Disk Analysis, Autopsy & Redline
Autopsy:
Autopsy gives
you the option to acquire data from both live systems or from a disk image.
After adding your data source, navigate to the location of the files you want
to extract, then right-click and select the Extract File(s) option. It will
look similar to what you see in the screenshot below
How to start Digital forensics Investigations with
Autopsy
1.
Download Autopsy
2.
Download Hxd
3.
Download md5sum
4.
Download dd.exe
5.
Create disk image using
dd.exe
PS C:\Users\ME\Desktop\Tool\tools
source> .\dd.exe if=\\.\e: of=c:\users\me\desktop\cases\image.dd bs=1M –-progress
6.
Create hash for image
using md5sum or hasher
PS C:\Users\ME\Desktop\Tool\tools
source> .\md5sums.exe c:\users\me\desktop\cases\image2.dd
Or
Use Hasher from Get-ZimmermanTools
f6a6fdc46f64d20ca80441b36aca86c4
7.
Create case folder(case_Num)
7.1
Create file.txt for
case documentation include start timestamp and case number, path of image.dd ,
case data directory (7.3)
7.2
Create folder to include
image.dd
7.3
Create folder named
Autopsy
8.
Open Autopsy https://www.youtube.com/watch?v=fEqx0MeCCHg
8.1
new case : select
case name (as we named in step 7)
8.2
Base Directory :
Autopsy (7.3)
8.3
Select Host name (can
be the image name)
8.4
Disk image (dd image)
or use Local disk for local hard Drive
8.5
Past hash value we calculate
from md5
8.6 Select
what Configure Ingest (what modules to include in investigations )**** we
deselect android analyzer for example
8.7
If we want to see all
USB : Data Artifices : USB
8.8
We can save as CSV
and open using Get-ZimmermanTools\TimelineExplorer

8.9
we
can looking for visited sites …

8.10 from tool we can see the time line
8.11 Add tages by select result à rcÃ
Add Resukts Tags

8.12 Generate a reports
We can select what to include in this report: we can choose
all result or what we tagged
Redline®, FireEye’s
premier free endpoint security tool, provides host investigative capabilities
to users to find signs of malicious activity through memory and file analysis
and the development of a threat assessment profile. Use Redline to collect, analyze
and filter endpoint data and perform IOC analysis and hit review. In addition,
users of FireEye’s Endpoint Security (HX) can open triage collections directly
in Redline for in-depth analysis, allowing the user to establish the timeline
and scope of an incident.
How to Use Redline
1. Download Redline for OS : https://fireeye.market/apps/211364
2. Install Reline
3. Create Empty Folder
4. Open Reline
5. Create a stander Collector
6. Select Target OS
7. Edit Your Script *** From here we choose what we
need to collect and analyze

8. Choose where we need to save our collected data
9. We can copy content of folder that contains
collected data to USB and run in Target machine


10.
Open
collected data folder and run RunRedlineAudit as administrator (Its take a time)
11.
Close
redline
12.
After
run RunRedlineAudit new folder created (Sessions)
13.
Open
Session folder

14.Run AnalysisSession1

Comments
Post a Comment