DFIR Lab Manual
DFIR Lab Manual
Practical 1
Setting up a DFIR lab.
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
Practical 1
Setting up a DFIR lab.
1. Define Objectives and Scope
o Disk forensics
o Network forensics
o Memory forensics
o Malware analysis
2. Infrastructure Setup
a. Hardware
• Server(s): For centralized log collection, analysis, and virtual machine hosting.
• Network Equipment: Switches, routers, and firewalls to simulate network
environments.
• Removable Media: External hard drives, USB drives, write-blockers for imaging.
b. Software Tools
• Forensic Tools:
• Incident Response:
• Malware Analysis:
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
• Virtualization:
• Simulate environments:
d. Storage Solutions
3. Network Environment
4. Operating Environment
• Operating System:
o Use a forensic-focused OS like SANS Investigative Forensic Toolkit (SIFT)
or CAINE.
• Access Control:
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
7. Regular Updates
• Periodically update tools and environments.
8. Optional Enhancements
• Cloud Integration: Use cloud platforms like AWS, Azure, or Google Cloud to mimic
enterprise environments.
• Team Collaboration: Set up a platform like GitLab or JIRA for task management.
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
Practical 2
Non-Volatile Disk imaging using FTK Imager
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
Practical 2
Non-Volatile Disk imaging using FTK Imager
Disk imaging
Disk imaging is the process of creating an exact, sector-by-sector copy of a
storage device, such as a hard drive, solid-state drive (SSD), or USB flash drive.
This copy, known as a disk image, is typically stored as a single file or a set of
files on another storage medium. Disk imaging can capture all the data on the
source device, including the operating system, applications, files, and even
hidden or unused sectors.
FTK Imager
FTK Imager is a forensic imaging tool developed by AccessData. It is widely
used in digital forensics to create bit-by-bit copies of storage devices, such as
hard drives, SSDs, USB drives, and CDs/DVDs. These copies, known as forensic
images, are used for preserving digital evidence in investigations.
The Forensic Toolkit (FTK) is a comprehensive digital forensics software
suite developed by AccessData. It is widely used by law enforcement agencies,
cybersecurity professionals, and forensic investigators to analyze digital
evidence in criminal, civil, and corporate investigations. FTK is particularly
renowned for its efficiency in processing and analyzing large volumes of data.
Steps
Step 1: Download and install FTK Imager
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
Step 4: Select Physical Drive and then Select the source Drive
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
Step 5: Select the destination folder and select the image type
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
Practical 3
Analyzing the Physical image using Autopsy to extract
evidence
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
Practical 3
Analyzing the Physical image using Autopsy to extract
evidence
Autopsy is an open-source digital forensics tool used for analyzing and investigating
digital evidence. It is a graphical user interface (GUI) for The Sleuth Kit (TSK), a
collection of command-line forensic tools. Autopsy is widely used in criminal
investigations, incident response, and cybersecurity forensics.
11. Case Management:Manages multiple cases with easy bookmarking, tagging, and
reporting features.
12. Centralized Processing:Enables collaborative investigations by running Autopsy
on a central server.
13. Cross-Platform Support:Available for Windows, Linux, and macOS systems.
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
Steps:
Step 1: Download and Install Autopsy
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
Step 8: Configure the ingest - In this panel, we have to select the ingest or modules or the
things we have to extract from the image files, and click next.
Step 9: Click on Next. Auopsy will add the Data source as a New case and will start to
analyse the ingest.
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
Step 10: After the analysis, on the left side of the screen an evidence tree will be produced
from which you can view whichever data you want to analyse.
Step 11: To create a report of the analysis, there is an option called “Generate Report”.
Click on that and select the type of report we want to generate.
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
Conclusion: Analysis of the Physical image using Autopsy to extract evidence has been
successfully performed.
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
Practical 4
Analyzing the Live running OS using Autopsy to extract
evidence without Imaging
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
Practical 4
Analyzing the Live running OS using Autopsy to extract
evidence without Imaging
Introduction
Autopsy is a tool that is used in digital forensics for the purpose of identifying what has
happened to a computer system. Autopsy can analyse disk image files, RAM dumps and
even can recover lost or deleted data.
Autopsy have a feature which allows the digital forensics expert to analyze live running
OS to extract evidence without imaging.
This feature copies the application and a batch file to a removable drive, allowing
systems to be analyzed without installing the software or imaging the drives.
To analyze a system, insert the drive and run "RunFromUSB.bat" as administrator, then
select the "Local Disk” option on the Add Data Source panel.
Another substitute for this feature in Autopsy is REDLINE. Redline is also used to extract
evidences From Requirements
1. Autopsy
2. A pendrive
3. A PC or Laptop
Procedure
1. Open Autopsy
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
4. A screen will appear where you need to select the removable disk/pendrive
5. Once you click Ok, Autopsy will start to copy the Triage files onto the pendrive
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
6. Once the process is finished, you can use that pendrive on other live system to analyse
the system without imaging.
On the target system, insert the pendrive and run the RunFromUSB.bat file. It will
automatically perform the analysis and will be saved on the pendrive itself
Conclusion: Analyzing a live OS with Autopsy enables real-time access to volatile data
but risks altering evidence. This approach suits urgent cases but lacks the preservation
offered by imaging.
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
Practical 5
Creating RAM dumps using Dump-IT and FTK
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
Practical 5
Creating RAM dumps using Dump-IT and FTK
RAM dumps
A memory dump is the process of taking all information content in RAM and writing it to
a storage drive as a memory dump file (*.DMP format).
Volatile memory, or RAM, is used to store data currently used by a running process:
whether it is a user application ora system service. This type of memory is much quicker
than a regular hard drive but unlike files permanently stored on a drive (unless deleted),
data from RAM may disappear instantly. At the same time, it may store data crucial for
your case, including passwords in raw format without encryption or encoding, decrypted
data otherwise kept encrypted on a drive, decryption keys for various services, apps and
WDE, remote sessions data, chats in social networks, malware code, cryptocurrency
transactions, various system info such as loaded registry branches, and so on. This is why
it is not argued that capturing RAM contents must be one of the first steps in seizing a
running computer or laptop.
There are various tools that can be used for memory dump. Some of them are:
1.FTK Imager
2. Dump-IT
In this practical we will be using FTK Imager and Dump-IT for creating a RAM dump.
FTK Imager should be downloaded from their official website which is given below
https://www.exterro.com/ftk -imager
Dump-IT should be downloaded from their official website which is given below
https://www.magnetforensics.com/resources/magnet-dumpit-for-windows/
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
Step 2: Browse the folder to which we want to save the memory dump.
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
Step 4: Once you click “Capture Memory” option, select the destination path desination
and click on “Capture Memory”.
Step 5: FTK Imager will now capture the memory and will be saved on the destination
folder.
CSE-PIT(PU)
Enrolment No.2203051260037 Digital Forensics & Incident Response (303105396)
Step 6: Once the process is finished, you can close the window and start analysing the
memory file.
Conclusion: A RAM dump captures volatile memory, revealing active processes, network
connections, and transient data. Using Dump-IT ensures an efficient and reliable process,
preserving evidence for analysis without disrupting the live system.
CSE-PIT(PU)