An Overview of Autopsy - Open Source Digital Forensic Platform
An Overview of Autopsy - Open Source Digital Forensic Platform
An Overview of Autopsy - Open Source Digital Forensic Platform
May 2020
---------------------------------------------------
www.datascience.foundation
ABSTRACT
Digital forensics refers to the way toward recouping information from computerized gadgets,
from PC hard drives to cell phones. This movement is frequently connected with criminal or
common investigations. Advanced gadgets can give a wide range of kinds of data that are not
clear to the casual user. Autopsy is the chief open source digital forensics platform that is
anything but difficult to utilize, quick, and usable in every computerized examination. It
analyzes hard drives, smart phones, media cards etc. It is primarily developed for Microsoft
Windows, but there is minimal support for running on Linux and macOS. In this whitepaper, I
am focusing about overview of Autopsy, installation of Autopsy and cases & data sources of an
Autopsy.
1. INTRODUCTION
1. Brief History
In 2001, first Open Source platform was released. It is interfaced to The Sleuth Kit.
It is applicable for only Linux and OS X. And then in 2010, they started v3 from
scratch as a platform. It is based on OSDFCon discussions. It is Windows-based
and automated. Some US Army funding (with 42Six Solutions). Finally, v3.0.0
released in September, 2012.
2. Basic Concept
Investigation Workflow
Deployment Types
Central Repository
1. Investigation Workflow
One or more data sources are added to the case. Data sources include disk
images and local files.
After the data source is included, ingest modules work out of sight to break
down the information. Results are presented on the interface continuously
and give cautions as important. Model ingests modules incorporate hash
count and query, watchword looking, and web relic extraction. Third party
modules can be created and added to the pipelines.
The user navigates “the interface, files contents, and ingest module results to
identify the evidence”.
2. Deployment Types
Desktop/Single User:
Central Repository
In this case, Database that stores data from past cases. It contains
MD5 hash values, comments and wifi SSIDs.
Steps:
Step 3: It will install in a version-specific folder. You can have multiple versions of
Autopsy installed at the same time.
Basic flow:
Install dependencies using package management tool: .Java, The Sleuth Kit,
PhotoRec, etc.
Download “.zip” file of Autopsy and expand.
Run “unix_setup.sh” to copy files into Autopsy.
There are other things to setup on a new installation: hash sets, keywords etc.
Launch Autopsy and enable the central repository using a SQLite data base in the default
App data location.
A case can contain at least information sources (disk image, disk devices and
logical files). The data sources can be from various drives in a solitary PC or from
numerous PCs.
Each case has its own index (directory) that is named dependent on the case name.
The index will contain configuration files, a database, reports, and different
records that modules create.
Factors:
Note: In a Multi-user cluster, all examiners need to have access to the case
directory at the same path.
A data source the thing you need to examine. It tends to be a plate picture, some
legitimate records, a neighborhood drive, and so forth. You should open a case
preceding adding a data source to Autopsy.
Disk Image: A file (or set of files) that is a byte-for-byte copy of a hard
drive or media card.
Adding a Disk Image
It uses The Sleuth Kit (TSK) to analyze the contents of the image.
And it detects volume systems that break the disk into partitions.
And also it detects file systems that organize a partition so that
files can be stored.
Orphan Files
o Orphan files are those that are deleted and no longer have a
parent folder. They are accessible in the “$OrphanFiles” folder.
And finding orphan files in FAT file system is time intensive.
Every cluster must be read and analyzed. And it can be disabled
when image is added.
You can add files or folders that are on your local computer (or
on a shared drive) without putting them into a disk image. This is
useful if you have only a collection of files that you want to
analyze.
All of the files that you added in the panel will be grouped
together into a single data source, called "LogicalFileSet" in the
main UI.
4. CONCLUSION
REFERENCES
1. https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1493741001.pd
f
2. https://sleuthkit.org/autopsy/docs/user-docs/3.1/index.html
3. http://www.sleuthkit.org/autopsy/
4. https://www.softpedia.com/get/Others/Miscellaneous/Autopsy.shtml
5. http://en.wikipedia.org/wiki/Autopsy_%28 software%29
6. http://www.sleuthkit.org/autopsy/intuitive.php
7. https://www.basistech.com/basistechnology-enhances-digital-mediainvestigations-with-au
topsy-3-1/
8. http://www.sleuthkit.org/autopsy/download.php
9. https://sourceforge.net/projects/autopsy/file%20s/autopsy/3.1.1/
10. http://wiki.sleuthkit.org/index.php?title=M_ain_Page
11. http://wiki.sleuthkit.org/index.php?title=T_he_Sleuth_Kit
12. http://digitalforensics.sans.org/blog/2009/05/11/a-stepby-step-introduction-to-using-the-a
utopsyforensic-browser/
13. Incident Response and Computer Forensics, Second Edition[11]
http://articles.forensicfocus.com/2013/08/29/autopsy-3-windows-based-easy-to-useand-fre
e/
AUTHOR WRITE UP