Starting a New Digital Forensic Investigation Case in Autopsy 4.19+

Поділитися
Вставка
  • Опубліковано 12 січ 2025

КОМЕНТАРІ • 111

  • @j.s.3414
    @j.s.3414 2 роки тому +54

    Seriously the best introductory/basic-workflow Autopsy video I've watched. I absolutely love that you give additional detail about the modules, and that you explained your workflow.

    • @mr_daihatsu
      @mr_daihatsu 2 роки тому +3

      I just got my sec+ cert CompTIA and decided forensics is what I love and need to do so I agree! When I watched this video it made me entrench myself in my decision to pursue forensics in the cyber security community. Thank you

    • @sergiopico3828
      @sergiopico3828 Рік тому +1

      agreed!

  • @World_Tech_and_Cybersecurity
    @World_Tech_and_Cybersecurity Місяць тому +1

    Superb explanation. I am now 100% confident going in for my final exam. We will be examining an E01 file using Autopsy for one part of the final. This video provided me with a perfectly sensible workflow that I can follow.

  • @cybercatlabs
    @cybercatlabs 11 місяців тому +11

    Exactly what I was looking for to complete an assignment. Thank you!

  • @thanhphuongle8229
    @thanhphuongle8229 2 роки тому +5

    after trying around 5-11 videos this is the only one that i found working

    • @DFIRScience
      @DFIRScience  2 роки тому

      I hope it was helpful. Let me know if you have any questions.

  • @butruscyprianooturoonyong7030
    @butruscyprianooturoonyong7030 2 роки тому +1

    thank you master for the basic introduction of using autospy in digital forensic. i have watch the video is very interesting. my gratitude and wish you all the best

  • @margalocaris
    @margalocaris Рік тому +1

    Very thorough explanation! Your videos have been pointed to by one of my college professors.

    • @margalocaris
      @margalocaris Рік тому

      Love the cat pictures as a stand-in for criminal evidence. Very cute.

  • @TheMiejoe
    @TheMiejoe 2 роки тому +2

    Thanks for the tutorial! I'm a criminal law student so Digital Forensic Investigation is really interesting. I've always wondered how gathering digital evidence works. I learned a lot from your tutorial!

  • @EphraimStolfus
    @EphraimStolfus 2 місяці тому

    Wow! This is really great!!! Information is loved!!!!

  • @Boonethedude
    @Boonethedude 3 місяці тому

    This is better information than my textbook. Thank you

  • @CT-zq3kz
    @CT-zq3kz 2 роки тому +1

    Want to thank you for the time you put into your content. You are pretty much the only forensics UA-cam channel that consistently produces great content. Well done my friend, and thank you.

    • @DFIRScience
      @DFIRScience  2 роки тому

      Thank you so much for the kind words. I appreciate it. Let me know if you have any questions or topics you'd like to see.

  • @nasekbarawe3979
    @nasekbarawe3979 13 днів тому +1

    With what program do you get the the disk image from the beggining like how do you extract it from the phone ?

  • @DEDEPLDEDE
    @DEDEPLDEDE Рік тому

    Very interesting material for someone starting in the IR team. Great video!

  • @malemmutum5049
    @malemmutum5049 Рік тому

    I thoroughly enjoyed it! Thanks for the great tutorial.

  • @Tomas-Montenovi
    @Tomas-Montenovi 2 роки тому +1

    Thank you for this well made tutorial!

  • @filzaakhlaq3104
    @filzaakhlaq3104 Рік тому +2

    The link in your description for sample data doesn't contain the hash file that is in the video. it only has an image .dd file. How do I proceed ?

  • @michalsedlacek560
    @michalsedlacek560 2 роки тому

    This is amazing video with great works very well

  • @fa307
    @fa307 2 роки тому +1

    Glad that I found your channel 👍🏽👍🏽

    • @DFIRScience
      @DFIRScience  2 роки тому +1

      Glad you're here! Let me know if you have any questions. :D

  • @NightShooter87
    @NightShooter87 2 роки тому

    FTK and Autopsy are the one's I always use. Great vid.

  • @AniketAmdekar
    @AniketAmdekar 2 роки тому +2

    awesome tutorial for learning the Autopsy tool! Can you also share some good sources for getting forensic images for data recovery challenges?

  • @RixtronixLAB
    @RixtronixLAB Рік тому

    Nice video, well done, thanks for sharing it with us :)

  • @kcm100593
    @kcm100593 Рік тому

    Thank you so much for this! Do you happen to have a video or guide on how to upload an iPhone or Apple device into FTK imager to create a readable format for autopsy?

