Acquisition and Triage of Disks Using Autopsy

Acquisition and Triage of Disks Using Autopsy

Autopsy is an open-source digital forensics tool that provides a comprehensive environment for analyzing disks, uncovering artifacts, and conducting incident investigations. It’s widely used for disk acquisition, triage, and forensic analysis.


Key Features of Autopsy

  1. Multi-User Collaboration:

    • Supports teamwork on large-scale investigations.

  2. File System Support:

    • Works with major file systems (NTFS, FAT, Ext, HFS+).

  3. Keyword Search:

    • Enables pattern and keyword searches across files and data.

  4. Registry and Web Analysis:

    • Parses Windows Registry for user activities and extracts web artifacts like browsing history.

  5. Timeline Analysis:

    • Visualizes events (file access, modifications) over time.

  6. Media Playback:

    • Views images and videos directly within Autopsy.

  7. Android and Windows Compatibility:

    • Supports analysis of mobile and desktop systems.


Steps for Disk Acquisition and Triage

Step 1: Installation

Step 2: Creating a New Case

  1. Launch Autopsy.

  2. Click New Case.

  3. Name the Case and choose a directory to store case data.

  4. Optionally, fill out Examiner Details (name, description, case number).

  5. Click Finish.

Step 3: Adding Data Sources

  • Select Data Source Type:

    • Disk Image: Analyze previously acquired images (e.g., .E01, .dd, .raw).

    • Local Disk: Analyze physical or logical drives directly connected to your system.

  • Choose a Disk or Image:

    • For physical or logical disk analysis, select the connected drive.

    • Set Time Zone for consistent timeline analysis.

  • Optionally Create VHD:

    • Autopsy can generate a Virtual Hard Disk (VHD) for further offline analysis.


Step 4: Configuring Ingest Modules

Ingest Modules automate parsing and data extraction. Select relevant modules based on your investigation needs:

  1. File Type Identification: Categorizes files by type (e.g., documents, executables).

  2. Recent Activity: Identifies recently accessed files and user actions.

  3. Keyword Search: Allows searching for specific terms (e.g., passwords, sensitive terms).

  4. Web History: Extracts cookies, visited websites, and downloads.

  5. Email Parser: Analyzes email data from local mail clients.

  6. EXIF Metadata Parser: Extracts metadata from images (e.g., GPS coordinates).

Once selected, click Next to start analysis.


Analyzing Data in Autopsy

After configuration, Autopsy categorizes and displays the collected data for analysis:

1. OS Accounts

  • Lists user accounts and their activities.

  • Useful for identifying unauthorized user profiles or malicious activity.

2. Recent Documents

  • Tracks files recently opened or edited.

  • Provides insight into user actions leading up to an incident.

3. Images/Videos

  • Categorizes multimedia files.

  • Allows filtering by metadata (e.g., creation date, location).

4. Web Activity

  • Extracts browser histories, cookies, and download data.

  • Useful for identifying access to suspicious sites or malicious downloads.

5. Email

  • Parses local email clients to uncover sent/received messages.


Live Triage Using Autopsy

Autopsy offers a Triage USB Drive feature for quick system scans:

  1. Configures Autopsy’s tools onto a USB drive.

  2. Enables live system triage without requiring a full installation.

  3. Collects critical artifacts on-the-fly (e.g., event logs, recent documents).

Use Case: Ideal for rapid incident response in environments where imaging the entire disk isn’t feasible.


Key Benefits of Autopsy

  • User-Friendly Interface: Intuitive GUI simplifies analysis.

  • Modular Analysis: Tailor investigations with ingest modules.

  • Efficient Triage: Quickly identify relevant evidence without full disk imaging.

  • Scalability: Suitable for small cases and large-scale investigations.


Practical Use Case

Scenario: Investigating a data breach.

  1. Data Acquisition:

    • Investigators use Autopsy to scan a compromised workstation.

    • Select relevant ingest modules (Recent Activity, Web History, Keyword Search).

  2. Findings:

    • Identify a document containing sensitive data accessed and sent to an external email.

    • Extract web history showing visits to unauthorized file-sharing platforms.

  3. Outcome:

    • Evidence is compiled and used for remediation and legal proceedings.


Key Points

Autopsy is an essential tool for disk acquisition and forensic triage, offering powerful analysis features in a user-friendly package. Its modular structure allows investigators to focus on relevant artifacts, expediting incident response and digital investigations.

Next Steps:

  • Explore advanced features like Timeline Analysis.

  • Practice with sample disk images to build proficiency.

Last updated