Asi performing-disk-forensics-investigation
git clone https://github.com/plurigrid/asi
T=$(mktemp -d) && git clone --depth=1 https://github.com/plurigrid/asi "$T" && mkdir -p ~/.claude/skills && cp -r "$T/plugins/asi/skills/performing-disk-forensics-investigation" ~/.claude/skills/plurigrid-asi-performing-disk-forensics-investigation && rm -rf "$T"
plugins/asi/skills/performing-disk-forensics-investigation/SKILL.mdPerforming Disk Forensics Investigation
When to Use
- A security incident requires forensic analysis of a system's persistent storage
- Evidence preservation is needed for potential legal proceedings or HR investigations
- Deleted files, browser history, or application artifacts must be recovered
- A timeline of user or adversary activity must be reconstructed from file system metadata
- Malware persistence mechanisms stored on disk need identification and documentation
Do not use for volatile evidence (running processes, network connections); use memory forensics with Volatility instead.
Prerequisites
- Forensic workstation with write-blocking hardware or software (Tableau T35u, Arsenal Image Mounter)
- Forensic imaging software: FTK Imager, Guymager, or dd with dcfldd
- Analysis platform: Autopsy, FTK (Forensic Toolkit), or X-Ways Forensics
- Sufficient storage (2-3x the target drive size for image plus working copies)
- Chain of custody forms and evidence bags for physical media
- Hash verification tools for evidence integrity (SHA-256)
Workflow
Step 1: Secure and Document the Evidence
Before touching any storage media, establish chain of custody:
- Photograph the system, noting serial numbers, labels, and cable connections
- Document the evidence source: device type, make, model, serial number, capacity
- Complete chain of custody form with date, time, handler name, and reason for acquisition
- Use a hardware write blocker when connecting the evidence drive to the forensic workstation
Chain of Custody Record: ━━━━━━━━━━━━━━━━━━━━━━━ Case ID: INC-2025-1547 Evidence ID: EVD-001 Description: Samsung 870 EVO 500GB SSD Serial Number: S5XXNJ0R912345 Source Host: WKSTN-042 Acquired By: [Analyst Name] Date/Time: 2025-11-15T16:30:00Z Write Blocker: Tableau T35u (S/N: T35U-12345)
Step 2: Create a Forensic Image
Produce a bit-for-bit copy of the evidence drive:
Using FTK Imager (Windows):
- Connect evidence drive through write blocker
- File > Create Disk Image > Select source drive
- Choose E01 (Expert Witness Format) for compression and metadata
- Set destination path and evidence item information
- Enable "Verify images after they are created"
- Record source and image hash values
Using dcfldd (Linux):
# Create raw image with hash verification dcfldd if=/dev/sdb of=/evidence/WKSTN-042.dd \ hash=sha256 hashlog=/evidence/WKSTN-042.sha256 \ bs=4096 conv=noerror,sync # Verify image integrity sha256sum /evidence/WKSTN-042.dd
Imaging Summary: Source Drive: /dev/sdb (Samsung 870 EVO 500GB) Image File: WKSTN-042.E01 Image Format: E01 (Expert Witness) Source Hash: SHA-256: a1b2c3d4e5f6... Image Hash: SHA-256: a1b2c3d4e5f6... (MATCH) Sectors Read: 976,773,168 Errors: 0 Duration: 47 minutes
Step 3: Analyze File System Structure
Open the forensic image in Autopsy or FTK and examine the file system:
- Identify partition layout (MBR/GPT, NTFS/ext4/APFS partitions)
- Examine the Master File Table (MFT) for NTFS or inode tables for ext4
- Identify deleted files and directories (marked as unallocated but not yet overwritten)
- Recover files from unallocated space using file carving
- Examine alternate data streams (NTFS ADS) for hidden data
Key Windows Artifacts to Examine:
User Activity: - NTUSER.DAT (registry hive per user) - UsrClass.dat (shellbags, file access history) - Recent files: %AppData%\Microsoft\Windows\Recent\ - Jump lists: %AppData%\Microsoft\Windows\Recent\AutomaticDestinations\ Program Execution: - Prefetch: C:\Windows\Prefetch\*.pf - Amcache: C:\Windows\appcompat\Programs\Amcache.hve - SRUM: C:\Windows\System32\SRU\SRUDB.dat - ShimCache: SYSTEM registry hive Persistence: - Scheduled Tasks: C:\Windows\System32\Tasks\ - Startup folders: %AppData%\Microsoft\Windows\Start Menu\Programs\Startup\ - Services: SYSTEM registry hive Network: - WLAN profiles: C:\ProgramData\Microsoft\Wlansvc\Profiles\ - Browser history: Chrome, Firefox, Edge profile directories
Step 4: Reconstruct the Timeline
Build a comprehensive timeline of file system activity:
Using Autopsy Timeline Module:
- Generate timeline from all available sources (MFT, event logs, browser history, prefetch)
- Filter to the investigation timeframe
- Identify clusters of activity correlating with the incident
- Document the sequence of attacker actions based on file creation, modification, and access timestamps
Using The Sleuth Kit (command line):
# Generate body file from NTFS image fls -r -m / WKSTN-042.dd > bodyfile.txt # Create timeline from body file mactime -b bodyfile.txt -d > timeline.csv # Filter timeline to investigation period grep "2025-11-15" timeline.csv | sort > incident_timeline.csv
Step 5: Recover and Analyze Artifacts