  • @RahulYadav-lu6sc
    @RahulYadav-lu6sc 2 роки тому

    TNice tutorials was very helpful thankyou.

  • @anonvpn7542
    @anonvpn7542 2 роки тому

    This is great stuff thanks. One question. At time code 33:24 when talking about substrings I noted 2 files of the same name however one has -slack on the end. Does this mean the file appears twice once in slack space?

  • @zidanetribal2343
    @zidanetribal2343 2 роки тому

    Found a new DFIR channel gem

  • @bjazi085
    @bjazi085 10 місяців тому

    One word, amazing

  • @RekhaJadhav-rk5oq
    @RekhaJadhav-rk5oq Рік тому

    Thank you for the best video. I have one doubt, though. During the case creation, we can add M5. However, we cannot add SHA512. there is only the option of adding SHA256.

  • @BlueMonkey4n6
    @BlueMonkey4n6 2 роки тому

    Excellent content as always!

  • @temitopejoshua5675
    @temitopejoshua5675 9 місяців тому

    Thank You. This was helpful

  • @liveyourlifeplease
    @liveyourlifeplease 2 роки тому

    Great explanation, thanks

  • @mroell
    @mroell Рік тому

    Awesome tutorial, thanks a lot

  • @Lexzee_Lee
    @Lexzee_Lee 2 роки тому +1

    Great video!
    What other steps can be taken to be able to view content of a carved deleted file which was unallocated and not viewable using the application feature in Autopsy?
    Is it possible to rebuild those kinda files to view the contents? Thanks.

    • @DFIRScience
      @DFIRScience  2 роки тому +2

      If some file data was successfully carved, but is not showing in the "Application" tab, then the data may not be complete or is otherwise corrupted. You can try exporting the file (right click on the file and click "Extract File(s)") and try to open it with a viewer on your computer. If that still doesn't work, then you can view the structure of the data in the hex viewer "Hex" tab.
      It really depends on what, where and how much data is missing or corrupt as to whether you can reconstruct the file.
      You might also try using PhotoRec directly to recover data of the file type you are interested in. You might get lucky. www.cgsecurity.org/wiki/PhotoRec

  • @admoconnors859
    @admoconnors859 2 роки тому

    This is good. Thanks for this.

  • @ckcyberwolf
    @ckcyberwolf 2 роки тому

    I have an image file on an external HD I run autopsy and it parses through and says finished but it will never load the image in.

  • @CitizenZReincarnated
    @CitizenZReincarnated 2 роки тому

    Thank you so much for this, you are very thorough and provide a high level overview in this video of the various ingest modules which is very helpful. I do have one question though and perhaps this comes later in the video or another video on your channel. When is the best time to configure the settings of Autopsy outside of a case? I would assume it would be prior to starting the first case on my machine. My question really applies to configuring things like the temporary directory of autopsy, changing the central repository, etc etc.

    • @DFIRScience
      @DFIRScience  2 роки тому

      Great question. Some settings you will know what makes sense for your computer/lab setup. Some settings are more case-dependent, or you will learn to tweak to your specific needs over time.
      Open up a test case in Autopsy and configure the Autopsy global settings how you want. This is when I add NSRL hashes, configure remote repositories, etc. Then close/delete the test case and Autopsy will remember your global settings when you open your real case.
      Don't be afraid to go back and change settings to try to get better performance. Sometimes they also add new features that need configured.

  • @henchnerd9404
    @henchnerd9404 2 роки тому

    how do i create a disk image, i want to practise on my own machine and recover things ive deleted from it but cant find anything on how to create a disk image that i can use for autopsy

  • @NomaGodwin
    @NomaGodwin 11 місяців тому

    I want to learn how to track devices like phones and PC. Pls I need advice on how and where to start from. Thank you to anyone helping me out on this

  • @piyushsingh4071
    @piyushsingh4071 5 місяців тому

    sir, I just wanted to know how did you downloaded the data artifacts module. Because when I do, my all files are extracted except data artifacts module

  • @siew-mengkuea3336
    @siew-mengkuea3336 Рік тому

    I installed libscca-tools and I want to analyze the Prefetch folder in autopsy, I am on Tsurugi how should I proceed?

