Autopsy® is a digital forensics platform and graphical
interface to The Sleuth Kit® and other digital forensics tools. It is an open source tool for digital forensics which was developed by
Basis Technology. This tool is free to use and is very efficient in nature investigation
of hard drives. It also consists of features like multi-user cases, timeline
analysis, keyword search, email analysis, registry analysis, EXIF analysis,
detection of malicious files, etc
·
Investigator can analyse Windows and UNIX
storage disks and file systems like NTFS, FAT, UFS1/2, Ext2/3 using Autopsy.
·
Autopsy is used by law enforcement, military,
and corporate examiners to conduct investigations on a victim’s or a criminal’s
PC.
·
One can also use it to recover photos from
one’s camera's memory card.
Autopsy Forensic Browser is a built-in application in Kali Linux operating system, so let’s power on the Kali in
a Virtual Machine.
Table of
Contents:
·
Introduction
·
Creating
a New Case
·
Adding
Image File
·
File
Analysis- File Browser mode and Metadata Analysis
·
File
Type
·
Image
Details
·
Keyword
Search
·
Conclusion
Creating
A New Case
Open a new
terminal and type ‘Autopsy’ and open http://localhost:9999/autopsy in your
browser where you will be
redirected to the home page of Autopsy Forensic Browser. It will run on our
local web server using the port 9999.
Now
you will see three options on the home page.
·
Open Case
·
New Case
·
Help
For investigation, you need to create a
new case and click on ‘New case’. In
doing this it will add a new case folder to the system and allow you to begin
adding evidence to the case.
Now you will be directed to a new page, where
it will require case details. You can Name the case and mention the
description. You can also mention the names of multiple investigators working
the case. After filling in these details, now you can select ‘New case’
The new case
will be stored in i.e. /var/lib/autopsy/case1/, and the configuration file will
be stored in/var/lib/autopsy/case01/case.aut. Now , create the host for
investigation and click on ‘Add Host’.
Once you add host, put the name of the computer you are
investigating and describe the investigation. You can also mention the time
zone or you can also leave it blank which will select the default setting, time
skew adjustments may be set if there is difference in time and you can add the
new host. Click on ‘Add Host’.
The path to the evidence directory will be
displayed and now you can proceed to add image for investigation.
Adding
Image File
It is a golden rule of Digital forensics, that
one should never work on the original evidence and hence an image of the
original evidence should be created. An image can be created various methods
and tools as well as in various formats.
Once the image is acquired, the ‘Add Image
File’ option will allow you to import the image file in order to analyse
Mention the path
to the image file and select the file type. Also choose the import method of
your choice and click on ‘Next’.
You can now confirm
the Image file being added to the evidence locker and click on ‘Next’.
Image
file details will appear and the details of the file systems, the number of
partitions and the mount points will be displayed and then you can click on
‘Add’ to proceed.
Now the Autopsy
will test the partitions and links them to the evidence locker, then click on
‘Ok’ to proceed.
Now select the
volume to be analyzed and click on ‘Analyze’.
File
Analysis-File Browser Mode and Metadata Analysis
Now, it will ask
you to choose the mode of analysis that you want to conduct and here we are conducting
analysis of file, therefore click on ‘File Analysis’.
Now files will
appear, which will give you
the list of files and directories that are inside in this volume. From here you
can analyze the content of the required image file and conduct the type of
investigation you prefer. You can first generate a MD5 hash list of all
the files present in this volume to maintain the integrity of the files, hence
click on ‘Generate MD5 List of Files’.
Now you can see the MD5 values of the files in
volume C of the image file.
The file browsing mode consists of details of the
directories that are shown below. The details include the time and date of the
last time the directories were Written, Accessed, Changed and the time it was
created with its size and also about its metadata. All the details are
displayed in this, so in order to view the metadata, click on the ‘Meta’ option
of Log file that you want to view.
Here you can see
the metadata information about the directory. In order to see more details,
click on the first cluster ‘44067’ in order to view its header information to find
any relevant information to the case.
Here you can see
the information about the header of the cluster.
Then in order to
view the file types of the directories, then click on ‘File Type’
File
Type
Here you will be
able to sort the files based on the different types of files in the volume. By using this feature, you can examine
allocated, unallocated as well as hidden files. To sort the file, click
on ‘Sort Files by Type’.
Click on ‘Sort files into categories
by type’ which is selected by default and then click ‘OK’ to start sorting the files.
The categories of
the file types will be displayed. Now to view the sorted files, click on ‘View
sorted files’ and you will be displayed the list of sorted files.
The output folder locations will vary depending on the
information specified by the user when first creating the case, but can usually
be found at /var/lib/autopsy/Case1/Client/output/sorter-vol2/index.html. Once
the index.html file has been opened, click on the images to view its contents.
Now you can see
Images categories and further investigate the files depending on the case
requirement.
Image
Details
Now click on the
Image details options to view the important details about this image file
Here in this
option of file analysis you can see file system information, first cluster of
MFT, cluster size etc.
Keyword
Search
To ease the
search of a file or document you can make use of keyword search option to make
your investigation time-efficient. Click on ‘Keyword Search ‘to proceed.
You can input the
keyword or any relevant string to proceed with the investigation and click on
search.
Conclusion
Hence, you as a
Digital Forensics Investigator can make use of these different options of tools
in the Autopsy in Kali Linux. This collection of tools creates a quite a
powerful forensic analysis platform.




























0 comments:
Post a Comment