Autopsy. Autopsy is a front end to sluethkit 1.66 which has a series of software programs used to analyze computer hard drives.

Similar documents
Red Hat Linux 7.2 Installation Guide

Operating System Installation Guidelines

Computer Forensics using Open Source Tools

Lab III: Unix File Recovery Data Unit Level

Recover Data Like a Forensics Expert Using an Ubuntu Live CD

Secure Global Desktop (SGD)

Guide to Computer Forensics and Investigations, Second Edition

Qsync Install Qsync utility Login the NAS The address is :8080 bfsteelinc.info:8080

Installing a Browser Security Certificate for PowerChute Business Edition Agent

LOCKSS on LINUX. Installation Manual and the OpenBSD Transition 02/17/2011

Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)

How to install and use the File Sharing Outlook Plugin

BusinessObjects Enterprise XI Release 2

USB 2.0 Flash Drive User Manual

Linux Development Environment Description Based on VirtualBox Structure

Avalanche Remote Control User Guide. Version 4.1.3

Computing forensics: a live analysis

3.5 EXTERNAL NETWORK HDD. User s Manual

Working With Your FTP Site

Unix/Linux Forensics 1

MSc Computer Security and Forensics. Examinations for / Semester 1

Also you need the C-MOR ISO file. This file you will find following this link:

User guide. Business

Installation Guide for WebSphere Application Server (WAS) and its Fix Packs on AIX V5.3L

II. Installing Debian Linux:

Using Microsoft Expression Web to Upload Your Site

TriCore Secure Web Gateway User Guide 1

DIGICLIENT 8.0 Remote Agent Software

Call Recorder Quick CD Access System

Uploading Your Bidding Documents Table of Contents

Lab: Data Backup and Recovery in Windows XP

Windows Mail POP Instructions - Bloomsburg University Students

NS Financials. Client Platform Guide for Mac Using Safari Incl Citrix Setup As A Local Client

LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013

Navigating the Rescue Mode for Linux

Open Source and Incident Response

How to use SURA in three simple steps:

Optional Lab: Data Backup and Recovery in Windows 7

Using SSH Secure Shell Client for FTP

Getting Started The Windows SharePoint Services Window

Using TViX Network. NFS mode : You must install the TViX NetShare utility in to your PC, but you can play the TP or DVD jukebox without stutter.

Livezilla How to Install on Shared Hosting By: Jon Manning

Practice Exercise March 7, 2016

IP Phone Services Configuration

What is Aconex Local Copy? Controlling Access to a Datastore Hardware Requirements Software Requirements Installing Aconex Local Copy Troubleshooting

Keystone 600N5 SERVER and STAND-ALONE INSTALLATION INSTRUCTIONS

Lab - Data Backup and Recovery in Windows XP

FOG Guide. IPBRICK International. July 17, 2013

Download and Install the Citrix Receiver for Mac/Linux

Using Your PGP Tool to Update Your Address Settings for Encrypted Messaging

State of Michigan Data Exchange Gateway. Web-Interface Users Guide

Configuring Your Gateman File Server

Lab - Data Backup and Recovery in Windows 7

Local Caching Servers (LCS): User Manual

Network Attached Storage System Recovery Procedure

the barricademx end user interface documentation for barricademx users

Introducing OneDrive for Business

BaseManager & BACnet Manager VM Server Configuration Guide

Use Remote Desktop capabilities to Access your Work PC from home over VPN

Yale Software Library

Tech Tips Helpful Tips for Pelco Products

Help. F-Secure Online Backup

CITRIX TROUBLESHOOTING TIPS

How to partition your disk with the parted magic linux livecd

Acronis True Image 2015 REVIEWERS GUIDE

Unity Error Message: Your voic box is almost full

Moving Exchange Message Stores and Transaction Logs to an Alternate Drive

Job Aid: Creating Additional Remote Access Logins

Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide

Windows XP Pro: Basics 1

APPLICATION NOTE. How to build pylon applications for ARM

PANOPTO: THE RECORDER (WINDOWS)

Using the CCNY Server Space with Secure Shell 3.0 for Windows Created by Doris Grasserbauer

EaseUS Data Recovery Wizard User Guide

JMC Next Generation Web-based Server Install and Setup

Carry it Easy. User Guide

Remote Support. User Guide 7.23

Capturing a Forensic Image. By Justin C. Klein Keane <jukeane@sas.upenn.edu> 12 February, 2013

CLC Bioinformatics Database

How to test and debug an ASP.NET application

ACE STUDY GUIDE. 3. Which Imager pane shows information specific to file systems such as HFS+, NTFS, and Ext2? - Properties Pane

Option nv, Gaston Geenslaan 14, B-3001 Leuven Tel Fax Page 1 of 14

Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website

Computer forensic science

NI Real-Time Hypervisor for Windows

Working with Office Applications and ProjectWise

Amahi Instruction Manual

Forensic Analysis of Internet Explorer Activity Files

The BackTrack Successor

NetWrix Server Configuration Monitor

råáîéêëáíó=çñ=pçìíüéêå=`~äáñçêåá~ Academic Information Services

Price list update. What this exercise is about What you should be able to do Introduction Requirements... 2

13.1 Backup virtual machines running on VMware ESXi / ESX Server

Surf it Easy. User Guide

2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer

New World Construction FTP service User Guide

VMware vcenter Support Assistant 5.1.1

RemoteTM LAN Server User Guide

SWCS 4.2 Client Configuration Users Guide Revision /26/2012 Solatech, Inc.