  • @GerobakAngkringan-lw1py
    @GerobakAngkringan-lw1py Рік тому

    Hello sir, I have a question. 4 days ago i was creating a new case with disk image file from a 500gb HDD, and it still anlyzing till today... what if when the analyzing progress is finished, then i close the autopsy and turn off my laptop and then open it again... does it need to re run the analyzing progress again or not? Please help me cuz my laptop is running for 4 days till now. Thanks :)
    Sorry for bad english :D

  • @rempairamore
    @rempairamore 2 роки тому +2

    Amazing video! Nevertheless, it would have been better to use the dd/ISO files that NIST put at disposal to see all the functionalities of the software

    • @DFIRScience
      @DFIRScience  2 роки тому

      That's true. I used a smaller data set for fast processing, and realized my mistake when I wanted to show OS artifacts... I'll have to fix that! Thank you.

    • @DFIRScience
      @DFIRScience  2 роки тому

      See part 2 - we process a Windows 10 disk image and go through data artifacts and analysis results: ua-cam.com/video/5SHB4HwkX28/v-deo.html

  • @michaelpaul691
    @michaelpaul691 2 роки тому

    Thanks for overview, how well does Autopsy do with video?

    • @DFIRScience
      @DFIRScience  2 роки тому

      You can do previews, and the media utility hash some additional functionality. For in-depth processing like video spliced in video there is not a default detector (might be an external plugin). What were you thinking?

  • @小小明Lai
    @小小明Lai 2 роки тому

    Great tool for forensic .

  • @Simplelifevlogg
    @Simplelifevlogg 8 місяців тому

    Kya is app ko mobile 📲 phone me use kr skte he

  • @ThomasHoward4thDuke
    @ThomasHoward4thDuke Рік тому

    How can I do the parts using linux? I'm using a windows vm on mac

  • @mallahata4331
    @mallahata4331 2 роки тому

    hi is it possible to use autopsy to repair corrupted video file ?

  • @simranjita
    @simranjita 2 роки тому

    where to get hash values and other data shown in video, only dd file is downloadable in the given link

    • @DFIRScience
      @DFIRScience  2 роки тому +1

      Here are the hashes for SuspectData.dd
      %%%% HASHDEEP-1.0
      %%%% size,md5,sha256,filename
      ## $ hashdeep SuspectData.dd
      ##
      31457280,efbf30672c4eb3713b7f639f16944fd3,6baed29520499d2d5c44c32a0f3a8a08cbe92c47b4e00101b1041d14f9a579e2,SuspectData.dd

  • @dyarizadeh3
    @dyarizadeh3 2 роки тому

    Fantastic!

  • @stevenjeansonne3804
    @stevenjeansonne3804 2 роки тому

    If you have a partition that is encrypted and have the key /password how do you ingest it or import it?

    • @DFIRScience
      @DFIRScience  2 роки тому +2

      You will need to mount the encrypted partition first. If you are using Windows the easiest way is probably to use Arsenal Recon's Arsenal Image Mounter -> arsenalrecon.com/products/arsenal-image-mounter

  • @lovlife5717
    @lovlife5717 6 місяців тому

    Can you help me I cant see my content

  • @kazalozaloo8307
    @kazalozaloo8307 Рік тому

    Thanks ❤❤

  • @Philliesfan261
    @Philliesfan261 7 місяців тому

    Anyone else have issues installing it on Mac?

  • @tammyrhodes3823
    @tammyrhodes3823 2 роки тому

    How do you view emails? I don’t see an option for it because I keep getting a “read error”

    • @DFIRScience
      @DFIRScience  2 роки тому

      What are you clicking on before you get the read error? If you processed with the emails ingest module they should show in the main file view.

    • @tammyrhodes3823
      @tammyrhodes3823 2 роки тому

      @@DFIRScience any of the emails. I don’t have the same options as you do in the video. I processed with the emails ingest but I don’t see a section for it in your video or in my Autopsy. The last one (4.18) had a section that said “Emails”

    • @DFIRScience
      @DFIRScience  2 роки тому

      @@tammyrhodes3823 The image I used this time did not have a local email container PST/OST. That's why it didn't show up in my view. For example, if the user always uses email in their browser, they likely won't have a PST file locally. If they use an application like Microsoft Outlook, then they probably will. What application do you think the user was using on the system you are looking at?

  • @ananddarekar5052
    @ananddarekar5052 Рік тому

    sir please provide the sample data

  • @batmanasdasd
    @batmanasdasd 2 роки тому

    Love the video! I'm 15 and I wanna getting to dfir any advices for learning. Should I go college etc?

