Timestomp and Autopsy
Timestomp and Autopsy
Now, the first one of these sets is known as the standard information
file attributes. Now you'll see this in the lab as dollar signs standard
underscore information. And the others are file information attributes,
which in the lab you'll see as dollar sign file underscore name. Now this
dollar sign file underscore name or standard underscore information is
the file names that Windows use for these attributes. The dollar sign
just shows that that's a hidden file. So, the difference between these
two is that the standard information file attributes, they're user
modifiable, whereas file information attributes are not. However, there
are techniques that can be employed to set file information attributes
manually. One of these is to simply copy a file from one destination to
another folder, which will then take on the same values as the standard
information attributes.
So, in this lab, you are tasked with analysing the stock drive that's low
stock folder that's located on the desktop and this is located in C, for
SAS users for slash administrator forward slash desktop files are stopped
when you get into autopsy. Now the first thing that we can do is to just
generally look at the file properties that collect that are in this dump
file. So, if we go open the stock file, so any of these files that are in
here, we can right click on them. And we can go to properties. And we can
see some of the created modified and access dates here. But this doesn't
give us kind of the granular detail that we're looking at as part of
this, this lab. So, let's start autopsy.
Now in the tasks that you have in this lab, it says that the case has
already been created. And this is that's the case that we're going to use
as part of autopsy. But in order to help familiarise yourself with
autopsy, we're going to, I'll start by showing you how you would create a
new case for something like this. Give it a moment to load. Okay, so like
I said, let's just start by creating a new case. So, you can see how this
is done. So, the first thing you do is set up a case name. So, we'll just
do this as demo and select Next. And then you'd set a case number. And
I'll put myself as the examiner, and you click Finish. Now all the
information that we just set up their sort of examiner name and case
number that will be incredibly important in a forensic investigation in
order to prove your chain of custody.
So, this is any type of file that doesn't contain a file system, but you
want to run it through the ingest. In this instance, we want to select
logical files as we can see that these are local files that we are
looking to import. So, let's change that over and then click Next. So
here, we want to add the logical files by pressing this add button. So,
if we go to desktop, and then we want stomp, to select, and then next.
And we can just click through the screens. So now it's just analysing
those files.
Now although the analogue is in hasn't finished, we'll take a little look
at some of the things in here. So already, we can see that it's got a
JPEG there that it's pulled in. And if you click on the logical files,
you can see that it's got stopped, stopped there. And you can flick
through some of the information in this section.
So now that we've taken a look through this at how to set up a case,
we'll just close this case now. And we'll go to the case file that's
specified in this particular practical. So here, we're just going to open
an existing case, go to cases. And then new auto which is what the lab
has told us is our case file.
Okay, so we can see this case what they've analysed it to call C drive.
So, you've got the full C drive for this investigation as opposed to just
the file system that we imported. So, this includes things like email
addresses, includes web bookmarks, recent documents that have been used
by the user, and so on and so forth. There's plenty of information there.
But what we want to do first is look at our data sources. So, if we
double click on the C drive, you can see then that we're into new cars
have expanded on the left here. And you can see here you've got the file
system, all set out unstructured. So, what we want to do is go to users
and expand that menu. And we weren't administrator. And we want desktop
because we know that's where the files are that we're looking for.
So here we see the folder that we were looking for which stamp, and you
can see all of the contents of the stamp file. So, when we click on
these, you can get lots of information and this will be shown in the tabs
in the bottom section here. So, you can see the hex, you can see any
strings that are contained in the file. And you can also see the file
metadata. Now if you scroll down on the file metadata, it does some
analysis from some sleuth kit tools. And this includes standard
information attributes, file name attributes, as well as scroll up here,
the MFT and she had a value. So, there's plenty of information that
should help you here fill out your lab. So, I hope this has been helpful.
If you have any questions at all, feel free to get in touch