SSO Plugin. HP Service Request Catalog. J System Solutions. Version 3.6

Transcription:

Autopsy St. Louis Security Group 1/26/2004 University of Missouri at St. Louis West County Computer Center Clarence Johnson Clarence@johnsonct.net Autopsy is a front end to sluethkit 1.66 which has a series of software programs used to analyze computer hard drives. The following is an example used as an introduction to computer forensics. Software used: Knoppix STD Computer system: Gateway PII using windows 2000 Server Network connections: 12 computer connected together through a hub. IP Address configurations: 192.168.1.X Other: There is no access to the internet. 1) Load Knoppix STD 2) Verify IP address 3) If no IP Address then set one 4) Determine hard disk slices/partitions 5) Determine pertinent information 6) Start Autopsy 7) Copy the URL link from the autopsy server 8) Start mozilla browser 9) Create a new case 10) Enter case information 11) Enter case directory information 12) Enter case category information 13) Add the host 14) Enter host information 15) Add image 16) Enter image information 17) Perform file analysis 18) Investigate Data

1 3 Place Knoppix STD CDROM into bootable PC Start a root terminal by right clicking on the desktop and choosing shells then root shell Within the root terminal type the following /sbin/ifconfig eth0 If you have an IP Address go to next steps else set your IP Address. /sbin/ifconfig eth0 192.168.1.1 netmask 255.255.255.0 Verify IP Address /sbin/ifconfig eth0 An IP address is not needed for autopsy to run but could be helpful in sending data to a different computer through FTP. 4 6 Determine hard disk partitions or slices Right click on the desktop and select x shells and then root aterm, then type in the following. fdisk l /dev/hda You should see at least one partition please note if it is NTFS or LINUX and write down the Partition to diagnose. Partitions of interest and Company name of computer Reason for forensic study Your Name This computers name Time Zone CST Hard drive partition /dev/hda1 Start autopsy Right click on the desk top, select forensics, select autopsy service. Do not close the window.

7 9 After you started the Autopsy server there will be an URL listed. Copy this URL it will be pasted into the mozilla browser later. To copy the URL left click at the beginning of the URL line then highlight the entire line. Start mozilla Right click on the desktop, select Internet, select mozilla firebird. Remove the original data from the URL line. Click both buttons on the mouse at the same time while you are in the URL line and the previously copied data will be pasted into the URL. Press enter. At the bottom of the web page click on New case. 10 12 Case information 1 Enter case name. I have been using the company name like Safeway. 2 Description: Quickbook data is an example 3 Your name: Clarence (remember no spaces) Click on new case Case directory information After you click on new case you should see the directory information You should now be in the case category section. Your case should appear. 13 14 Add the host Click on add a host Host name: I normally use the computer name such as cmptr1 Description: quickbooks Time Zone: CST Leave the rest as is. Click on Add Host Click OK Your host should be listed (cmptr1) and the investigator should be listed. Click OK

15 16 Add IMAGE for forensics Click on ADD IMAGE Location : /dev/hda1 (or whatever hard drive you are concerned with) Import Method: Chose symlink File system Type: Chose NTFS (for our example) Original Mount point: c:\ Integrity check: choose ignore (otherwise the process will take all day) Click on ADD IMAGE. 17 18 Now Case Gallery, Host Gallery and Host Manage should all be bold. Your image should be listed. Click on File Analysis Investigate your files and directories If you select a file there are multiple ways of looking at it. Ascii (Display or Report) Strings (Display or Report) Export or Add notes Also note you may select all deleted files on the left. You may also select file type to get a numeric count for all of the different files. The rest is left for you to investigate.

Other computer forensic tools. autopsy 1.75 : Web front end to TASK. Evidence Locker defaults to / mnt/evidence biew : binary viewer bsed : binary stream editor consh : logged shell (from F.I.R.E.) coreography : analyze core files dcfldd : US DoD Computer Forensics Lab version of dd fenris : code debugging, tracing, decompiling, reverse engineering tool fatback : Undelete FAT files foremost : recover specific file types from disk images (like all JPG files) ftimes : system baseline tool (be proactive) galleta : recover Internet Explorer cookies hashdig : dig through hash databases hdb : java decompiler mac robber : TCT's graverobber written in C md5deep : run md5 against multiple files/directories memfetch : force a memory dump pasco : browse IE index.dat photorec : grab files from digital cameras readdbx : convert Outlook Express.dbx files to mbox format readoe : convert entire Outlook Express.directory to mbox format rifiuti : browse Windows Recycle Bin INFO2 files secure_delete : securely delete files, swap, memory... testdisk : test and recover lost partitions wipe : wipe a partition securely. good for prep'ing a partition for dd and other typical system tools used for forensics (dd, lsof, strings, grep, etc.)