    • @batmanasdasd
      @batmanasdasd 2 роки тому

      Also where can I get practice for right now and what can I do to practice

    • @DFIRScience
      @DFIRScience  2 роки тому +1

      Thank you so much! One of the easiest things you can do is create a Twitter account and follow people that talk about digital forensics. A lot of DFIR-related people are there and always posting some amazing information. Going to college really depends on what kinds of investigations you want to do. Some people go to college and some people don't. Either can be successful, and both require a lot of work. This field does take a lot of study, so being able to do experiments is a good skill. Email me if you have any specific questions: bit.ly/DFIRSciContact

    • @DFIRScience
      @DFIRScience  2 роки тому +1

      In the description of this video I give a link to the test disk image. Download Autopsy and the test data and try for yourself! Let me know if you have any questions or need any help!

    • @batmanasdasd
      @batmanasdasd 2 роки тому

      @@DFIRScience Thank you for responding

  • @Sigmabuzz08
    @Sigmabuzz08 2 роки тому

    Hi can this be used to view video aswell

    • @DFIRScience
      @DFIRScience  2 роки тому +1

      Yes, Autopsy has a media viewer that can preview videos.

  • @IsaacFoster..
    @IsaacFoster.. 11 місяців тому +1

    yea
    Let's go get some coffee

  • @testuc375
    @testuc375 2 роки тому

    good stuff

  • @lapping78
    @lapping78 2 роки тому

    Thank you

    • @DFIRScience
      @DFIRScience  2 роки тому

      You're welcome! I hope it's useful for you.

    • @lapping78
      @lapping78 2 роки тому

      @@DFIRScience yes absolutely, just another data in my toolset. Even though I don't use it now, I still find a way to enjoy learning and reenforcing the concepts. I am currently a Windows Forensics student at SANS. So much to learn for the GCFA. Thank you for sharing.

  • @chinz3614
    @chinz3614 2 роки тому

    How to quickly paste timestamp for documentation in linux?

    • @DFIRScience
      @DFIRScience  2 роки тому

      @Chinz In notepad, you can just hit the F5 key and it will add the timestamp for you.

    • @chinz3614
      @chinz3614 2 роки тому

      @@DFIRScience I tried in Linux but it didn't worked 🙁

    • @DFIRScience
      @DFIRScience  2 роки тому

      @@chinz3614 Yeah, notepad in Windows, unfortunately. For Linux check out github.com/MattETurner/DFIRlogbook

    • @chinz3614
      @chinz3614 2 роки тому +1

      @@DFIRScience okay thanks, I will have a look

    • @BlueMonkey4n6
      @BlueMonkey4n6 2 роки тому

      depending on what editor you are using. if you are taking notes in a text document, from the shell you can do "date >> filename" to get a timestamp added to the end of the file. If you are using vi, you can do :r !date to add a date stamp into the file you are editing.

  • @DEIVID01VIDEOS
    @DEIVID01VIDEOS 2 роки тому

    Love it, thank you for the content

    • @DFIRScience
      @DFIRScience  2 роки тому

      Thank you so much!

    • @Kerianne-i1r
      @Kerianne-i1r Рік тому

      ​@DFIRScience can my ex bf use this to spy on me. He sent me a text with an autopsy image and
      I clicked on it.

  • @sreerajk9477
    @sreerajk9477 2 роки тому

    can I do with android images?

    • @DFIRScience
      @DFIRScience  2 роки тому +1

      Yes. Autopsy has modules to process Android data. You can add the data source as a file structure, not a disk image.

  • @AyallaEnglish
    @AyallaEnglish 5 місяців тому

    📌8:57

  • @sahilpatel4357
    @sahilpatel4357 2 роки тому

    everytNice tutorialng. It was still interesting. Wish I had tNice tutorials video when I started out

  • @8VT0
    @8VT0 2 роки тому

    Now we know that the evil cat abused the dog... The dog, curiously named jack, was the victim.

  • @doniwahyudi_
    @doniwahyudi_ 14 днів тому

    meanwhile , autopsy run on linux :

  • @高畑栞奈
    @高畑栞奈 2 роки тому +1

    cannot able forensic about encript ios buck up

  • @CatSmiling
    @CatSmiling 2 роки тому +1

    wow

  • @eltoruan
    @eltoruan Рік тому

    cool

  • @mvs9549
    @mvs9549 Рік тому

    pls send cat photos 😀