Extract and analyze specific forensic artifacts:
- Prefetch files: Parse with PECmd to determine program execution times and loaded DLLs
- Event logs: Parse with EvtxECmd for Windows XML Event Logs
- Registry: Parse with RegRipper or Registry Explorer for user activity and system configuration
- Browser artifacts: Parse with Hindsight (Chrome), KAPE, or DB Browser for SQLite databases
- USB device history: Extract from SYSTEM\CurrentControlSet\Enum\USBSTOR registry key
- $MFT analysis: Parse with MFTECmd for detailed file metadata including $SI and $FN timestamps
Step 6: Document Findings
Compile a forensic analysis report suitable for legal proceedings:
- Maintain evidence integrity documentation (hash chain)
- Document every tool used and its version
- Record all analysis steps in a reproducible manner
- Present findings factually without conjecture
- Clearly distinguish between facts (observed data) and interpretations (analyst conclusions)
Key Concepts
| Term | Definition |
|---|---|
| Forensic Image | Bit-for-bit copy of storage media that preserves all data including deleted files and unallocated space |
| Write Blocker | Hardware or software device that prevents any modification to evidence media during acquisition |
| E01 Format | Expert Witness Format used by EnCase and FTK; supports compression, metadata, and built-in hash verification |
| File Carving | Recovery technique that searches unallocated disk space for file headers and footers to reconstruct deleted files |
| MFT (Master File Table) | NTFS metadata structure containing entries for every file and directory, including deleted entries |
| MAC Timestamps | Modified, Accessed, Created timestamps on files used for timeline reconstruction (NTFS also has Entry Modified) |
| Prefetch | Windows artifact recording program execution metadata; contains execution count, timestamps, and loaded DLLs |
| Unallocated Space | Disk sectors not assigned to any file; may contain remnants of deleted files recoverable through carving |
Tools & Systems
- FTK Imager: Free forensic imaging tool supporting E01, AFF, and raw formats with built-in hash verification
- Autopsy: Open-source digital forensics platform built on The Sleuth Kit for comprehensive disk analysis
- KAPE (Kroll Artifact Parser and Extractor): Triage collection and parsing tool for rapid artifact extraction
- X-Ways Forensics: Commercial forensic analysis tool known for speed and efficiency on large datasets
- Eric Zimmerman's Tools: Suite of free forensic parsers (PECmd, MFTECmd, EvtxECmd, RegRipper) for Windows artifacts
Common Scenarios
Scenario: Employee Data Theft Investigation
Context: An employee submitted a resignation and is suspected of copying proprietary files to a USB drive before departing. HR requests a forensic investigation of the employee's workstation.
Approach:
- Image the workstation disk using FTK Imager with a write blocker
- Parse USB device history from SYSTEM registry to identify connected devices
- Examine ShellBags and Jump Lists for evidence of file browsing and copying to removable media
- Parse LNK files in the Recent folder to identify recently accessed documents
- Analyze browser history for personal cloud storage uploads (Google Drive, Dropbox)
- Build a timeline correlating USB connections with file access events
Pitfalls:
- Failing to image the drive before the IT department reassigns the workstation
- Not checking cloud storage browser history alongside USB evidence
- Overlooking Volume Shadow Copies that may contain earlier versions of deleted files
- Presenting analysis conclusions as fact without supporting evidence documentation
Output Format
DISK FORENSICS INVESTIGATION REPORT ===================================== Case ID: INC-2025-1547 Evidence: EVD-001 (Samsung 870 EVO 500GB SSD) Examiner: [Name] Date of Analysis: 2025-11-16 EVIDENCE INTEGRITY Source Hash: SHA-256: a1b2c3d4e5f6... Image Hash: SHA-256: a1b2c3d4e5f6... (VERIFIED MATCH) Write Blocker: Tableau T35u PARTITION LAYOUT Partition 1: NTFS 100 MB (System Reserved) Partition 2: NTFS 465 GB (C: - OS and Data) Partition 3: NTFS 500 MB (Recovery) KEY FINDINGS 1. [Timestamp] - Malware dropper created in %TEMP% (update.exe) 2. [Timestamp] - Scheduled task "WindowsUpdate" created for persistence 3. [Timestamp] - Prefetch shows 14 executions of update.exe 4. [Timestamp] - USB device "Kingston DataTraveler" connected 5. [Timestamp] - 847 files copied to E:\ drive (ShellBag evidence) RECOVERED ARTIFACTS - 3 deleted malware samples recovered from unallocated space - Browser history showing C2 panel access - Registry evidence of disabled security software TIMELINE [Chronological event listing with timestamps and evidence sources] TOOLS USED - FTK Imager 4.7.1 (imaging) - Autopsy 4.21.0 (analysis) - PECmd 1.5.0 (prefetch parsing) - MFTECmd 1.2.2 (MFT analysis)