensuring secure storage and automated injection of sensitive information. Empower your team with robust features like versioning, point-in-time recovery, comprehensive audit logging, and automated secret rotation for enhanced security and operational efficiency.

Open-source secrets management platform
Unified management of secrets, certificates, and configs
Seamless integration with development workflows and CI/CD
Click Studios
Free

Click Studios View Click Studios

Click Studios is an Australian-based Agile software development company dedicated to evolving Passwordstate, their robust Enterprise Password Management solution. Continuously refined through customer insights and cybersecurity advancements, Passwordstate offers advanced features for secure sensitive information management and stringent compliance. Click Studios provides scalable, secure, and user-friendly password management solutions, empowering businesses globally with affordable and reliable access control.

Secure Enterprise Password Management
Continuous Feature Enhancement
Customer Feedback Driven Development

Similar Tools

Exterro
Free

Exterro View Exterro

Exterro is a comprehensive Legal Governance, Risk, and Compliance (Legal GRC) platform designed for in-house legal, privacy, and IT teams within Global 2000 and Am Law 200 organizations. By automating the intricate connections between privacy, legal operations, digital investigations, cybersecurity response, compliance, and information governance, Exterro empowers legal departments to proactively manage risks and achieve defensible outcomes. Trusted globally by corporations, law firms, government, and law enforcement agencies, Exterro drives successful, cost-effective risk management through its integrated GRC solution.

Unified Legal GRC Platform
Automated Privacy Management
Digital Investigations
Belkasoft
Free

Belkasoft View Belkasoft

Belkasoft provides advanced digital forensic solutions to public agencies, corporate security, and private investigators worldwide. Its flagship product, Belkasoft Evidence Center (BEC), empowers investigators to efficiently acquire, analyze, group, and present digital evidence. BEC is specifically designed for seamless teamwork and robust access control, offering powerful capabilities like remote data acquisition, advanced data carving, cross-case searching, and comprehensive incident investigation support.

Efficient Digital Evidence Acquisition
Comprehensive Data Analysis and Grouping
Streamlined Teamwork and Access Management
Zenduty
Free

Zenduty View Zenduty

A library to access and parse Windows Shortcut File (LNK) format.

YARALYZER
Free

YARALYZER View YARALYZER

Python forensic tool for extracting and analyzing information from Firefox, Iceweasel, and Seamonkey browsers.

YARA-Forensics
Free

YARA-Forensics View YARA-Forensics

A library and tools to access and manipulate VMware Virtual Disk (VMDK) files.

xxUSBSentinel
Free

xxUSBSentinel View xxUSBSentinel

A console program for file recovery through data carving.