Forensics & Incident Response
Capture volatile state, memory dumps, and evidence from running containers.
This guide covers CLI commands for incident response and one-off captures. For automated forensics, see Scheduling.
Forensics on Running Containers
Memory, process state, network connections, and temporary files are discarded when a container terminates. reel helps you extract forensic data from live containers, without stopping them, following the standard order of volatility.
Order of Volatility
Capture in this order (most volatile first):
- 01Memory - Process heap, stack, credentials
- 02Volatile state - Running processes, network connections
- 03Files - Logs, modified files
- 04Checkpoint - Full process state
Find Your Workloads
List pods that reel can operate on:
Quick Evidence Collection
Follow this sequence to capture evidence in the correct order:
1. Memory (most volatile)
2. Volatile state
3. Logs and files
4. Package inventory
Memory Dump Analysis
Memory dumps are exported as ELF Core files, compatible with GDB and standard analysis tools.
Assess Credential Exposure
After a suspected breach, determine what sensitive data may have been accessible to an attacker:
| Check for exposed | Command |
|---|---|
| Credentials | strings memory.core | grep -iE "(password|api_key|token|secret)" |
| Connection strings | strings memory.core | grep -iE "(mysql://|postgres://|mongodb://)" |
| Session tokens | strings memory.core | grep -E "eyJ[A-Za-z0-9_-]+\.[A-Za-z0-9_-]+" |
Volatile State
Exports the process tree, open file descriptors, network connections, memory maps, and environment variables.
What it captures:
Process Tree
Network Connections
Open Files
Environment
File Analysis
Search for indicators of compromise and suspicious file modifications.
Find Suspicious Files
Recently modified files
SUID/SGID binaries (privilege escalation)
Executables in /tmp or /dev/shm (malware staging)
Hidden files and directories
Modified system binaries
Export Files
Extract files for offline analysis:
File Inventory
Export a complete inventory of all files in a container with metadata (path, size, permissions, hashes).
Chain of Custody
For legal or compliance purposes, add the --chain-of-custody flag to include provenance metadata:
Example output: