Welcome to ForensicVM documentation!

ForensicVM logo

Forensic VM logo

https://zenodo.org/badge/675339901.svg

ForensicVM is a comprehensive project designed to assist forensic investigators in the virtualization of forensic images. By utilizing advanced technologies and tools, ForensicVM simplifies the process of analyzing and examining digital evidence in a virtualized environment.

The project consists of two essential components: the ForensicVM client, which is an Autopsy plugin, and the ForensicVM server. These components work seamlessly together to provide a powerful and efficient forensic virtualization solution.

The ForensicVM server, developed using Django and Python, serves as the backbone of the system. It is recommended to install the server on Debian 11, which in turn should be set up on a dedicated bare metal server. This configuration ensures optimal performance and stability for your forensic investigations.

Please note that installing the ForensicVM server on a hypervisor is not recommended. The ForensicVM server itself acts as the hypervisor, and running it within a nested setup may result in unpredictable behavior and performance issues. To maintain the integrity and reliability of your forensic analysis, it is advised to adhere to the recommended server installation setup.

To get started with ForensicVM, your first step is to install the server. For detailed instructions, please refer to the installation section, where you will find step-by-step guidance on setting up the server environment correctly.

Once the server is up and running, you can explore the various capabilities and features of ForensicVM by diving into the usage section. This section provides comprehensive information on how to make the most out of the project, including tips, best practices, and real-world scenarios.

Additionally, if you require a deeper understanding of the technical aspects and functionalities of ForensicVM, check in the addional tForensicVM server in api section. It offers an in-depth exploration of the project’s application programming interface, empowering advanced users to leverage the full potential of the platform.

I would like to emphasize that ForensicVM is an actively developed project. I’m continuously working on enhancing its capabilities, improving performance, and adding new features. Stay tuned for updates and exciting developments as I strive to deliver the most effective and reliable forensic virtualization solution available.

Thank you for choosing ForensicVM. I am confident that it will greatly streamline your forensic investigations and contribute to the success of your work. The first step is to install the server. Head to installation

Check out the usage section for further information, including how to install the project.

https://zenodo.org/badge/675339901.svg

Introduction

Purpose of ForensicVM

ForensicVM is an innovative tool designed to streamline the process of digital forensics. By leveraging advanced virtualization technology, ForensicVM allows for the secure and efficient analysis of forensic images, making it an invaluable tool for cybersecurity professionals, digital forensics investigators, and information security teams.

Overview of Features

ForensicVM offers a range of features designed to enhance the forensic analysis process:

  • Virtualization of Forensic Images: ForensicVM enables the creation and management of virtualized instances of forensic images, paving the way for a more flexible and scalable analysis process. This virtualization can be executed either through a snapshot linked to the investigator’s storage for quick selection or by full conversion, which transfers and converts the image to a remote server to maximize the VM’s performance and features.

  • Forensic Image Lifecycle Management: ForensicVM equips users with tools for managing every step of a forensic image’s lifecycle, from creation to decommissioning. Convert the forensic image into a VM, start, stop, reset, snapshot, and safely delete the forensic image when it is no longer required.

  • Advanced Analysis Tools: Equipped with a suite of powerful analysis tools, ForensicVM assists investigators in uncovering vital evidence.

  • Integrated Hypervisor: The ForensicVM Server features a robust hypervisor based on QEMU and KVM to guarantee efficient execution and management of virtual machines.

  • Collaboration: ForensicVM employs a web development strategy that fosters remote and secure collaboration among forensic investigators. This method enables team members, regardless of their location, to work simultaneously on investigations in a digital space, enhancing productivity and communication. It leverages advanced encryption and security protocols to ensure that all collaborative efforts remain secure and confidential, protecting the integrity of investigations. In essence, ForensicVM’s approach melds convenience, connectivity, and security, revolutionizing the way forensic investigations are conducted.

  • Plugin Architecture: Plugins applied to the forensic virtual machine enable security bypassing, like creating new admins, resetting Windows activation, patching accessibility, and also allow the community to develop custom solutions that interact with ForensicVM.

  • Evidence Disk: An additional disk is automatically created with all tags from Autopsy Software, enabling easy and practical gathering and importing of evidence back to Autopsy.

  • Optional Network Card: It is disabled by default but when activated, this network card records all network traffic on the server while protecting local networking from potential attacks with pre-installed firewall rules. It also records traffic in Wireshark PCAP format.

  • On-the-Fly Memory Dumps: Capability to create volatility memory dumps at any moment.

  • Integrated Screenshots: Removes the need for an extra screenshot program.

  • Integrated Video Recording: Ability to record individual videos with a maximum duration of three hours, providing additional evidence if required.

  • Media Management: ISO management allows investigators to use their own tools during the investigation.

  • Snapshot Management: Freeze the VM in time and recall a previous state to perform “what if” tests.

  • Fine-tuning: Adjust machine memory size and set the VM start date as needed.

Warning

The network card is currently a work in progress. Under certain circumstances, the firewall rules may fail, potentially exposing your network to malicious actors. Please note that although the network safeguards your internal system, your external IP may still be visible if a C2C client is installed. Proceed with caution.

Important

Video recording is also still under development. Currently, the recordings lack audio. This limitation is expected to be addressed in future updates.

Use Cases

ForensicVM can be used in a variety of scenarios, including but not limited to:

  • Cybersecurity Investigations: In the world of ever-evolving cyber threats, ForensicVM can be employed by investigators to thoroughly analyze cyberattacks. It allows experts to delve into the intricate details of these attacks, discover the tactics, techniques, and procedures (TTPs) deployed by adversaries, and thereby contribute to the broader understanding of emerging cyber threats.

  • Incident Response: ForensicVM plays a pivotal role in the incident response process, helping to mitigate the impact of security incidents. In the aftermath of a security breach, it can quickly analyze the affected system, extracting crucial data that aids in understanding the extent of the compromise. This swift and thorough analysis can contribute to expedited recovery processes, aid in damage control, and provide insights for strengthening defenses to thwart future incidents.

  • Training and Education: ForensicVM is an invaluable tool for training budding cybersecurity professionals. It offers a safe and controlled environment for trainees to learn and practice forensic analysis. Facilitating hands-on experience enables learners to understand the nuances of digital forensics, teaching them to uncover and interpret the digital evidence left behind after cyber incidents. In academic settings, ForensicVM can be integrated into cybersecurity curricula, ensuring that the future generation of cyber defenders is well-versed in the practical aspects of forensic analysis.

  • Legal Investigations: ForensicVM can also be used in legal investigations where digital evidence plays a crucial role. Law enforcement agencies can use this tool to process and analyze digital evidence, which can provide vital leads in criminal investigations.

  • Corporate Audits and Investigations: Organizations can utilize ForensicVM in their internal audits and investigations. This tool can assist in identifying suspicious activities or misconduct, ensuring the organization’s policies and regulations are being adhered to, and maintaining a secure and compliant work environment.

Citation Guidelines

We greatly appreciate the academic and scientific community for recognizing and using this work. Citing us not only shows respect for our efforts but also makes it easy to trace the genealogy of scientific thought. Thus, if you find this work beneficial or you use parts of it in your own research, projects, or products, we kindly ask you to properly reference it.

Here’s How You Can Cite Us

We offer two main contributions: our Forensic VM Autopsy User Manual and the Autopsy ForensicVM Client Plugin Software software. Below are their BibTeX entries for your convenience.

Autopsy ForensicVM Client Plugin Software

@software{Mourinho_AutopsyForensicVM_2023,
author = {Mourinho, Nuno},
doi = {10.5281/zenodo.8153316},
month = {07},
title = {{Autopsy ForensicVM Client}},
url = {https://github.com/nunomourinho/AutopsyForensicVM},
year = {2023}
}

Forensic VM Autopsy User Manual

@misc{Mourinho_forensicVmAutopsyUserManual_2023,
doi = {10.5281/ZENODO.8274587},
url = {https://zenodo.org/record/8274587},
author = {Mourinho, Nuno},
language = {en},
title = {nunomourinho/forensicVmAutopsyUserManual: v1.0.0},
publisher = {Zenodo},
year = {2023},
copyright = {European Union Public License 1.2}
}

Requirements

To ensure that ForensicVM runs smoothly on your system, your computer and your server should meet or exceed the following requirements.

Computer Requirements to use the Autopsy Plugin

To ensure that ForensicVM runs smoothly on your system, your computer and your server should meet or exceed the following requirements.

Computer Requirements

Operating System

ForensicVM was tested and supports the following operating systems:

  • Windows 10 or later

  • Autopsy 4.20 or later

Processor

  • A 64-bit multi-core processor is recommended for optimal performance.

Memory

  • A minimum of 16 GB RAM is required. From the oficial autopsy documentation website: “We recommend a minimum of 16GB of RAM. By default, Autopsy will use a maximum of 4GB of RAM (not including memory that the Solr text indexing server uses).”

Storage

  • A minimum of 300 mb of free disk space is needed for the ForensicVM plugin installation.

  • Additional storage will be required for forensic images. The amount will depend on the size of the images you will be working with.

  • The use of Nvme or SSD is not strictly necessary but recommend as it speeds up the aquisition processes.

Networking

  • A network connection is required for software updates and to access cloud-stored forensic images. Additionally, a robust internet connection with high upload speeds is necessary to expedite the virtualization process if there is a need to convert forensic images into forensic VMs.

Display

  • A display with a resolution of 1980x1080 or higher is recommended for the best experience. If possible use a two monitor setup; one for the Autopsy plugin, and the other for forensicVM server control.

Software Dependencies

  • Install Autopsy 4.20 or higher

Additional Notes

Important

ForensicVM plugin requires administrator or root privileges for installation and running certain high-privilege operations like creating readonly windows shares!

To ensure that ForensicVM operates efficiently on your system, our server must meet or exceed the following requirements:

Server Requirements

Operating System

ForensicVM has been tested and supports the following operating systems:

  • Debian 11 (Bullseye)

Processor

  • A 64-bit multi-core processor is recommended for optimal performance. This will facilitate smoother operation, particularly when managing complex tasks.

Memory

  • A minimum of 16 GB RAM is required. However, 16 GB or more is recommended to handle the simultaneous virtualization of forensic images. This ensures that multiple tasks can be performed concurrently without a loss in performance.

Storage

  • A minimum of 2 GB of free disk space is needed for the ForensicVM installation itself.

  • Additional storage will be required for forensic images. The amount will depend on the size of the images you will be working with. At least 1 TB of disk space, configured in RAID 10, is recommended.

  • The use of NVMe or SSD is not strictly necessary but is recommended, as it can significantly speed up the virtualization process.

Important

Remember to account for the extra space needed for virtual ISO CD-ROM or DVD with your own tools. These might require additional storage depending on your specific requirements.

Networking

  • A network connection is necessary, with at least a gigabit connection recommended. The conversion of forensic images to a virtual machine, the downloading of Wireshark files, videos, or evidence disks all exert significant pressure on the network. Therefore, utilizing a reliable internet service hosting with robust upload and download rates is crucial.

Display

  • No specific display requirements exist for the server. You only need SSH access or HP ILO or similar for server administration.

Software Dependencies

  • The installation will handle dependencies automatically. A dedicated server with Debian Bullseye as bare metal is necessary. Dedicated hardware with virtualization support is essential. The installation will create a new forensic hypervisor server based on QEMU.

Additional Notes

Important

ForensicVM requires root privileges for installation and to execute specific high-privilege operations, such as converting forensic images to virtual machines, managing the ForensicVM lifecycle, and controlling various security and administrative functions within the system. These elevated permissions are essential in allowing the software to interact with core system components, manipulate disk images securely, and handle complex virtualization tasks.

Installation and Setup

This section will guide you through the steps necessary to install and set up ForensicVM on your system.

AutopsyVM Client Plugin Installation

Introduction

The AutopsyVM client plugin is a valuable addition to Autopsy, enhancing its functionality for digital forensics. Follow the steps below to install the plugin.

Step 1: Download ForensicVM.exe Setup File

Download the latest version of the ForensicVM.exe setup file from the [AutopsyForensicVM GitHub Releases](https://github.com/nunomourinho/AutopsyForensicVM/releases) page. Navigate to the “Assets” section and download the setup file.

Step 2: Run the ForensicVM.exe Setup

Run the ForensicVM.exe setup file to begin the installation process. The setup consists of four steps:

  1. Welcome Screen: Displays an introduction to the installation process.

  2. Component Installation: Proceed with the default settings. Do not make any changes.

  3. Plugin Location: Specify the location where the AutopsyVM client plugin will be installed. Typically, this does not require any changes.

  4. Install: Click the “Install” button to start the installation process.

Step 3: Complete the Installation

Follow the on-screen instructions to complete the installation. Once the installation is finished, you can proceed with using the AutopsyVM client plugin in Autopsy.

Step 4: Verify the Installation

To verify the successful installation of the AutopsyVM client plugin, open Autopsy and check if the plugin is available and functional.

Screenshots

Here are the screenshots that illustrate the installation process:

Welcome Screen

Welcome Screen

Component Installation

Component Installation

Plugin Location

Plugin Location

Finish Screen

Finish Screen

Initial Setup

After successfully installing ForensicVM one needs to configure the AutopsyVM plugin. The initial configuration is composed of the following steps:

Step 1: In Autopsy: Add a new data source to Autopsy. This new data source is the forensic image that we need to convert to a forensicVM

  1. Add datasource

  2. Specify a new hostname

  3. Next

Add data source

Add a new data source to Autopsy

Step 2: Select your Disk Image

  1. Select the option disk image or VM FIle

  2. Next

Disk Image

Disk Image

Step 3: Select your forensic image

  1. Browse for your forensic image, select it

  2. Click Next

Forensic Image Selection

Forensic Image Selection

Step 4: Run the ForensicVM client plugin

  1. Deselect all other plugins

  2. Select the forensicVM Client plugin

  3. Click next

Select data source

Select Datasource

Step 5: Open your forensicVM Server web address in the admin. Ex: https://<ip-or-web>:port/admin

  1. Enter user and password

  2. Click the login button

Configure inject

Configure inject - Select ForensicVM Client plugin

Step 6: Add a new user

  1. Enter user, password and password confirmation dialogues

  2. Click SAVE

Add user

Add user

Step 7: Add a new api key to the user

  1. Click the add button on the api keys

  2. Select the user

  3. Click the plus sign

Add API key to user

Add API key to user

Step 8: Copy the user API key

  1. Select the newly created API key

  2. Press CTRL + C or copy it using the right mouse button and select copy

Copy user api key

Copy user API key

Step 9: Paste the user API key

  1. Put the mouse on the Forensic API field

  2. Press CTRL + V or paste it using the right mouse button and select paste

Past user API key

Paste the user API key

Step 10: Fill and test the Forensic VM Server configuration

  1. Put the mouse on the Forensic VM server address. Fill in the information with your server address

  2. Click the Test Server Connection to test if API and server address are correct

Fill and test forensic VM

Fill and test forensic VM Server Configuration

Step 11: Forensic VM Server configuration test success

  1. If all pieces of information are correct and if the server is online you should see a connected successfully dialog box.

  2. If there are any problems, you should see a red error dialogue. Please check and correct the field values.

Forensic VM Server Connection test

Forensic VM server connection test

Step 12: Configure Windows Share over Forensic SSH Server Redirection

The way that forensicVM Server access the forensic images is by making a reverse ssh connection to your computer and accessing a local share via the internet. The reverse ssh connection is in need to make a safe Windows share access. You should configure now the forensicVM server SSH address and port number: #. Please fill in the SSH Server Address and port number. #. Press the button to copy the ssh key to the server

Configure and copy SSH key to the server

Configure and copy the ssh key to the server

Step 13: Windows Share over Forensic SSH copy ssh key status

  1. If the configuration is correct you should see a dialog stating that a Public key added to authorized keys

  2. If not, you should see an error dialogue or a dialogue stating that the ssh public key is already present on the remote server

Copy ssh key status

Copy ssh key status

Step 14: Testing Windows Share over Forensic SSH Server Redirection

  1. Click the Test Ssh connection button

  2. If the configuration is correct you should see a dialog stating that the connection was successful

  3. If not, you should see an error dialogue

Test Windows share over ssh

Test windows share over ssh

Step 15: Configure windows share over ssh

  1. Press the Autofill info button to autofill the Windows share information with the Share login and local and the remote path to share. This info is extracted from the forensic image’s current path.

Configure windows share over ssh

Configure windows share over ssh

Step 16: Configure the share login and the share password

  1. The share login and share password is a Windows local user and is password. It does not need to be an Administrator account. It can be a regular user. It also does not need to exist, since it is created if it does not exist when the user presses the create share button.

Configure the share login and the Share password

Share login and the share password configuration

Step 17: Create Share Button

  1. After filling in the share login and password please press the create share button.

Create a share button

Create share button

Step 18: Create a share Dialog

  1. After pressing the create share button a command window will open. This will try to create the local user with the defined password.

Create share command window

Create a share command window

Step 19: Testing the forensicVM image Windows share over ssh

  1. Press Test Windows share button to test if it is possible to connect to the Windows share from the server using a reverse ssh connection. If all is ok you will be presented with a Windows alert stating that the connection was successful

Testing the forensicVM image Windows share over ssh

Testing the forensicVM image Windows share over ssh

Caution

Ensure to use a secure Windows username and password for your share. Although this share is protected over the internet by your SSH private key, on the Windows network, your username and password could be a potential vulnerability. We recommend a dedicated, strong username and password for your share, which can be reused for multiple forensic image shares if necessary.

Note

Please configure your firewall to allow local access to your Windows shares. You can restrict the Windows share to be accessible only by your own computer. If needed, please seek assistance from your system administrator to perform this task.

Getting Started

Installing ForensicVM

Before you can use ForensicVM, you must first install the software on your system. To do this, follow the steps outlined in the Installation and Setup.

Autopsy ForensicVM Client Plugin: A Comprehensive Interface Guide

The Autopsy ForensicVM Client Plugin serves as a pivotal hub for forensic analysts. This interface is designed for interactive engagement with forensic images, subsequently allowing users to transform these images into a forensic virtual machine (ForensicVM). Here’s a breakdown of its primary functionalities on the Autopsy ForensicVM Client Plugin main interface:

Autopsy ForensicVM Client Plugin

Autopsy ForensicVM Client Plugin Main

Main Toolbar Overview (1)

  1. Configuration:

    • Prior to exploring the main functionalities, it’s paramount to configure the plugin’s settings. This preliminary setup is generally executed during the Installation and Setup.

  2. Virtualize Tab:

    This tab houses the primary operations. Specifically, users can:

    • Control the ForensicVM: Open webscreen console, Start, Stop, Shutdown, Reset, or Delete.

    • Manage Media: Organize manage media relevant to forensic analysis.

    • Manage Plugins: Run individual plugins.

    • Handle Snapshots: Capture and revert the ForensicVM to various states.

    • Capture Screenshots: Record specific instances or frames within the ForensicVM.

    • Memory Management: Generate and retrieve memory dumps, vital for observing real-time operations within the ForensicVM.

    • Virtual Evidence Disk Management: Import and regenerate the virtual evidence disk, accumulating all potential pieces of evidence.

    • Network Management: Toggle network cards on or off, and capture pcap (packet capture) files for granular network investigations.

    • ForensicVM Customization: Modify the starting date/time, reallocate memory, among other settings.

    • Performance Analysis: Employ Netdata for comprehensive metric analysis of the ForensicVM’s operations.

    • Troubleshooting: Secure an SSH connection to the ForensicVM machine, connecting directly to its remote directory. Additionally, avail an equivalent webshell for an internet-based SSH interaction with the server.

  3. Autopsy Case:

    • This tab displays the Autopsy case details, including the extant case tags (utilized for case folder creation) and the generated UUID. This UUID is unique and becomes the name for the foundational directory of the forensic virtual machine.

  4. Output Console:

    • This console captures all system messages. It’s a valuable tool for debugging or ascertaining the final state of operations.

  5. About:

    • Contains copyright details pertaining to the ForensicVM Client.

Secondary Toolbar Overview (2)

  1. Media Management:

    This tab facilitates access to auxiliary virtualization functions:

    • Media - Oversee media operations. Upload ISO files to the server and manage actions such as insert, eject, and delete.

    • Plugins - Choose and execute a specific plugin. Introduce new forensic administrators, bypass passwords, reset activations, and navigate security protocols to delve into user profiles.

    • Snapshots - Take and revert the ForensicVM to various points in time.

    • Finetuning - Adjust memory capacity and define the initial start date.

Main Panel Overview (3)

Based on the selected tab option, the main panel showcases different functionalities. For instance, when the Media tab is chosen, the corresponding list or form materializes in this space. Action buttons are located at the bottom. Among these, enabled buttons signify available actions, while disabled ones represent currently unavailable actions. These buttons toggle between enabled and disabled based on the ForensicVM machine’s status or existence.

Notification Area (4)

The notification area serves as the designated space for displaying notifications, warnings, and error pop-ups, tailored to specific events. Whenever there’s a need to apprise the user or when the system requires user interaction, a pop-up emerges in this area, seeking the user’s attention or input.

Convert Forensic Image to VM (5)

These two buttons facilitate the transformation of the forensic image into a forensic virtual machine:

  • Virtualize - a) Convert to VM:

    This option converts the forensic image into a forensic virtual machine by copying it onto the forensicVM hypervisor server.

  • Virtualize - b) Link to VM:

    This option establishes a link between the remote forensic virtual machine and the local forensic image.

For both methods, the remote forensicVM integrates an overlay of information. This includes additional drivers and outcomes from the execution of security plugins or actions taken by forensic investigators on the machine. Importantly, this approach ensures the preservation of the original forensic image’s integrity.

VM Control (6)

Manage essential actions for the forensic virtual machine:

  • Start: Power on the forensic virtual machine.

  • Stop: Cease the operation of the forensic virtual machine.

  • Shutdown: Gracefully power down the forensic virtual machine.

  • Reset: Restart the forensic virtual machine.

  • Delete: Remove the forensic virtual machine entirely.

Screenshot Management (7)

Manage the screenshots taken during your forensic investigations:

  • Screenshot: Capture the current view of the forensic virtual machine, providing a visual record of its state at that moment.

  • Save Screenshots: Compile and download all captured screenshots into a single ZIP file, allowing for easy storage and transfer.

Make and Download a Memory Dump (8)

Engage with the active memory data of the forensic virtual machine:

  • Make Memory Dump: Generate a snapshot of the forensicVM’s current memory state, capturing active processes, and other runtime details.

  • Download Memory Dump: Retrieve the created memory dump for further analysis, facilitating deeper investigations using tools such as:

    • The Volatility plugin within the Autopsy software.

    • External utilities like Volatility 3.0.

    • Rekall: Another powerful framework for memory forensics.

    • MemProcFS: Useful for live RAM analysis and incident response.

    • Redline: Offers a user-friendly interface for in-depth memory and file analysis.

Tools (9)

Use auxiliary tools for various forensic operations:

  • Import evidence disk into autopsy:

    Import a virtual disk allowing forensic investigators to collect and gather potential evidence. This option lets you import the disk as a vmdk disk into Autopsy for reporting purposes.

  • Recreate evidence disk:

    Delete and recreate the evidence disk.

Warning

This is a destructive action. Ensure to import the current evidence disk into Autopsy if it contains gathered evidence.

  • Analyze ForensicVM performance:

    Utilize the Netdata software to pinpoint server bottlenecks, optimize server performance, and determine the root cause of any ForensicVM server issues.

  • Open ForensicVM Webshell:

    Initiate an SSH-over-internet webshell connection to the server.

  • DEBUG: remote ssh to the folder:

    Access an SSH shell inside the ForensicVM image folder, allowing edits and testing of the ForensicVM start script.

Note

This is primarily used for debugging purposes.

Network (10)

Manage network settings and operations:

  • Enable network card:

    For security reasons, the network is disabled by default. Given that a machine could be compromised by malware, use this option with caution. When enabled, an internet firewall activates, blocking traffic to the local network but permitting internet access. Additionally, all traffic is recorded in the pcap (packet capture) file format.

  • Disable network card:

    Deactivates the network card and saves a pcap file with all captured traffic to the server.

  • Download Wireshark pcap files:

    Download all generated pcap files as a zip file, enabling investigators to analyze captured network traffic using tools like Wireshark or other network traffic analysis software.

ForensicVM Webscreen Console

The webscreen console, developed on the HTML5 VNC technology known as NoVNC, provides a visual and interactive gateway to the virtual screen of the remote ForensicVM. Alongside basic interactions, it also offers an array of ForensicVM control options to augment the forensic investigation process. To access this feature-rich console, select the Open ForensicVM option. Delve deeper for more details:

Webscreen Console Main Area

The following figure elucidates the available options:

Overview of the ForensicVM Webscreen Console

Overview of the ForensicVM Webscreen Console functionalities.

  • (1) Control bar open icon: By clicking on this icon, users can unveil the auto-hiding control bar that seamlessly overlays the main screen, bestowing access to an assortment of functionalities.

  • (2) Notification area: Strategically positioned at the top, this zone is dedicated to presenting error, notification, and warning messages.

  • (3) Main screen: Serving as the primary interface of the webscreen, during the boot sequence, users can hit the ESC key to dive into the BIOS or UEFI. This permits modifications to pivotal settings, with a prime focus on the boot device, especially when initiating a boot from an ISO.

ForensicVM Webscreen Console Control Toolbar

Upon clicking the control bar open icon, users are presented with the Control Toolbar, illustrated below:

Overview of the Control Toolbar in ForensicVM Webscreen Console

Overview of the Control Toolbar in ForensicVM Webscreen Console

The Control Toolbar facilitates the following actions:

  • Show Extra Keys: Displays icons representing frequently-used key combinations such as Ctrl+Alt+Del and the Windows key. Clicking these icons sends the corresponding key inputs to the ForensicVM.

  • Clipboard: Enables basic data transfer between the user’s environment and the ForensicVM, provided the QEMU agent is installed on the virtual machine.

  • Fullscreen: Expands the ForensicVM webscreen to occupy the entire display area.

  • Take a Screenshot: Captures the current view of the remote ForensicVM.

  • Enable or Disable the Network Card: This function is self-explanatory.

  • Insert or Eject Media: Facilitates the selection, insertion, and ejection of CD-ROMs or DVDs containing additional forensic tools.

  • Video Recording: Initiates, terminates, and downloads video recordings at a rate of 30 frames per minute.

  • Manage Chain of Custody: 1) Generate and download the chain of custody records document; 2) Save a comment on the chain of custody.

  • Virtual introspect: Take a memory dump and analyse it automaticaly using memory introspection, with the help of volatility 3. See current process tree, Running command line with arguments, Enviroment Variables, Possible malware injection processes, Network Connections and Running Network Services.

  • Settings: Provides access to several webscreen console preferences. Notably, users can adjust the scaling mode. Setting it to “Local Scaling” ensures the remote display fits the browser window perfectly.

  • Power: Offers control over the ForensicVM’s power states, including shutdown, stop, and reset actions.

  • Disconnect: Ends the current webscreen session.

  • Logout: Signs the user out of the ForensicVM server.

Adjusting Screen Scaling: Local Scaling

If you find that the screen appears cropped or that certain parts of the interface aren’t fully visible, you can adjust the scaling settings for a more optimal viewing experience. Here’s a comprehensive guide to making those adjustments:

Steps to Adjust Screen Scaling:

  1. Reveal the Control Bar: - Control Bar Open Icon: The control bar is typically hidden to provide a cleaner viewing area. By clicking on this icon, you’ll reveal a set of controls that overlay the main screen. These controls grant access to various functionalities.

  2. Access Scaling Settings: - Definitions Icon: Once the control bar is visible, locate and click on the definitions icon. This action will lead you into the settings or preferences area, where you can manage various aspects of the ForensicVM interface.

  3. Modify Scaling Mode: - Scaling Mode Adjustment: Inside the settings, find the option labeled “Scaling mode.” From the available choices, select “Local Scaling.” This adjustment ensures the interface perfectly fits within your screen, displaying all elements in their entirety.

Altering webscreen scaling to local scaling for complete visibility.

A visual representation showcasing the process of adjusting the webscreen scaling to “Local Scaling” for an optimized, full-screen experience.

ForensicVM Server Web Control Interface

For enhanced collaboration, remote forensic investigators have the capability to log into a dedicated web interface. This platform not only facilitates shared control of the remote web interface but also empowers multiple investigators to access the same ForensicVM simultaneously. This multi-user functionality enables diverse investigative actions such as capturing screenshots, collecting potential evidences onto the evidence disk, and initiating video recordings.

A visual representation of the ForensicVM Server Web Control Interface

A visual representation of the ForensicVM Server Web Control Interface

Interface Breakdown:

  • (1) VM Control Options:
    • Start: Power on the ForensicVM.

    • Stop: Power off the ForensicVM.

    • Shutdown: Properly shut down the ForensicVM, ensuring all processes are terminated correctly.

    • Reset: Reboot the ForensicVM.

    • Browse: Launch the ForensicVM’s web console, offering a visual interface to the VM.

  • (2) Notification Area: A dedicated space where various system communications such as messages, warnings, and error alerts are displayed.

  • (3) Server Management and Utilities:
    • Server Status (Netdata): Provides real-time performance metrics and monitoring using Netdata.

    • Shell (webshell): Access to an SSH-over-web interface, allowing for direct server interactions.

    • List VM: Refresh and display the list of existing virtual machines on the server.

    • Metrics: 1) Export virtualization gather metrics as excel document. 2) Export analysis as a word or latex document.

    • Logout: Facilitates logging out of the web interface, ensuring secure closure of sessions.

After familiarizing yourself with ForensicVM, you may want to explore more advanced topic. Refer to the respective sections in this documentation for more information.

Product Overview

ForensicVM is a powerful tool in digital forensics. It simplifies the investigation process by allowing the virtualization and management of forensic images.

ForensicVM Architecture

ForensicVM is composed of two main components:

  • The Client: The client provides a user-friendly interface for managing forensic images, allowing users to create, run, and decommission instances as needed. It supports a variety of forensic image formats, ensuring compatibility with a wide range of existing tools and workflows.

  • The Hypervisor: The hypervisor is responsible for the execution of the virtualized forensic images. It manages resources and isolation between instances, ensuring that each virtual machine runs effectively and securely.

Understanding the Interface

ForensicVM’s interface is designed with usability in mind. It provides a clear view of the current state of your forensic images, including active instances, and the status of any ongoing analysis tasks. It also provides easy access to ForensicVM’s suite of analysis tools, making it simple to start investigating a forensic image.

The Forensic Virtual Machine offers a plethora of features tailored to aid forensic analysts during their investigations. These features are systematically organized and can be accessed from various zones of the Autopsy interface. Each zone provides specific tools and functionalities, ensuring a seamless and comprehensive analysis experience.

In the table below, the distribution of features across the different zones of the interface is highlighted. This is to help users quickly identify where to locate and how to use each feature, maximizing efficiency and precision in their forensic operations.

Features and Location

Feature

Web

Screen

Plugin

Autopsy

External

Convert Forensic Image to a Forensic Virtual Machine

.

.

X

.

.

.

.

X

.

.

.

.

X

.

.

Gather Evidence Using the Evidence Disk

.

.

X

.

.

.

X

X

.

.

.

X

.

.

.

.

.

X

.

.

.

.

X

.

.

Deletion of ForensicVM at Investigation Conclusion

.

.

X

.

.

Fine-Tuning ForensicVM

.

.

X

.

.

Media Management in ForensicVM: Leveraging ISOs for Enhanced Forensic Investigations

.

X

X

.

.

.

.

X

.

.

.

X

X

.

.

.

X

X

.

.

.

X

.

.

.

.

X

.

.

.

Making, Downloading, and Analyzing a Memory Dump (memory_dump_vm)

.

.

X

X

X

.

.

X

.

.

.

.

.

X

X

Netdata on ForensicVM Server

X

.

X

.

.

Managing the Network Card to Capture and Analyse Network Traffic

.

X

X

.

X

.

X

X

.

.

.

X

.

.

.

.

X

X

.

.

.

.

X

.

.

.

.

.

.

X

Open or Browse the Forensic Virtual Machine (VM)

X

X

X

.

.

Plugins - Security Bypass Utilities

.

.

X

.

.

.

.

X

.

.

.

.

X

.

.

Resetting the Virtual Machine (VM)

X

X

X

.

.

Making and importing Screenshots

.

X

X

X

.

.

X

X

.

.

.

.

X

.

.

.

.

.

X

.

Shutting Down the Virtual Machine (VM)

X

X

X

.

.

Snapshots in ForensicVM: A Crucial Asset for Investigators

.

.

X

.

.

.

.

X

.

.

.

.

X

.

.

.

.

X

.

.

.

.

X

.

.

Starting the Virtual Machine (VM)

X

X

X

.

.

Stopping the Virtual Machine (VM)

X

X

X

.

.

Recording Video from a Forensic Virtual Machine

.

X

.

X

.

.

X

.

.

.

.

X

.

.

.

.

X

.

.

.

.

.

.

X

.

Chain of Custody Management in ForensicVM

.

X

.

.

.

Virtual Introspection

.

X

.

.

.

WebShell for Remote Administration

X

.

X

.

.

DEBUG: Remote ssh to folder

.

.

X

.

.

Table caption meaning:

  • Web = ForensicVM Main Web Interface

  • Screen = ForensicVM Web Remote Screen

  • Plugin = ForensicVM Autopsy Client Plugin Interface

  • Autopsy = Basis Technology Autopsy Software

  • External = External Software: Volatility, wireshark, etc…

Plugin Architecture

One of the key features of ForensicVM is its plugin architecture, which enables the community to extend its functionality and interact with forensic images in innovative ways. This open architecture fosters the development of new software that can interact with forensic virtual images, providing flexibility and promoting active community involvement.

Through the plugin architecture, developers can create tools to perform a variety of tasks, including but not limited to:

  • Password Administration: Reset forgotten passwords or generate new administrator accounts to gain access to the systems encapsulated in the forensic image.

  • Hibernate File Management: Remove hibernation files to remove state of the system at the time of hibernation.

  • Data Extraction and Analysis: Extract and analyze data from a forensic image to uncover evidence or gain insights into the operation of the system.

By contributing plugins to the community, developers can help to improve ForensicVM, enriching it with new features and capabilities. Moreover, by utilizing the plugins developed by the community, users can tailor ForensicVM to their specific needs, creating a more versatile and powerful forensic analysis environment.

You can contribute at: https://github.com/nunomourinho/forensicVM-Plugins

Using ForensicVM

This section provides a detailed guide on how to use ForensicVM in your forensic analysis.

Running Autopsy Forensic VM Plugin

To efficiently use the Autopsy ForensicVM plugin, it’s essential to initialize a new case within the Autopsy framework and then seamlessly integrate a new data source. Below, the comprehensive procedure is outlined:

  1. Add a New Case to Autopsy

    Initiate the Autopsy application and from the wizard interface, choose the option to add a new case. This is the first step in creating a structured environment for your forensic analysis.

    Add a New Case to Autopsy

    Add a New Case to Autopsy

  2. Fill in Case Name in Case Information

    Once the case addition window pops up, provide a unique and descriptive name for your case. This helps in distinguishing it from other cases in the future.

    Fill in Case Name in Case Information

    Fill in Case Name in Case Information

  3. Fill Optional Information

    Here, you can include additional details about the case. While this is optional, it’s recommended to fill in as much information as possible for thorough documentation.

    Fill Optional Information

    Fill Optional Information

  4. Choose Host Options

    Decide on the host configuration for this case. You can either: - Generate a new host using the data source parameters. - Specify a new host name manually. - Or, utilize an existing host from a previous case or configuration.

    Choose Host Options

    Choose Host Options

  5. Select Data Source Type as “Disk Image or VM File”

    Choose the type of data source you’re incorporating. For this procedure, select “term:Disk Image or VM File”, which allows Autopsy to process VM images and disk snapshots.

    Select Data Source Type

    Select Data Source Type

  6. Browse and Choose Your Forensic Image

    Navigate through your file system and pick the appropriate forensic image or VM file. Ensure that the chosen file is compatible and accessible.

    Choose Your Forensic Image

    Choose Your Forensic Image

  7. Select Extra Parameters Like Time Zone and Sector Size

    Fine-tune your forensic analysis by selecting the relevant time zone and determining the sector size. These parameters help in accurate data extraction and interpretation.

    Select Extra Parameters

    Select Extra Parameters

  8. Configure the Python Ingest Plugin to Run and Select the ForensicVM Client Plugin

    Activate the Python Ingest Plugin for automated data ingestion. Also, ensure to select the ForensicVM Client plugin, which is pivotal for the VM forensic analysis.

    Configure the Python Ingest Plugin

    Configure the :term:Python`` Ingest Plugin

  9. Monitor the Data Source Processing Progress

    As the data gets processed, an intuitive progress bar displays the ongoing activities and the completion percentage. Keep an eye on this to gauge the processing speed and potential completion time.

    Data Source Processing Progress

    Data Source Processing Progress

  10. Await the ForensicVM Loader**’s Initialization**

The ForensicVM Loader will make a brief appearance. This indicates that the plugin is gearing up for execution. It will automatically close once the plugin is fully initialized.

ForensicVM Loader Initialization

ForensicVM Loader Initialization

  1. Complete the Procedure and Minimize Autopsy Window

Click on the “Finish” button to round off the ‘Add Data Source’ wizard. For better visibility and multitasking, it’s advisable to minimize the main Autopsy window at this juncture.

Finish Data Source Wizard

Finish Data Source Wizard

  1. Engage with the Autopsy ForensicVM Client Plugin Interface

Post the previous steps, the dedicated window for the Autopsy ForensicVM Client plugin will emerge. Here, you can conduct in-depth VM forensics using the myriad features offered by the plugin.

ForensicVM Client Plugin Interface

ForensicVM Client Plugin Interface

Convert Forensic Image to a Forensic Virtual Machine

When aiming to convert a local forensic image to a remote forensic virtual machine on a server, two primary methods are prevalent:

  1. Direct Copy to Server: This approach duplicates the forensic image, creating a new forensic virtual machine on the server. It grants comprehensive access and utility of the forensicVM, making it the ideal choice for collaborative remote investigations.

  2. Link Creation: In this method, a link is forged between the local forensic image and a new counterpart on the server. Although it’s swifter (given that the image isn’t transferred to the remote server), there are limitations. The conversion and previewing are quick, yet initiating the machine locally is mandatory. The investigator must resort to the Autopsy client plugin to start the machine, as the web interface is incompatible due to the dependency on the original forensic image.

Steps for Both Methods:

  1. Initiate SSH Connection: An SSH link is established with the forensicVM server.

  2. Reverse Connection Establishment: This connection triggers a reverse connection to a read-only samba CIFS share, often known as a Windows share. This maneuver enables the server to access the Windows share containing the forensic image.

  3. Initiate Conversion: Here, the type of forensic image is identified, followed by the selection of an appropriate tool on the server to mount the image to a virtual raw device. This is especially vital when images span across multiple files.

    Note

    This tool selection process ensures that the appropriate software is utilized for optimal conversion.

  4. Snapshot Creation: An initial forensic image snapshot is generated. Acting as a base snapshot, it retains the state tied to the forensic image’s virtual raw. This facilitates the installation of drivers without altering the forensic image’s state or information, preserving the sanctity of the evidence.

  5. Image Conversion: The image undergoes a transformation into the qcow2 format - the favored format for KVM virtualization. It not only supports snapshots but also ensures the image only occupies the space used by the forensic image.

  6. Partition Detection: The system identifies any partitions present within the image.

  7. Operating System Detection: The OS inside each partition is discerned. If recognized, KVM-optimized virtual drivers get pre-installed, which will initiate upon the forensic virtual machine’s first boot.

  8. Fallback Conversion: If the OS remains unidentified, the VM undergoes a full conversion without any driver installations. While this could potentially enable booting, post-conversion, manual scrutiny and possible KVM driver installations are essential.

  9. Partition Absence Handling: In the event no partitions are identified, a virtual partition gets generated alongside a virtual boot device. This procedure aids in converting partition images into complete images. However, the user must invest additional effort to adapt this image for booting. They might need supplementary tools, like a virtual CD-ROM, to rectify and make the VM operational.

Tip

It’s crucial to regularly monitor the conversion process to ensure all steps are proceeding as expected and that any necessary adjustments can be made promptly.

Method 1: Copy the Local Forensic Image to a New Forensic Virtual Machine on the Server

Direct Copy to Server: This approach duplicates the forensic image, creating a new forensic virtual machine on the server. It grants comprehensive access and utility of the forensicVM, making it the ideal choice for collaborative remote investigations.

Conversion steps:

  1. Begin the Conversion:

    Initiate the conversion process by clicking on the button titled “Virtualize - a) Convert to VM”. This action sets the process in motion.

    Screenshot showcasing the "Virtualize - a) Convert to VM" button.

    “Virtualize - a) Convert to VM” button

  2. Popup Confirmation:

    Upon clicking the conversion button, a popup alert appears. This alert will display the message: “The conversion will start in a command window. Please do not close it until the conversion is finished…”. Click on “OK” to commence the conversion process.

    Popup alert confirming the start of the conversion.

    Conversion Confirmation Popup

  3. MS-DOS Command Window Feedback:

    A MS-DOS command window materializes post confirmation. This window is instrumental in detecting the image format, which will be visibly printed within. Ensure to keep an eye out for messages color-coded in green, indicating successful steps. However, should there be any errors, take note for future reference.

    MS-DOS command window indicating the progress.

    MS-DOS Command Window Progress Display

  4. Driver Installation and Conversion Completion:

    During this phase, the system installs the required KVM drivers. Various messages get displayed in this window. Here’s a color code to understand them:

    • Green: Success messages.

    • Blue: Warnings.

    • Magenta: Special information messages.

    • Red: Error messages.

    The conversion progression is displayed as a percentage.

    Conversion process display

    Conversion Progress Display

  5. Conversion completed:

    Once completed, a success message paired with the elapsed time is showcased, signaling the end of the conversion.

    Conversion Completion Display

    Conversion Completion Display

  6. Success Conversion Popup:

    Once the image conversion completes, a success popup will appear confirming the conversion’s successful completion.

    Success Conversion Popup

    Screenshot of the success conversion popup.

  7. ForensicVM First Boot:

    To boot up the machine for the first time, click the “Start” button available in the Autopsy ForensicVM Plugin.

    "Start" Button on the Autopsy ForensicVM Plugin

    Screenshot of the “Start” button on the Autopsy ForensicVM Plugin.

  8. Informational Popup - Machine Started:

    Post clicking the “Start” button, an informational popup will appear to inform you about the machine’s status.

    Informational Popup on Machine Start

    Screenshot of the informational popup after machine start.

  9. Opening the ForensicVM:

    To access the ForensicVM’s web screen interface, click the “Open ForensicVM” button. This interface will allow you to interact directly with the forensicVM.

    "Open ForensicVM" Button

    Screenshot of the “Open ForensicVM” button.

  10. ForensicVM Web Screen Interface:

Once inside the web screen interface, click the prominent “Connect / Start” button to establish a connection with the forensicVM and view its virtual screen monitor.

ForensicVM's "Connect / Start" Button

Screenshot of the ForensicVM’s “Connect / Start” button.

  1. Interact with the ForensicVM:

With the connection established, you can now freely interact with the forensicVM.

ForensicVM Interaction Interface

Screenshot showcasing the ForensicVM’s interactive interface.

Starting the Virtual Machine (VM)

Three ways to start the forensicVM

There are three different ways to start the forensic virtual machine (forensicVM). These methods provide flexibility depending on your access level and location within the system interface:

1) Start ForensicVM in the Main Plugin Interface

To initiate the forensicVM from the main plugin interface, follow these simple steps:

  1. Locate the start button on the main interface as depicted in the figure below.

Start VM on the main interface

Start VM on the main interface

  1. Press the start button to activate the virtual machine.

2) Start ForensicVM after Logging in to the Web Interface

To start the forensicVM through the web interface after login, you need to:

  1. Open the login main page.

  2. Enter your username and password, and then click on the login button.

Login on the main web interface

Login on the main web interface

  1. Once logged in, locate the start button for the selected forensicVM you wish to initiate.

  2. Press the start button to activate the virtual machine.

Start VM on the main web interface

Start VM on the main web interface

3) Start ForensicVM on the Web Remote Screen

Another option to start the forensicVM is from the web remote screen. This method may be preferred if you are working remotely or through a particular service interface:

  1. Navigate to the web remote screen.

  2. Locate the start button, as shown in the figure below.

Start VM on web remote screen

Start VM on the web remote screen

  1. Press the start button to initiate the virtual machine.

These three methods ensure that you can initiate the forensicVM from various points in the system.

Open or Browse the Forensic Virtual Machine (VM)

There are two main ways to access the started forensicVM, each catering to different use cases and preferences:

1) Open ForensicVM through the Plugin Interface

You can access the forensicVM directly through the Autopsy plugin interface.

Open forensicVM on the main interface

Open forensicVM on the main interface

2) Browse ForensicVM using the Main Web Interface

Alternatively, you can browse the forensicVM through the main web interface. This approach is generally more accessible and can be used from any web browser that supports the required protocols.

Open forensicVM on the web interface

Open forensicVM on the web interface

Steps: a) Navigate to the web interface URL. b) Log in with your credentials, if required. c) Locate the forensicVM you wish to access. d) Click the appropriate control, such as “Start,” “Stop,” “Reset”, etc., to manage the forensicVM.

ForensicVM remote screen interface

An example of the forensic image converted to a forensicVM

Open forensicVM main screen

Open forensicVM main screen on the web interface

Summary: Both methods provide control over the forensicVM, allowing you to perform a variety of tasks like starting, stopping, resetting, and more. Choosing between the plugin interface and the web interface depends on your specific needs, available tools, and personal preferences.

Shutting Down the Virtual Machine (VM)

There are three different ways to shut down the forensic virtual machine (forensicVM). These methods provide flexibility depending on your access level and location within the system interface:

1) Shut Down ForensicVM in the Main Plugin Interface

To shut down the forensicVM from the main plugin interface, follow these simple steps:

  1. Locate the shutdown button on the main interface as depicted in the figure below.

Shut down VM on the main interface

Shut down VM on the main interface

  1. Press the shutdown button to deactivate the virtual machine.

2) Shut Down ForensicVM after Logging in to the Web Remote Screen

To shut down the forensicVM through the web remote screen interface, you need to:

  1. Locate the shutdown icon.

  2. Press the shutdown button to deactivate the virtual machine.

Login on the main web interface

Login on the main web interface

3) Shut Down ForensicVM on the Web Interface

Another option to shut down the forensicVM is from the web remote screen. This method may be preferred if you are working remotely or through a particular service interface:

  1. Navigate to the web interface.

  2. Locate the machine that you need to shutdown.

  3. Locate and click the shutdown button, as shown in the figure below.

Shut down VM on web interface

Shut down VM on the web interface

These three methods ensure that you can shut down the forensicVM from various points in the system, allowing for seamless control depending on your needs and preferences.

Stopping the Virtual Machine (VM)

There are three different ways to stop the forensic virtual machine (forensicVM). These methods provide flexibility depending on your access level and location within the system interface:

1) Stop ForensicVM in the Main Plugin Interface

To stop the forensicVM from the main plugin interface, follow these simple steps:

  1. Locate the stop button on the main interface as depicted in the figure below.

Stop VM on the main interface

Stop VM on the main interface

  1. Press the stop button to halt the virtual machine.

2) Stop ForensicVM after Logging in to the Web Remote Screen

To stop the forensicVM through the web remote screen interface, you need to:

  1. Locate the stop icon.

  2. Press the stop button to halt the virtual machine.

Stop VM on the web remote screen

Stop VM on the web remote screen

3) Stop ForensicVM on the Web Interface

Another option to stop the forensicVM is from the web interface. This method may be preferred if you are working remotely or through a particular service interface:

  1. Navigate to the web interface.

  2. Locate the machine that you need to stop.

  3. Locate and click the stop button, as shown in the figure below.

Stop VM on web interface

Stop VM on the web interface

These three methods ensure that you can stop the forensicVM from various points in the system, allowing for seamless control depending on your needs and preferences.

Resetting the Virtual Machine (VM)

Resetting the forensic virtual machine (forensicVM) is akin to an immediate reboot, and there are three different ways to do so. These methods provide flexibility depending on your access level and location within the system interface:

Reset ForensicVM in the Main Plugin Interface

To reset the forensicVM from the main plugin interface, follow these simple steps:

  1. Locate the reset button on the main interface as depicted in the figure below.

Reset VM on the main interface

Reset VM on the main interface

  1. Press the reset button to immediately reboot the virtual machine.

Reset ForensicVM after Logging in to the Web Remote Screen

To reset the forensicVM through the web remote screen interface, you need to:

  1. Locate the reset icon.

  2. Press the reset button to immediately reboot the virtual machine.

Reset VM on the web remote screen

Reset VM on the web remote screen

Reset ForensicVM on the Web Interface

Another option to reset the forensicVM is from the web interface. This method may be preferred if you are working remotely or through a particular service interface:

  1. Navigate to the web interface.

  2. Locate the machine that you need to reset.

  3. Locate and click the reset button, as shown in the figure below.

Reset VM on web interface

Reset VM on the web interface

These three methods ensure that you can reset the forensicVM from various points in the system, allowing for immediate rebooting as needed. This can be useful in various scenarios, such as when troubleshooting, testing, or managing different virtual machine states.

Making and importing Screenshots

Making screenshots

It is often necessary to take screenshots of the forensic virtual machine (forensicVM) for documentation, analysis, or reporting purposes. There are two primary ways to capture a screenshot, depending on your location within the system interface:

1) Capture Screenshot in the Main Autopsy Plugin Interface

To take a screenshot of the forensicVM from the main Autopsy plugin interface, please press the Screenshot button on the screenshot panel:

Screenshot VM on the main Autopsy plugin interface

Screenshot VM on the main Autopsy plugin interface

2) Capture Screenshot in the Web Screen Interface

Capturing a screenshot from the web screen interface is similarly straightforward:

  1. Navigate to the web interface where the forensicVM is displayed. Expand the tools panel.

  2. Locate the screenshot icon or use the appropriate key command within the web interface.

  3. Press the camera icon to take a screenshot.

Screenshot VM on the web screen interface

Screenshot VM on the web screen interface

These methods enable you to capture visual records of the forensicVM from different points within the system, providing flexibility for various operational needs.

Downloading Screenshots as a ZIP File

After capturing the necessary screenshots of the forensic virtual machine (forensicVM), you can download them all as a ZIP file. This process is done in four steps:

1) Press the Save Screenshots Button
  1. Navigate to the screenshots panel within the plugin interface.

  2. Locate and press the “Save Screenshots” button.

Save screenshots button on the plugin interface

Save screenshots button on the plugin interface

2) Save As Dialogue with Default Path
  1. You will be presented with a “Save As” dialog box.

  2. The default path for saving will be the forensic image path inside the Autopsy case path.

  3. Confirm the save location and proceed.

Save As dialog with default path

Save As dialog with default path

3) Download Progress and Success Alert
  1. A download progress bar will appear, showing the status of the download.

Download progress

Download progress

  1. Once the download is complete, an alert box will appear, saying that the screenshots were successfully downloaded.

Success alert

Success alert

4) Open Windows Path with Screenshots.zip
  1. The Windows path where the screenshots.zip file is saved will be opened in Windows Explorer.

  2. You can then access the ZIP file containing all the screenshots.

Windows path with screenshots.zip

Windows path with screenshots.zip

These steps ensure an efficient and organized process for downloading the captured screenshots of the forensicVM, making it convenient for further use or analysis.

Importing Screenshots to Autopsy Software

1) Unzip Your Screenshots with Your Favorite ZIP Program (e.g., 7-Zip)

Start by extracting the ZIP file containing your screenshots. Using a tool like 7-Zip, right-click the ZIP file and choose the extraction option.

Unzip screenshots using 7-Zip

Unzip screenshots using 7-Zip

2) Copy Screenshot Path in Explorer

Navigate to the folder where the screenshots were extracted and copy the full path from the address bar in Explorer.

Copy screenshot path in Explorer

Copy screenshot path in Explorer

3) Add a New Data Source

Open Autopsy and initiate the process of adding a new data source by selecting the relevant option in the interface.

Add a new data source

Add a new data source

4) Select the Host for Which You Have to Import the Screenshots

Choose the appropriate host for which you want to import the screenshots.

Select the host

Select the host

5) Select Logical Files as the Data Source

Select “Logical Files” as the type of data source for importing the screenshots.

Select Logical Files as the data source

Select Logical Files as the data source

6) Click the Button “Add” to Add a New Logical Data Source Folder

Click the “Add” button to create a new folder for the logical data source where the screenshots are stored.

Click "Add" button

Click “Add” button

7) Paste the Path of the Screenshots and Press “Select”

Paste the previously copied path of the screenshots into the designated field and press the “Select” button.

Paste the path and press "Select"

Paste the path and press “Select”

8) Press “Next”

Press the “Next” button to proceed to the following step of the configuration.

Press "Next"

Press “Next”

9) Deselect All Plugins. Select the Ingest Plugin “Picture Analyser.” Press “Next”

Deselect any unnecessary plugins and select only the “Picture Analyser” plugin, then press “Next.”

Select "Picture Analyser" plugin

Select “Picture Analyser” plugin

10) Press “Finish”

Press the “Finish” button to complete the configuration and begin the import process.

Press "Finish"

Press “Finish”

11) Browse into the Imported LogicalFileSet Inside the Data Source. Right-click the Mouse

Browse the imported LogicalFileSet inside the data source, and right-click on the specific file you want to view.

Browse into LogicalFileSet

Browse into LogicalFileSet

12) Select “Open in External Viewer” or Press CTRL+E

Select the “Open in External Viewer” option from the context menu, or simply press CTRL+E on your keyboard.

Open in External Viewer

Open in External Viewer

13) The Image is Displayed

The selected image is now displayed, allowing you to view and analyze it as needed.

Image displayed

Image displayed

This step-by-step guide helps you efficiently import the screenshots from the forensic virtual machine into Autopsy software for in-depth analysis, enabling a streamlined workflow and enhancing your investigation process.

Note

Importance of Tagging Screenshots for Evidence

Tagging screenshots in Autopsy forensic software is a pivotal step in digital investigations. It allows forensic professionals to systematically identify, analyze, and report on crucial visual information. Tagged screenshots can be included in final reports, where they may be presented as potential evidence in legal proceedings. The process ensures the integrity of visual data and contributes significantly to building a solid case.

In the realm of digital forensics, Autopsy forensic software plays a crucial role in analyzing and managing evidence. A key feature of this powerful tool is its ability to handle screenshots, which are often vital in investigations.

Tagging Relevant Screenshots: With Autopsy, investigators can sift through various images and screenshots collected during the forensic analysis. If certain images are identified as potentially relevant to a case, they can be tagged for further scrutiny. This tagging function is more than a mere organizational tool; it’s a systematic way to highlight essential visual information that may prove crucial in understanding the digital activities related to a case.

How to Tag: Simply right-click on the desired screenshot and select the “Tag” option. You may create custom tags or use predefined ones, adding notes or comments as necessary. This flexibility ensures that you can organize your screenshots in a way that suits your specific investigative needs.

Inclusion in the Final Report: Tagged screenshots are not merely an intermediate step in the investigation. They often form an integral part of the final report. When compiling your findings, all tagged screenshot photos can be automatically included as potential evidence. They are presented in a well-organized manner, often alongside corresponding notes or observations made during the analysis phase.

How to Include in Report: Typically, there’s an option to include tagged items in the report generation process. Make sure to select this option to have all tagged screenshots appear in the final document. Presenting as Evidence: The end report, including the tagged screenshots, can be used in legal proceedings as possible evidence. The organized and systematic way in which these images are handled, analyzed, and reported in Autopsy ensures their integrity and admissibility in a court of law.

In conclusion, the ability to tag relevant screenshots in Autopsy forensic software is not merely a feature but an essential process that enables precise analysis, reporting, and legal utilization of visual data. It allows forensic professionals to efficiently identify and focus on critical visual information, contributing to a more comprehensive and convincing presentation of evidence in any given case.

Making, Downloading, and Analyzing a Memory Dump (memory_dump_vm)

Making and download a Memory Dump

Making a memory dump refers to the process of capturing the content of a computer’s memory (RAM) at a specific moment in time. This snapshot can include various elements, ranging from currently running processes to user credentials and even the contents of open files. The practice is critical for several reasons:

Security Analysis

In the realm of cybersecurity, memory dumps have become an essential tool. Here’s how they contribute:

  • Uncovering Malware Behavior: Memory dumps allow security professionals to see what is happening inside the system’s memory, including hidden or obfuscated malware activities. By analyzing these dumps, one can reveal the behavior of malicious code, tracking its origin, and how it interacts with the system.

  • Detecting Hidden Processes: Sophisticated malware often hides from standard detection methods. Memory analysis helps in uncovering these hidden processes, providing a more transparent view of unauthorized activities.

  • Injected Code Analysis: Attackers may inject malicious code into legitimate processes to conceal their actions. A memory dump helps in identifying these code injections, leading to better understanding and mitigation of such threats.

  • User Credential Analysis: Sometimes, credentials might be stored in memory. A memory dump could reveal these details, helping in understanding potential security breaches or vulnerabilities.

Forensic Analysis

Digital forensic analysts often use memory dumps to investigate suspicious or malicious activities:

  • Timeline Analysis: Memory dumps can provide a chronological view of the activities that transpired on the device, aiding in reconstructing events leading up to an incident.

  • Data Recovery: Even if data is deleted or encrypted, remnants might still exist in the system’s memory. Analyzing memory dumps may allow the recovery of this vital information.

  • Artifact Analysis: Various artifacts related to user activities, system interactions, and file usage can be extracted and analyzed from memory dumps, painting a comprehensive picture of user behavior.

1) Press the “Make and Download Memory Dump” Button

Press the button labeled “Make and Download Memory Dump” to initiate the process.

Press "Make and Download Memory Dump" button

Press “Make and Download Memory Dump” button

2) Save the Memory Dump on the Default ForensicVM Image Case Path

Choose the default forensicVM image case path to save the memory dump.

Save the memory dump

Save the memory dump

3) Monitor Memory Download Progress with Time Estimation

Keep track of the download progress, including an estimated time remaining for the download to complete.

Memory Download progress

Memory Download progress

4) Success Message Stating that the Memory was Saved as “memory.dump”

A success message will appear, stating that the memory was saved as “memory.dump.” The explorer will automatically open afterward.

Success message

Success message

5) Windows Explorer Open on the Memory Dump Folder

The Windows explorer will open automatically, displaying the folder containing the memory dump.

Windows explorer open on the memory dump folder

Windows explorer open on the memory dump folder

Importing and Analyzing a Memory Dump in Autopsy

Analyzing a memory dump can provide critical insights into the state of a system at a particular point in time. Memory dumps may contain valuable information that helps investigators understand what processes were running, what files were open, and even what keys were being pressed.

Autopsy enables an investigator to examine memory dumps by following a series of steps to import and analyze the data. Here’s an expanded walkthrough:

1. Locate the Memory Dump File Begin by identifying the file you wish to analyze. This could be a file that you have obtained from a machine you are investigating. Make sure to have the file accessible and note its location on your system.

2. Prepare Autopsy for Importing the Memory Dump Launch Autopsy and create a new case or open an existing one where you want the memory dump to be analyzed. The case structure in Autopsy helps in organizing different data sources and findings related to an investigation.

3. Add the Memory Dump as a Data Source Inside your case, look for an option to add a new data source. This is usually achieved by clicking on the “Add Data Source” button. You’ll be guided through a series of prompts to configure the import.

4. Choose the Host and Data Source Type You’ll need to select a host, which typically refers to the system from which the memory dump was obtained. Then, choose “Memory Image File (Volatility)” as the Data Source Type, a common format for memory dumps.

5. Navigate to the Memory Dump File Click the “Browse” button and use the file dialog to locate the memory dump file on your system. You may need to paste the exact path if you have copied it earlier.

6. Configure the Analysis Settings This involves setting the timezone, memory profile (which should correspond to the OS of the dumped system), and selecting or deselecting specific plugins. Plugins in Autopsy extend its functionality and can be used to run specific analyses on the data.

7. Ingest the Memory Dump After confirming your settings, Autopsy will begin the process of ingesting the memory dump. This might take a significant amount of time, depending on the size of the dump and the capabilities of your system.

8. Review the Results and Check for Errors Upon completion, review the log to check for any errors or warnings. This is a vital step to ensure that the data was imported correctly and that all selected analyses were performed successfully.

9. Analyze the Memory Dump Finally, you can start analyzing the memory dump. Autopsy provides various tools and views to help you explore the data. You can browse through processes, network connections, registry keys, and more. Look for anomalies or signs of malicious activity.

10. Tag and Document Findings As you proceed with your analysis, make sure to tag any interesting findings. Autopsy provides features to annotate and comment on your discoveries, making it easier to reference them later or include them in your final report.

1) Copy the Path of the Memory Dump from Windows Explorer

Start by locating the memory dump file on your system. Open Windows Explorer, navigate to the directory containing the memory dump, right-click on the path, and select “Copy” This action will copy the path’s location to your clipboard, allowing you to easily paste it later in the Autopsy software.

Copy the path of the memory dump

Copy the path of the memory dump

2) Press the “Add Data Source” Button on the Autopsy Software

Open Autopsy and initiate the process of adding a new data source by pressing the “Add Data Source” button. This button typically resides in the main toolbar.

Press "Add Data Source"

Press “Add Data Source”

3) Select the Host to Where the Memory Dump Should be Made and Press Next

You will be prompted to select a host, which is the computer or device where the memory dump will be analyzed. Choose the appropriate host from the list provided, and then press “Next” to continue.

Select the host

Select the host

4) Select as Data Source Type the “Memory Image File (Volatility)” and Press Next

In this step, you will specify the type of data you are importing. Select “Memory Image File (Volatility)” from the list of data source types, as this is the appropriate option for memory dumps. Once selected, click “Next.”

Select Memory Image File (Volatility)

Select Memory Image File (Volatility)

5) Click the “Browse” Button to Select the Path Where the Memory Dump Is

A file browser window will appear. Click the “Browse” button, navigate to the location where the memory dump is stored, and select the file. If you copied the path earlier, you could paste it into the file path field to quickly locate the file.

Click "Browse" button

Click “Browse” button

6) Paste the “memory.dump” Path, Select the memory.dump File, and Press Open

Once you have located the “memory.dump” file, select it by clicking on it, then press the “Open” button to confirm your selection.

Paste and select the memory.dump file

Paste and select the memory.dump file

7) Configure Timezone, Memory Profile, and Plugins to Run. Press Next

You will now be asked to configure several settings specific to your analysis. Set the appropriate timezone to match the original system’s time setting. Choose the correct memory profile, which should match the operating system of the analyzed machine. Optionally, select any plugins you want to run during the analysis. Click “Next” to proceed.

Configure settings

Configure settings

8) Deselect All Plugins and Press Next

Deselect all plugins in this step. Then, press “Next.”

Deselect plugins

Deselect plugins

9) Wait Until the Memory Ingest Module is Finished

This step may take some time, as Autopsy processes the memory dump. Depending on the size of the file and your computer’s capabilities, this could take several minutes or even hours. A progress bar or other indicator may be available to monitor the process. Please be patient.

Ingesting memory

Ingesting memory

10) Check for Errors and Press “Finish”

Upon completion, a dialog will appear, summarizing the process and any issues encountered. Press the “View Log” button to inspect any errors or warnings in detail. Finally, press the “Finish” button to conclude the process and close the dialog.

Press "Finish"

Press “Finish”

11) Locate the Memory Dump on the Interface and Browse the Results

With the import process complete, you can now find the imported memory dump within Autopsy’s interface. Browse through the results, and use Autopsy’s various tools to examine the data. Remember to tag any findings that may be of interest, as these can be critical to your investigation.

Locate and browse the memory dump

Locate and browse the memory dump

Aditional Tools to analyse memory dumps

Analyzing memory dumps is a vital task in computer forensics, malware analysis, and system diagnostics. Several tools have been developed to support this task. Here’s an overview of some widely-used tools other than Autopsy for memory dump analysis:

  1. Volatility: Volatility is an open-source memory forensics framework. Documentation.

  2. Rekall: Rekall offers a set of features for memory forensics. Documentation.

  3. WinDbg: Microsoft’s WinDbg for debugging Windows applications and analyzing memory dumps.

  4. Magnet RAM Capture: Magnet RAM Capture is a free tool for capturing physical RAM.

  5. FTK Imager: AccessData’s FTK Imager for capturing and analyzing memory dumps.

  6. MoonSols DumpIt: MoonSols DumpIt for creating memory dumps from Windows systems.

  7. Redline: Provided by FireEye, Redline offers advanced memory and file analysis capabilities.

  8. GRR (Google Rapid Response): GRR an incident response framework that includes memory analysis capabilities. Documentation.

  9. Belkasoft Evidence Center: Belkasoft Evidence Center includes the ability to analyze computer memory.

  10. X-Ways Forensics: X-Ways Forensics a commercial product with strong memory analysis features.

These tools offer a wide range of capabilities, from capturing memory images to detailed analysis. Depending on the specific requirements of the analysis, an investigator might choose one or several of these tools.

Recording Video from a Forensic Virtual Machine

Recording video from a forensic virtual machine (VM) that was created from a forensic image is not just a technical procedure; it’s a crucial part of preserving and analyzing digital evidence in a meticulous and traceable manner. Below are the reasons why this approach is essential:

Immutable Record

When a virtual machine is created from a forensic image, it’s a snapshot of a system at a specific point in time. Recording a video of the interactions and findings within this VM provides an immutable and chronological record. It ensures that every action taken can be reviewed, analyzed, and presented, leaving no room for doubt or ambiguity.

Transparency and Accountability

The video serves as a transparent and detailed log of what was done during the investigation. This helps in maintaining the integrity of the process, proving that the examination was conducted ethically and without alteration of the original data. If questions arise later, the video can be referred back to, to demonstrate exactly what was done.

Legal Compliance

In legal scenarios, the chain of custody must be robust and without breaks. Video recordings from the forensic VM provide a visual and auditable trail that can be an integral part of court proceedings. They offer judges, lawyers, and juries a clear and understandable view of the digital evidence, often aiding in decisions.

Training and Collaboration

The videos are not only useful for the case at hand but can be utilized for training purposes. They offer a real-world insight into how a forensic examination is conducted, the tools used, and the methodologies followed. Furthermore, they facilitate collaboration between teams and experts, allowing them to review and discuss findings visually.

Error Detection

If mistakes are made during the investigation, video recordings enable forensic analysts to backtrack and understand where things went wrong. This can be vital for correcting errors and learning from them for future investigations.

Enhancing Public Trust

Lastly, the practice of recording video from forensic VMs can also contribute to enhancing public trust in digital forensic processes. It sends a strong signal that the work is conducted with utmost professionalism, thoroughness, and adherence to legal standards.

Record a video from the forensicVM

  1. Show the control bar on the forensicVM web screen web interface by clicking the arrow button.

    Show the control bar

    Show the control bar

  2. Press the video recording icon. This icon will open a modal box.

    Press the video recording icon

    Press the video recording icon

  3. Press the red “Record Video” button.

    Press "Record Video" button

    Press “Record Video” button

  4. The recording is in progress; it can be up to 3 hours of recording before the video stops. The “rec” animation on the top right will show that the recording is in progress on the server.

    Recording in progress

    Recording in progress

Stop the video recording

  1. To stop the recording, first press the record icon on the control bar.

    Stop recording

    Stop recording

  2. On the modal box, please press the “Stop recording button”.

    Stop recording button

    Stop recording button

  3. You will see two notification messages. The first one says, “Sent stop video recording,” to indicate that the video has stopped recording. The video has to be processed on the server to download. When the video is completed on the server, you will see a second notification message stating, “Video saved (Video recorder with the name videoNNNN.mp4)”, where NNNN is the video number. Please note down this number.

    Notifications

    Notifications

Download video recording

  1. To download, please press the record video icon again on the control bar.

    Download icon

    Download icon

  2. Now, press the “Download” button. You should now wait until the download is ready. It will start download automatically, so please do not close the webpage. The video preparation time and the download time will directly depend on the video size.

    Press "Download" button

    Press “Download” button

  3. Download started message

    Download started message

    Download started message

  4. After the video is downloaded, in the web browser, please open the download folder where the video file is.

    Locate downloaded file

    Locate downloaded file

Import video recording for analysis in Autopsy Software

  1. With the shift key pressed, press the right-click on the mouse over the video file. Then select the “Copy as path” option on the menu.

    Copy as path

    Copy as path

  2. Open Autopsy software. On the menu bar, please click the “Add Data Source” button.

    Open Autopsy

    Open Autopsy

  3. Select the host and click next.

    Select host

    Select host

  4. Select Logical Files and click next.

    Select Logical Files

    Select Logical Files

  5. Click Add to select the video.

    Click Add to select video

    Click Add to select video

  6. Paste the path in the “File name:” field and click the “Select” button.

    Select video

    Select video to import

  7. Click Next.

    Click Next

    Click Next

  8. Deselect all ingest plugins and click next.

    Deselect plugins

    Deselect plugins

  9. Click Finish.

    Click Finish

    Click Finish

  10. 1. Select the video file, 2. With the mouse right-click, “Add a File Tag”, 3. Select the tag that is relevant to the forensic investigation.

Tagging video

Tagging video

Note

Video Recording Sound The current version of the video recording feature within the forensic virtual machine does not include sound. It captures only the visual interactions and activities within the system. We recognize the importance of sound in some investigations, and we are actively working to add this capability in a forthcoming version of our software.

In the meantime, if sound recording is a necessary component of your forensic analysis, we advise utilizing third-party tools specifically designed for video and audio capture. Please ensure that any third-party tool used complies with your legal and organizational requirements.

Gather Evidence Using the Evidence Disk

The evidence disk is an automatically generated drive that materializes during the conversion of a forensic image to a ForensicVM. This utility drive is populated with directories that carry the same names as the Autopsy tags. These directories serve as designated containers, wherein the forensic investigator is expected to compile and organize evidence relevant to each tag. If ever the need arises, the investigator has the option to reset the evidence disk to its initial state. However, such an action should be approached with caution, as it would entail the deletion of all previously gathered evidence.

In the event that new tags are introduced in Autopsy, corresponding folders for these tags will be fashioned once the plugin is restarted.

Tip

In order to fabricate any missing tag directories, it’s essential to first halt the ForensicVM’s operations. It’s advised to shut down the ForensicVM, subsequently close the plugin, and then reopen it via the Autopsy ForensicVM Client Plugin. This procedure ensures that the environment is refreshed and ready to incorporate new changes.

Evidence Disk Creation

The creation of the evidence disk is an automated process. When you transition a forensic image into a ForensicVM, regardless of whether the method employed is virtualization copy or linking to the forensic image, the evidence disk is fashioned during the final phase of this procedure.

Evidence Disk Creation Process

Screenshot depicting the final phase of the ForensicVM conversion, showcasing the creation of the evidence disk.

Collecting Evidence: A Step-by-Step Guide

Collecting digital evidence is a meticulous process, demanding precision, patience, and an understanding of the system you are investigating. When using the ForensicVM, this process is facilitated, yet there are still specific steps to follow. Here’s a comprehensive guide on how to go about it:

  1. Initiation of the ForensicVM:

    Before you can begin your evidence collection, ensure that the ForensicVM is up and running. Start the virtual machine and patiently wait for it to boot up completely.

  2. Logging In:

    Once the ForensicVM has completely loaded, proceed to log in using the credentials provided or set during the initial configuration. Remember, maintaining the security and integrity of the login process is crucial in a forensic investigation.

  3. System Exploration:

    With access to the ForensicVM, you can now begin your deep dive into the system. Navigate through the directories, files, applications, and logs. Always keep an eye out for suspicious or relevant files, unusual patterns, or any anomalies that might serve as potential evidence.

  4. Copying Relevant Files to the Evidence Disk:

    As you uncover potential pieces of evidence:

    • For Windows Users:

      The process is quite straightforward. Simply copy the relevant files or data and save them to the evidence disk, which is typically represented as the D: drive. This dedicated drive serves as a safe repository, ensuring that the original data remains uncompromised.

    • For Linux Investigation:

      Things might be quite different. Instead of having immediate access to the evidence disk, you might need to locate it first. Once found, proceed to mount the disk manually. After which, you can copy and save the necessary files or data to this disk.

Note

Remember, while the process might seem technical, the key is to maintain the integrity of the evidence and ensure that all actions are documented and reproducible. It’s not just about finding the evidence, but also about ensuring its admissibility in a court of law.

Collect Evidence on Windows

Log into Windows

Begin by logging into the operating system. Should there be a need, employ a plugin to either craft a forensicAdministrator user or reset an existing user’s password.

Login screen

Windows login screen.

Identify Evidence and the Evidence Disk

Post login, your next objective is to pinpoint the evidence disk. This specific disk is marked with the label possible evidence. Conventionally, it’s designated as drive D:. The very essence of this disk is a collection of folders; each bearing the name of tags available in Autopsy. Though investigators have the liberty to tailor-make folders or sub-folders as per the requirements of their investigation, a suggested practice is to either refine or instate new tags in Autopsy. Post this step, both the Autopsy Plugin and the ForensicVM should be restarted.

Locating evidence

Identification and transfer of evidence.

The Fig. 141 offers a visual guide: The evidence drive is demarcated by a green rectangle, while the Windows Explorer - which is in the process of identifying potential evidence - is enclosed within a red rectangle. The objective here is to locate and transfer the identified evidence into the “possible evidence” drive, ensuring they’re nestled under the appropriate Autopsy Folder Tags.

Example: Transferring the Entire Encrypted BitLocker Drive

The illustration below showcases the entirety of an encrypted BitLocker drive being transferred to the Autopsy ‘Follow Up’ tag. The foundational principle of this process lies in ensuring that the full, unaltered encrypted drive is copied, preserving its integrity for forensic examination. By copying the entire encrypted disk file, forensic analysts can ensure they are working with a complete and untampered set of data.

Entire encrypted BitLocker drive being transferred

Transferring the full encrypted BitLocker drive to the Autopsy ‘Follow Up’ tag.

Pre-importing Considerations for Autopsy

Before integrating the possible evidence drive into Autopsy, it’s imperative to either shut down or stop the forensicVM. Opting for a shutdown is highly recommended. Choosing to merely stop the virtual machine introduces the risk of data corruption which could compromise the integrity of the evidence or render parts of it unusable.

Shutdown or stop options

Options available for safely preserving the BitLocker drive before importing to Autopsy.

Collecting Evidence on Linux

Accessing the System

To embark on evidence collection, the primary step involves gaining access to the Linux system. Knowledge of user credentials is essential. If you find yourself without the necessary credentials, consider utilizing available plugins to assist. Alternatively, developing and sharing a new plugin with the community could be a valuable contribution! The illustration below presents the login process for an Ubuntu 22.10 system featuring a comprehensive desktop environment.

Ubuntu 22.10 login screen

Ubuntu 22.10 login screen with a full desktop.

Identifying the Evidence Disk

After successfully logging in, launch the file explorer to identify the evidence disk. In the given instance, one would navigate to “Other locations” and subsequently double-click on “possible evidence” to initiate its mounting.

Navigating to 'Other locations' in file explorer

Identifying the “possible evidence” disk in the file explorer.

Plan Evidence Gathering

Once the evidence drive is appropriately mounted, you’re primed to delve into your evidence search. Displayed in the subsequent figure are folders corresponding to various Autopsy Tags, offering a structured approach to evidence organization.

Autopsy Tags folders

Autopsy Tags folders for structured evidence organization.

Explore and find possible evidence

Navigating to the designated folder, we discern a hash dump file alongside potential evidence pointing to the deployment of a meterpreter.

Identifying potential evidence

Highlighting a hash dump file and indications of meterpreter usage.

Organize and Transfer Potential Evidence to the Evidence Drive

Now, to preserve this crucial data, ensure you copy the identified potential evidence to the designated “possible evidence” folder.

Transferring evidence to the 'possible evidence' folder

Transferring discovered evidence to the “possible evidence” folder.

Preparing for Autopsy Integration

Before channeling the evidence disk into Autopsy, it’s paramount to adopt one of two measures: either halt the forensicVM operations or completely shut it down. Favoring the shutdown route comes strongly advised, as a mere halt could inadvertently introduce data corruption. Such anomalies might jeopardize evidence integrity or entirely nullify certain data segments. In our context, you’d initiate this by selecting the power icon, followed by the “Power Off/Log Out” option from the ensuing menu.

Navigating to the power options

Accessing the power options on Ubuntu 22.10.

Concluding the Process

To safeguard all collected evidence, conclude the procedure by opting for “Power Off”, thereby initiating the system’s shutdown.

Powering off the system

Promptly shutting down the system to ensure evidence safety.

Import Possible Evidence Disk into Autopsy

Autopsy is a digital forensics platform. To import a qcow2 evidence disk, first convert it to vmdk. Follow the guide below:

Run the Autopsy ForensicVM plugin on the intended datasource

  1. Begin by launching the Autopsy Case.

  2. Execute the Autopsy ForensicVM plugin on the case datasource.

Autopsy ForensicVM Plugin Interface

Autopsy ForensicVM Plugin Interface

Securely Shutdown the forensicVM

  1. Ensure the forensicVM machine is shut down.

  2. If not, shut down using the “Shutdown VM” button in the Autopsy ForensicVM Client interface.

Shutdown VM Interface

Shutdown VM Interface

Import evidence disk

Click the “Import Evidence Disk” button.

Import Evidence Disk Interface

Import Evidence Disk Interface

Save evidence disk to default path

A Windows Explorer “Save As” dialog will appear. Retain the suggested path.

Save As Dialog

Save As Dialog

Monitor the Download Progress

Wait for the evidence disk download to complete.

Download Progress Bar

Download Progress Bar

Evidence Disk Informational Popup

A notification popup will display the evidence path.

Evidence Disk Popup Notification

Evidence Disk Popup Notification

Locate the Evidence in the Path

Windows Explorer will display the evidence.vmdk path. Copy this path.

Evidence.vmdk in Windows Explorer

Evidence.*vmdk *in Windows Explorer

Copy evidence disk path

Hold Shift, right-click on evidence.vmdk, and select “Copy as path”.

Copying evidence.vmdk Path

Copying evidence.*vmdk *Path

Integrate a New Data Source in Autopsy Software

Click “Add Data Source” in Autopsy.

Add Data Source Option in Autopsy

Add Data Source Option in Autopsy

Select the Appropriate Host

Select the same host when importing the evidence disk.

Selecting Host in Autopsy

Selecting Host in Autopsy

Specify Data Source Type as VM Image

Choose “Disk Image or VM File” as the data source type.

Selecting Data Source Type in Autopsy

Selecting Data Source Type in Autopsy

Enter the previously copied evidence.**vmdk **path

Paste the evidence.vmdk path and set the “Time zone”.

Inputting evidence.vmdk Path in Autopsy

Inputting evidence.*vmdk *Path in Autopsy

Deselect All Plugins

Deselect all plugins and click “Next”.

Deselecting Plugins in Autopsy

Deselecting Plugins in Autopsy

Conclude the Data Source Addition

Click “Finish”.

Finish Button in Autopsy

Finish Button in Autopsy

Locate and Label Potential Evidence

Navigate to each folder and assign the “Notable Item” tag.

Tagging Evidence in Autopsy

Tagging Evidence in Autopsy

Evidence Successfully Tagged

Tagged evidence will be highlighted.

Tagged Evidence Display in Autopsy

Tagged Evidence Display in Autopsy

Update Evidence Disk Tags

During the course of a forensic investigation, there may be instances when you need to append additional tags. Ensuring that the “possible evidence disk” reflects these changes is crucial. The following steps guide you on making sure the tag folders are created on the evidence disk:

Add a New Tag to Autopsy

  1. Navigate to the desired file in Autopsy.

  2. Right-click on the file.

  3. From the context menu, hover over “Add file tag”.

  4. Select the last sub-menu option “New tag…”.

Adding New Tag in Autopsy

Adding New Tag in Autopsy

Define the New Tag Name and Type

  1. Input the desired “Tag Name”.

  2. If the new tag denotes something significant or noteworthy, ensure to check the box labeled “Tag indicates item is notable”.

Defining New Tag Name and Type in Autopsy

Defining New Tag Name and Type in Autopsy

Initiate Ingest Modules

  1. Right-click within Autopsy.

  2. Select “Run Ingest Modules” from the dropdown menu.

Running Ingest Modules in Autopsy

Running Ingest Modules in Autopsy

Activate the ForensicVM Client Python Plugin

  1. Deselect all plugins within Autopsy.

  2. Specifically select the “ForensicVM Client” plugin.

  3. Click on “Finish”.

Selecting the ForensicVM Client Plugin in Autopsy

Selecting the ForensicVM Client Plugin in Autopsy

Boot up the ForensicVM

Start the forensicVM system.

Starting the ForensicVM System

Starting the ForensicVM System

Access the ForensicVM Interface

Click on “Open ForensicVM”.

Accessing the ForensicVM Interface

Accessing the ForensicVM Interface

Identify the New Folder Tag

Log into the forensicVM and identify the freshly generated tag folder.

Identify the New Folder Tag

Identify the New Folder Tag

Tip

For users operating on Windows versions later than 8: If the evidence folder is elusive, ensure Windows is not in hibernation instead of being completely shut down. To bypass this, while shutting down the forensicVM, hold down the [Shift] key on your keyboard. This ensures the hibernation file is removed and the drive is primed to receive instructions. You can then retry the procedure.

Recreate Evidence Disk

Danger

Opting for this action will irrevocably erase all data on the evidence disk! Data recovery will not be possible afterward. Prior to initiating this, ensure to follow the guidelines to Import evidence disk.

Safely Shut Down Windows

To ensure that the evidence.vmdk disk is unlocked, shut down Windows while pressing and holding the [Shift] key. This action ensures the hibernation file is deleted.

Safely Shutting Down Windows

Safely Shutting Down Windows

Initiate Evidence Disk Recreation

Once the machine is completely shut down, press the “Recreate Evidence Disk” button found on the Autopsy ForensicVM Client Plugin interface.

Recreate Evidence Disk Button

Recreate Evidence Disk Button

First Confirmation Dialog

Recreating the evidence disk necessitates its deletion—a critical action. A prompt will appear asking for confirmation on this deletion.

First Confirmation Dialog

First Confirmation Dialog

Final Confirmation Message

A subsequent confirmation dialog will be displayed. Click on “YES” only if you are absolutely certain about erasing the current evidence disk.

Final Confirmation Message

Final Confirmation Message

Confirmation of Successful Recreation

Upon successful recreation of the evidence disk, a notification will appear to confirm the action.

Successful Recreation Notification

Successful Recreation Notification

Boot Up the ForensicVM

Proceed to start, access, and log into the forensicVM.

Booting Up the ForensicVM

Booting Up the ForensicVM

Inspect the New Evidence Disk

A freshly recreated evidence disk will be generated with the current Autopsy evidence tags structured as folders. No previously acquired evidence will be included. As a crucial step, remember to Import evidence disk before recreating the evidence disk.

New Evidence Disk Overview

New Evidence Disk Overview

Deletion of ForensicVM at Investigation Conclusion

Once your forensic investigation comes to an end, it’s a best practice to eliminate the ForensicVM to free up resources and maintain system hygiene. Here’s a detailed guide on how to accomplish this:

  1. Initiate the Deletion Process

    Begin by clicking the red “Delete VM” button. This action will instigate the process to remove the ForensicVM.

    Clicking the "Delete VM" button

    Clicking the “Delete VM” button

  2. First Confirmation for Deletion

    A confirmation popup box will emerge, requesting validation of your decision. Click the “Yes” button to confirm your intention to delete the VM.

    First confirmation popup

    First confirmation popup

  3. Second Confirmation for Deletion

    An additional confirmation popup box will appear to double-check your decision. This is to ensure no inadvertent deletions occur. Once again, click the “Yes” button to proceed.

    Second confirmation popup

    Second confirmation popup

  4. Deletion Success Confirmation

    If the ForensicVM is successfully deleted, a final confirmation popup will appear, mentioning the UUID of the VM that was eradicated. It serves as a record of the recently deleted VM.

    Deletion success confirmation

    Deletion success confirmation

Managing the Network Card to Capture and Analyse Network Traffic

By default, the forensicVM initiates with its network card disabled. This design choice is deliberate, to minimize the potential risks of activating a network card on a possibly compromised virtual forensic machine. Activating such a network card could jeopardize not only your individual computer but the broader network environment.

For many forensic investigations, an active network connection is unnecessary. When evidence is solely contained within a local device, it’s recommended to keep the network card deactivated. This approach ensures the machine’s safe operation and the security of your enterprise network or domain.

However, in certain situations, there may be a need to activate the network card. For instance, when the forensic virtual machine is deemed safe and requires an internet connection to retrieve cloud-based data—data sourced from cached cloud access credentials like those from OneDrive, Google Drive, Nextcloud, OwnCloud, etc. In such cases, the forensicVM’s network card can be enabled. This card has an inbuilt firewall designed to block access to identified local networks while permitting internet connections. Additionally, every time the network card is toggled on or off, all inbound and outbound traffic is recorded. This leads to the creation of a Wireshark pcap file for each activation and deactivation event.

Danger

It’s paramount to treat the activation of the network card as a method of last resort. Alternatively, consider using a remotely hosted forensicVM server. The integrity of the firewall isn’t foolproof, meaning there’s always a risk that malicious software might infiltrate your network. Furthermore, a compromised machine could ping back to an attacker, potentially revealing your external IP address and inadvertently notifying a malicious actor that they are under active investigation!

Enable the Network Card

To activate the network card on the forensicVM, there are two methods available. The first method involves using the Autopsy ForensicVM client plugin interface, and the second requires directly interacting with the web screen interface through the network icon.

Enable network card using the Autopsy ForensicVM Client Plugin Interface

Activate Network Card Button

  1. Start the forensicVM machine.

  2. Navigate to the Network Panel within the interface.

  3. Look for the “Enable network card” button and click on it.

Enabling the network card through the Autopsy ForensicVM Client interface

Enabling the network card through the Autopsy ForensicVM Client interface

Confirmation of Network Card Activation

After clicking the button, a popup window will appear to confirm the successful activation of the network card.

Confirmation popup for network card activation

Confirmation popup for network card activation

Enable Network Using the Web Screen Interface

Activating the network card can also be achieved via the Web Screen Interface. This method allows users to manage network settings without diving into the main software interface. Here’s how to enable the network card using the Web Screen Interface:

Activating Network through Web Screen Interface Steps

  1. Initiate the Panel Opener (1) to reveal the available options.

  2. Locate and click on the network icon (2) to access network settings.

  3. Identify and click the red button labeled Enable network (caution) (3) to activate the network card.

Network Using the Web Screen Interface

Steps to activate the network through the Web Screen Interface

Acknowledgement of Successful Activation

Once the network card is activated, an orange notification will pop up at the top of the screen. This message serves to confirm that the network card has been successfully activated.

Notification of Success

Notification confirming successful activation of the network card

Reseting the Operating System Network Card

From time to time, due to various reasons such as IP conflicts, connectivity issues, or configuration errors, it might be necessary to reset the network card. Resetting can re-establish a proper connection and can often solve common networking problems. Below are methods to reset the network card in Windows and Linux.

Windows 10

In Windows 10, the Network Troubleshooter can assist in diagnosing and resolving common network-related problems.

  1. Navigate to the system tray located in the bottom right corner of your screen.

  2. Right-click the network icon.

  3. From the context menu, select the “Troubleshoot problems” option. The Network Troubleshooter will now start, and it will attempt to diagnose and resolve any detected issues.

Example of network troubleshoot in Windows 10

Using the Network Troubleshooter in Windows 10

Other Windows Versions

In older versions of Windows, the process might slightly differ. Usually, there’s a network troubleshooting tool available but its location or name may vary. Check under “Network and Sharing Center” or within Control Panel for related options.

Linux

In Linux, depending on the distribution and the desktop environment, you can manage the network card through the graphical interface. However, for a more universal method:

  1. Open a terminal.

  2. To disable the network card (assuming it’s named eth0), type:

    sudo ifconfig eth0 down
    
  3. To enable it again, type:

    sudo ifconfig eth0 up
    

Danger

Always proceed with caution when enabling the network, especially on systems that are meant for forensic investigations or are potentially compromised. It’s vital to ensure systems and network security and to be aware of the risks involved.

Collect Network Evidence

Enabling the network card is often crucial for forensic investigations, especially when collecting evidence from cloud services. This is particularly relevant when users have not logged out from a service or when session cookies remain in the browser. Such scenarios allow forensic investigators to trace digital breadcrumbs and gather additional evidence that may be inaccessible from offline forensic images. Below are two illustrative examples:

Gathering Data from Cloud Services - OneDrive Example

The following figure demonstrates data extraction from OneDrive, a popular online cloud service.

Interact with the network and collect cloud evidence from OneDrive

Gathering Data from Cloud Services - Online Storage Example

In this next example, an online file storage platform is accessed using cached credentials:

Accessing and extracting data from an online storage using cached credentials

Disable the Network Card

There are two primary methods to deactivate the network card on the forensicVM:

  1. Using the Autopsy ForensicVM client plugin interface.

  2. Directly interacting with the web screen interface.

Disable Network Card with the Autopsy ForensicVM Client Plugin Interface

Steps to Deactivate Network Card:

  1. Ensure that the forensicVM machine is running.

  2. Within the interface, go to the Network Panel.

  3. Click on the “Disable network card” button.

Disabling the network card through the Autopsy ForensicVM Client interface
Using the Web Screen Interface to Disable the Network Card

The Web Screen Interface offers an alternative approach for users who prefer to manage network settings without engaging with the main software interface.

Steps to Disable Network:

  1. Activate the Panel Opener (1) to view more options.

  2. Click on the network icon (2).

  3. Press the green Disable network (3) button to turn off the network card.

Disabling the network card using the Web Screen Interface

Process to disable the network card using the Web Screen Interface

Download Wireshark pcap Files

Downloading pcap Files

To obtain the Wireshark pcap files, follow the instructions below:

  1. Click the “Download Wireshark pcap files” button located on the Autopsy ForensicVM client plugin interface.

    Downloading pcap files

    Downloading pcap files

  2. A Windows Explorer window will prompt you to select a save location for the pcap.zip file. It’s recommended to maintain the default save path, which is typically set to the image case folder.

    Saving pcap.zip file path

    Saving pcap.zip file path

  3. The download progress will be displayed, indicating the time required to complete the download. This duration can vary depending on the size of the pcap.zip file.

    Download progress

    Download progress

  4. Once the download is completed, a confirmation pop-up will appear, indicating the successful download and save location.

    Network pcap downloaded and saved

    Network pcap downloaded and saved

  5. The Windows Explorer will automatically open to the default save location of pcap.zip.

    Default pcap.zip path in explorer

    Default pcap.zip path in explorer

  6. To decompress the pcap.zip` file, you can use a program like 7-zip. The extraction can take some time, especially if the pcap files are large.

    Extracting pcap.zip file using 7-zip

    Extracting pcap.zip file using 7-zip

    Extraction progress

    Extraction progress

Analyze network traffic in Wireshark

Analyzing network traffic is an integral part of digital forensic investigations, especially when attempting to reconstruct a sequence of events or identify malicious activities. Using a tool like Wireshark to analyze traffic from a forensic image virtual machine can provide investigators with a wealth of information. However, this approach comes with its advantages and potential pitfalls.

Importance of Analyzing Traffic in Forensic Investigations

  1. Evidence Collection: Analyzing traffic can reveal communication with suspicious IP addresses, hinting at potential data exfiltration or command-and-control servers.

  2. User Behavior: Network traffic can provide clues about user behavior, including sites visited, files downloaded, or apps used.

  3. Timestamps: Traffic analysis can help in reconstructing timelines of events, crucial for correlating actions across different evidence sources.

  4. Detect Malware: Unusual network traffic patterns can be indicative of malware communication.

Advantages

  1. Comprehensive Data View: Wireshark offers a detailed view of packets, allowing forensic investigators to delve deep into the network interactions.

  2. Filtering and Searching: With its advanced filtering options, investigators can isolate relevant data quickly.

  3. Decoding Protocols: Wireshark can decode a vast array of protocols, aiding in understanding the specifics of network conversations.

  4. Visualization: Graphical features like flow graphs help in visualizing communication patterns.

Dangers

  1. Data Overload: The volume of data in pcap files can be overwhelming, and without proper focus, important details might be missed.

  2. Privacy Concerns: Analyzing traffic can inadvertently capture personal or sensitive information of innocent users.

  3. Tampered Data: If the forensic image virtual machine is compromised, the network data might be tampered with, leading to incorrect conclusions.

  4. Misinterpretation: Without proper expertise, normal traffic can be misinterpreted as malicious or vice versa.

Note

While Wireshark is a powerful tool for forensic investigations, it’s essential to approach the analysis with a clear understanding of the goals, the data’s context, and the potential pitfalls. Proper training and experience can help in maximizing the benefits of traffic analysis while minimizing risks. Given the complexity and subtleties involved in network traffic analysis, it’s recommended that forensic investigators continuously update their training and remain informed about the latest techniques and threats in the domain.

After extracting the pcap files, the next step is to analyze the network traffic captured during the period the network card was active. Here’s how to proceed:

  1. Navigate to the extracted pcap directory. If Wireshark isn’t installed on your system, visit wireshark.org to download and install it. Once installed, Wireshark-associated icons will appear next to each pcap file.

  2. Double-click the pcap file you wish to analyze.

    Selecting pcap file for analysis

    Selecting pcap file for analysis

  3. The Wireshark interface will open, displaying the captured traffic. Adjust the view settings and apply filters as required based on your forensic goals. .. raw:: latex

    FloatBarrier

    Wireshark interface displaying captured traffic
  4. The following is an example of network traffic analysis with a focus on cloud traffic.

    Example of analyzing cloud traffic in Wireshark

    Example of analyzing cloud traffic in Wireshark

Note

Analyzing pcap files requires a sound understanding of network traffic patterns and potential security threats. It’s crucial to interpret the data accurately to avoid misleading conclusions.

Media Management in ForensicVM: Leveraging ISOs for Enhanced Forensic Investigations

In forensic investigations, the ability to access and utilize a wide array of specialized tools is of utmost importance. Different cases present unique challenges and often require specific utilities or software to effectively extract, analyze, or visualize evidence. ISO files, serving as encapsulations of entire file systems, are adept at housing a myriad of these specialized tools, thereby ensuring forensic professionals are always equipped with the right utilities.

The management and utilization of ISO files within ForensicVM is precisely tailored to meet the multifaceted demands of modern forensic investigations. Herein, a meticulously crafted procedure allows investigators to seamlessly navigate, upload, select, insert, eject, delete, and even boot from these ISO files. This integration ensures that forensic experts are never bound by just the in-built tools in ForensicVM, offering the flexibility to dynamically introduce and employ auxiliary resources as the situation demands.

From a safety vantage point, employing ISOs within a virtual domain like ForensicVM comes with its set of undeniable perks:

  1. Network Isolation: Leveraging tools from ISOs eliminates the need for network connectivity. This not only curtails risks associated with internet connectivity but also guarantees that neither evidence nor the operating environment is inadvertently compromised owing to network-centric threats or malware.

  2. Protective Shield: Operating tools within ForensicVM’s virtual periphery ensures the host system and its network remain insulated from looming threats. Any potentially malignant operations remain confined to the virtual environment, thereby preserving the sanctity of the primary forensic setup.

  3. Evidence Preservation: Operating in a controlled ambit significantly reduces risks associated with evidence contamination or inadvertent alterations. The sacrosanct nature of evidence remains unchallenged, a pivotal aspect for its admissibility in legal arenas.

ForensicVM’s adeptness at ISO management not only broadens the forensic toolkit available to investigators but also accentuates the safety, security, and integrity quotient of the investigative process. This section unravels the nuances of these operations, offering insights into harnessing the full might of ISOs in your forensic pursuits.

In the realm of digital forensics, every tool and capability at an investigator’s disposal can be the difference between uncovering critical evidence or hitting a dead end. ISO files, in particular, offer a versatile medium to house a myriad of investigative utilities. With ForensicVM, managing and utilizing these ISO files becomes a straightforward endeavor, optimizing both efficiency and efficacy. Here’s an overview of the key operations:

  • Browse and Upload ISO: Discover how to navigate the interface to select and upload essential ISO files to the ForensicVM environment.

  • Select ISO / Web Select CD-ROM: Instructions on choosing the right ISO file or CD-ROM from the Autopsy ForensicVM Client Plugin or from the web interface.

  • List Remote ISO Files: Get an overview of all ISO files stored remotely on the ForensicVM server.

  • Insert ISO / Web Insert CD-ROM: Learn how to virtually insert an ISO file or CD-ROM for access within the virtualized forensic image, from the Autopsy ForensicVM Client Plugin or from the web interface.

  • Eject ISO / Web Eject CD-ROM: Step-by-step guidance on safely ejecting a mounted ISO file or CD-ROM, from the Autopsy ForensicVM Client Plugin or from the web interface.

  • Delete ISO: Understand how to remove ISO files that are no longer needed, ensuring a clutter-free workspace.

  • Bootable Media: Dive into the specifics of booting from an ISO or CD-ROM, a critical capability for certain forensic tasks.

Proceed to the relevant subsections for detailed instructions and best practices to make the most of the media management features in ForensicVM.

Uploading an ISO to the ForensicVM Server

When conducting a forensic investigation, specialized tools are often required to aid in the extraction or analysis of data. Many of these tools are conveniently bundled into ISO files. With ForensicVM, you can seamlessly upload these ISO files, making them readily accessible for your investigation tasks. Here’s a step-by-step guide to doing so:

Step 1: Access the Media Panel

  • Navigate to the Autopsy VM and locate the ForensicVM Client Plugin.

  • Click on the Media Panel Separator.

Step 2: Initiate the ISO Upload

  • Click the “Browse and Upload” button.

Browse and Upload

Browse and Upload

Step 3: Locate and Select the ISO File

  • Browse your computer’s directories and select the desired ISO file to upload.

Locate and Select the ISO File

Locate and Select the ISO File

Step 4: Upload Confirmation

The upload process might take some time, depending on the size of the ISO file. There’s no progress bar available currently, so please be patient and wait for a confirmation message to appear, indicating a successful upload.

Upload Confirmation

Upload Confirmation

Note

During the upload process, the Autopsy ForensicVM Client Plugin might become unresponsive. This is expected behavior. Please wait patiently until the upload completes.

Step 5: Verify the Uploaded ISO

Once uploaded, you should be able to see the ISO file listed in the ISO Management section of the ForensicVM server. This ensures your tools are now ready to be utilized in your ongoing investigation.

Verifying the Uploaded ISO

Verifying the Uploaded ISO

List Remote ISO Files

When investigating digital evidence, it’s crucial to maintain a catalog of tools and resources available for the task. ForensicVM facilitates this by allowing users to store ISO files remotely on its server. This section outlines the procedures to access and view this list of remotely stored ISO files.

There are two primary methods to view these files:

Using the Autopsy ForensicVM Client Plugin

Step 1: Access the Media Panel

  • Navigate to the Autopsy VM.

  • Click on the Media Panel Tab.

Step 2: View Remote ISO Files

  • Once in the media panel, click on the Remote ISO Files button.

Step 3: Review Available ISO Files

  • The ISO file list will update.

  • Browse through the list to review available tools and resources.

  • If you find any tools missing or outdated, consider downloading or creating the necessary ISO files, and then upload them to the ForensicVM Server.

Viewing Remote ISO Files using Autopsy ForensicVM Client Plugin
Method 1: Using the Web Interface

Step 1: Access the Tool Panel

  • On the main screen, click on the Control Bar icon to reveal the tool panel.

Step 2: Open the Media Control Modal Box

  • Within the tool panel, locate and click the Eject icon. This action will open the Media Control Modal Box.

Step 3: View ISO Dropdown

  • Click on the ISO Dropdown.

  • This dropdown will display a list of all ISO files stored on the ForensicVM server, which can be utilized as virtual CD-ROMs.

Viewing Remote ISO Files using the Web Interface

Viewing Remote ISO Files using the Web Interface

Insert ISO / Web Insert CD-ROM

Being able to virtually insert an ISO file or CD-ROM into the virtualized forensic image is pivotal during a digital investigation. Different tools and utilities can be loaded on the fly without compromising the integrity of the original image. This flexibility speeds up the forensic workflow and allows investigators to adapt to different scenarios quickly. The following sections guide you on how to accomplish this task using either the Autopsy ForensicVM Client Plugin or the web interface.

Using the Autopsy ForensicVM Client Plugin

Step 1: Access the Media Panel

  • Launch the Autopsy VM.

  • Within the interface, click on the Media Panel Tab.

Step 2: Select the Desired ISO File

  • In the media panel, browse through the ISO files.

  • Click on the desired ISO file that you wish to insert.

Step 3: Insert the ISO File

  • Locate and click the Insert button. This action will mount the selected ISO file as a virtual CD-ROM within the ForensicVM environment.

  • Upon successful insertion, a success popup will appear, confirming the action.

Inserting ISO using the Autopsy ForensicVM Client Plugin

Inserting ISO using the Autopsy ForensicVM Client Plugin

Using the Web Interface

Step 1: Access the Tool Panel

  • From the main screen, identify and click on the Control Bar icon. This will reveal the tool panel.

Step 2: Navigate to the Media Control Modal Box

  • Inside the tool panel, find and click on the Eject icon. Activating this icon will present the Media Control Modal Box.

Step 3: Select from the ISO Dropdown

  • Within the Modal Box, locate and click the ISO Dropdown.

  • This dropdown will display all ISO files saved on the ForensicVM server.

  • Scroll and click on the desired ISO file or virtual CD-ROM you wish to insert.

Step 4: Confirm the Insertion

  • After selecting the desired ISO, click the Insert Media button.

  • This action mounts the chosen ISO as a virtual CD-ROM.

  • A success notification will appear, signaling that the insertion was successful.

Inserting ISO using the Web Interface

Inserting ISO using the Web Interface

Run programs and utilities from ISO

After successfully uploading and inserting an ISO into the virtualized forensic environment, the next step is to leverage the tools within. This section will guide you through accessing and utilizing the programs and utilities contained in the ISO.

Step 1: Locate the Virtual CD-ROM Drive

  • Once you’ve inserted the ISO as a virtual CD-ROM, navigate to your operating system’s file explorer or equivalent.

  • Locate the virtual CD-ROM drive which should appear similar to a physical CD-ROM drive.

  • Open the drive to view its contents.

Locating the Virtual CD-ROM Drive

Locating the Virtual CD-ROM Drive

Step 2: Identify and Launch the Desired Tool

  • Inside the virtual CD-ROM content, sift through the directories and files to locate the specific program or tool you intend to run.

  • Once found, initiate the program or utility. Depending on the nature of the tool, you might have to run it as an administrator or follow specific launch procedures.

Launching Tools from the ISO

Launching Tools from the ISO

Step 3: Adhere to the Program’s Instructions

  • Each forensic tool or utility will have its set of instructions, either embedded within its interface or provided as a separate README file.

  • Follow these instructions meticulously to ensure accurate and efficient processing.

  • Should your investigation involve extracting or marking potential evidence, utilize the “Possible Evidence” virtual drive. This virtual drive is specially designed within ForensicVM to store and segregate potential pieces of evidence without contaminating the original data.

Using the Program within ForensicVM

Using the Program within ForensicVM

Bootable Media

There are instances during a forensic investigation where analysts may need to interact directly with the operating system or leverage specific tools that necessitate booting into a virtual machine (VM). ForensicVM’s virtual CD-ROM drive has a unique characteristic: it can only accept CD-ROM insertions when the VM is running.

The booting process of a CD-ROM involves the following steps:

  1. Boot into the operating system or access the BIOS/UEFI screen.

  2. Insert the virtual CD-ROM into the drive.

  3. Perform a reboot or reset operation.

  4. Access the BIOS or UEFI by pressing the “ESC” key.

  5. Navigate to the boot device selection menu and confirm your choice.

Method 1: Boot from Virtual CD-ROM Post-OS Bootup (BIOS showcase)

Step 1: Boot into the Operating System

  • Initiate a boot sequence and load the operating system.

Tip

While the example showcases a user login, you don’t necessarily need to log in. Simply booting into the operating system is sufficient.

Operating System Boot Screen

Operating System Boot Screen

Step 2: Insert the Virtual Bootable CD-ROM

  • Adhere to the previous guidelines to insert the virtual media into the CD-ROM drive.

Inserting Virtual Media

Inserting Virtual Media

Step 3: Initiate a System Restart

  • Command the operating system to restart and wait for the BIOS boot screen to emerge.

System Restart

System Restart

Step 4: Access Boot Options with “ESC”

  • As the system initializes, press the “ESC” key within a 15-second window to access the boot options.

Boot Options Screen

Boot Options Screen

Step 5: Opt for the Virtual CD-ROM Drive

  • From the available boot options, select the corresponding number for the virtual CD-ROM or DVD-ROM drive. For instance, in the example given, you’d press “4”.

Selecting Virtual CD-ROM

Selecting Virtual CD-ROM

Step 6: Boot into the ISO

  • If the operations proceed without hitches, the virtual media will boot. Depending on the media’s nature, it might present a selection menu or lead straight to its primary function.

Booting into ISO

Booting into ISO

Step 7: Operate the Booted Tools

  • With the ISO booted, you can now access and employ the forensic tools contained therein, tailoring your investigative approach based on the utilities available.

Accessing Tools from Booted ISO

Accessing Tools from Booted ISO

Method 2: Boot from Virtual CD-ROM at Boot Time (Showcasing UEFI)

Step 1: Access the UEFI Boot Options

  • Power on the ForensicVM.

  • Rapidly access the web interface and press the “ESC” key to intercept the boot sequence.

Accessing UEFI Boot Options

Accessing UEFI Boot Options

Step 2: Insert the Bootable ISO into Virtual CD-ROM

  • Load your desired bootable ISO into the virtual CD-ROM. Refer to the previously provided steps if needed.

Inserting Bootable ISO

Inserting Bootable ISO

Step 3: Acknowledge the Successful Insertion Notification

  • The web console screen should display a “Insert media sent” message, confirming the ISO’s successful insertion into the drive.

Successful Insertion Notification

Successful Insertion Notification

Step 4: Command a Reset of ForensicVM

  • Trigger a system reset by clicking the “Reset” button. The ForensicVM will undergo a reboot process.

Resetting ForensicVM

Resetting ForensicVM

Step 5: Navigate to UEFI Menu

  • Upon reboot, press the “ESC” key once more. This will usher you into the UEFI menu.

Accessing UEFI Menu

Accessing UEFI Menu

Step 6: Opt for “Boot Manager”

  • In the UEFI menu, navigate to the “Boot Manager” using arrow keys and confirm your selection with the <ENTER> key.

Selecting Boot Manager

Selecting Boot Manager

Step 7: Choose “UEFI QEMU DVD-ROM”

  • From the available options, locate and select “UEFI QEMU DVD-ROM”. Use the arrow keys for navigation and confirm with <ENTER>.

UEFI QEMU DVD-ROM Option

UEFI QEMU DVD-ROM Option

Step 8: Await the Virtual CD-ROM Boot Sequence

  • If a selection menu is presented, choose the appropriate option. If not, patiently wait as the ForensicVM initializes the ISO media.

Virtual CD-ROM Booting

Virtual CD-ROM Booting

Step 9: Access and Execute Forensic Tools

  • Once booted, you can now select and run your preferred forensic tools. This example demonstrates utilizing forensic tools from Kali Linux.

Kali Linux Forensic Tools

Kali Linux Forensic Tools

Eject ISO / Web Eject CD-ROM

There are two methods to eject an ISO from the virtual CD-ROM drive:

  1. Using the Autopsy ForensicVM Client Plugin interface.

  2. Using the web screen interface.

Below are detailed steps for each method:

Method 1: Eject using the Autopsy ForensicVM Client Plugin Interface

Step 1: Activate the “Eject” Function

  • Click on the “Eject” button. A confirmation will appear, indicating that the media has been successfully ejected.

Ejecting via Autopsy ForensicVM Client Plugin

Ejecting via Autopsy ForensicVM Client Plugin

Method 2: Eject using the Web Screen Interface

Step 1: Access the Web Toolbar

  • Click on the open bar icon. This action will expand the web toolbar for further options.

Step 2: Initiate the Eject Process

  • Click on the “Eject” icon (depicted with a “2” in the reference image). This will bring up the Media Control Modal Panel.

Step 3: Finalize the Ejection

  • Click the “Remove Media” button (marked as “3” in the reference image). The media will subsequently be disengaged from the virtual CD-ROM drive.

Ejecting via Web Screen Interface

Ejecting via Web Screen Interface

Delete ISO Using the Autopsy ForensicVM Client Plugin Interface

To delete an ISO file, follow the steps below:

Step 1: Navigate to the Media Panel within the Autopsy ForensicVM Client Plugin interface.

Step 2: Identify and select the ISO file you wish to delete.

Step 3: Click on the “Delete” button associated with the desired ISO file.

Deleting an ISO Media

Deleting an ISO Media

Warning

Deleting an ISO file through this method does not prompt any confirmation dialog. Proceed with caution. It’s assumed that users have the original ISO file stored elsewhere (e.g., on their local computer) and can re-upload it if necessary.

Snapshots in ForensicVM: A Crucial Asset for Investigators

Why snapshots are so important for a forensic investigation

In the dynamic realm of digital forensics, the ability to preserve, replicate, and revert to specific states of digital evidence is paramount. Snapshots in ForensicVM offer this essential capability. Here’s an in-depth look at why snapshots are indispensable for forensic investigators:

Base Snapshot: The Pristine Beginning

The base snapshot or sometimes referred to as the ‘first snapshot,’ is a reflection of the initial state of a system or a piece of evidence. Just as a crime scene investigator would secure a scene to ensure no contamination occurs, in digital forensics, the base snapshot acts as that secured, untouched crime scene. It represents the data in its original, unaltered form, enabling investigators to always have a pristine reference point.

Preserving Evidence Integrity

Digital evidence, by its very nature, is volatile. A single action, intentional or accidental, can alter the evidence, possibly rendering it inadmissible in court. Snapshots act as safety nets. Should the evidence be unintentionally modified or corrupted, investigators can easily revert to a previous snapshot, ensuring the integrity of the evidence remains uncompromised.

Embracing “What-If” Analysis

Forensic investigation often involves a series of “what-if” scenarios. Investigators may want to test a hypothesis or simulate actions that a suspect might have taken. With snapshots, these simulations can be executed without the risk of permanently altering the evidence. After an analysis, the system can be reverted to its original state using the snapshot, ready for another hypothesis to be tested.

Additional Considerations
  1. Documentation and Chain of Custody: Every snapshot can serve as a documented step in the investigative process, aiding in maintaining a clear chain of custody.

  2. Efficiency and Speed: Instead of restoring from backups or original sources, which can be time-consuming, snapshots allow for quick reversion, making the investigative process more efficient.

  3. Risk Mitigation: Especially in complex cases involving malware or unknown data structures, snapshots provide a safety mechanism, allowing investigators to explore without risking the primary evidence source or the investigation platform.

Note

Working with Snapshots and ForensicVM

Before diving into the functionalities associated with snapshots, it’s crucial to understand a fundamental prerequisite: the ForensicVM needs to be up and running. Snapshots essentially capture the state of a virtual machine at a specific point in time. As such, to make the snapshot meaningful and functional, the ForensicVM has to be in an operational state.

If you haven’t started your ForensicVM yet, please do so by following these steps:

  1. Open the Autopsy ForensicVM Client: Ensure that you have the client interface open and accessible.

  2. Locate the ‘Start’ Option: Within the interface, navigate to the main control panel where you have options to ‘Start’, ‘Stop’, ‘Shutdown’, etc., for the ForensicVM.

  3. Initiate the ForensicVM: Click on the ‘Start’ option to boot up the ForensicVM. It might take a few moments for the virtual machine to initialize and be fully operational.

Once the ForensicVM is running, you can proceed with snapshot-related tasks, ensuring accurate capture and representation of the virtual machine’s state.

Create a new snapshot

It is highly recommended to create your first snapshot immediately after the machine begins its booting process. Doing so preserves the initial state of the ForensicVM, making it easier to revert back to a clean state at any time during your investigation. Snapshots can be invaluable during forensic investigations, especially when you need to return to a specific point in time or recover from potential mistakes.

Create a snapshot

  1. Open the Autopsy ForensicVM Client: Ensure you have the Autopsy ForensicVM Client interface launched and ready.

  2. Navigate to Snapshot Management: This section is dedicated to creating, viewing, and managing snapshots of your ForensicVM.

  3. Initiate Snapshot Creation:

  • Click on the “Create new” button located within the Snapshot management area.

Screenshot showcasing the 'Create new' button in the Snapshot management section.

A visual representation of the ‘Create new’ button used for initiating a snapshot creation in the Autopsy ForensicVM Client interface.

Once you’ve successfully created a snapshot, it will be saved and listed in the Snapshot management section. You can then access this snapshot whenever needed to revert your ForensicVM to that particular state.

List Remote Snapshots

While the Autopsy ForensicVM Client interface typically auto-updates to display all available snapshots, there may be occasions where the list isn’t refreshed in real-time. In such scenarios, it’s beneficial to use the “List Remote Snapshots” feature to manually fetch and view the list of all remote snapshots associated with the current ForensicVM.

List snapshots 1. Open the Autopsy ForensicVM Client: If not already open, launch the Autopsy ForensicVM Client interface to access the snapshot management features.

  1. Navigate to the Snapshot Management Area: This section provides tools and options related to creating, viewing, and managing snapshots of your ForensicVM.

  2. Manually List Remote Snapshots:

    • Look for the “List Remote Snapshots” button. This button is specifically designed to fetch the list of snapshots from the remote server and display them within the interface.

    • Click on the “List Remote Snapshots” button to initiate the listing process.

    Screenshot showcasing the 'List Remote Snapshots' button in the Snapshot management section.

    A visual guide highlighting the ‘List Remote Snapshots’ button within the Autopsy ForensicVM Client interface.

Once clicked, the interface should update and display all the remote snapshots associated with the current ForensicVM. If any issues persist, ensure that the ForensicVM Client has proper network access and permissions to communicate with the remote server. I’ve expanded on the process by offering a bit more context and breaking down the steps in a detailed manner.

Select and Rollback a Snapshot

If you ever find yourself needing to undo changes and revert the forensicVM to a previous state, the snapshot functionality is a powerful tool that allows you to do so. Here’s a step-by-step guide to help you navigate the rollback process.

Steps to Reverse to a Snapshot

  1. Locate the Desired Snapshot:

    • Snapshots are typically named in the format snap-YYYY-MM-DD_HHMMSS.

    • Browse through the list and find the snapshot that represents the state you wish to revert to.

    • Click on the intended snapshot. Once selected, it will be highlighted with a blue background and a white foreground, indicating your selection.

  2. Initiate the Rollback:

    • With the desired snapshot selected, locate and click the rollback button.

    Screenshot showcasing the rollback process in the Snapshot management section.

Warning

Potential Issues & Solutions:

At times, the rollback process might not go as smoothly as intended. Here’s what to do if you encounter issues:

  • Stalled ForensicVM: If the forensicVM doesn’t return to its previous state or appears to be stalled: 1. Use the Reset VM option to reset the virtual machine. 2. Once reset, attempt the Rollback action again to revert to the desired state.

  • Undoing the Rollback: Regrettably, once a rollback has been executed, it is irreversible. This means that the state of the forensicVM just prior to the rollback will be permanently lost.

Best Practice Recommendation:

Before initiating a rollback, it’s highly recommended to create a new snapshot of the current state. This way, if you later decide you want to revert to the state that existed just before the rollback, you’ll have that option available. Simply rollback to the snapshot you took immediately before executing the rollback.

Remember, handling snapshots requires care, as they represent specific points in time of the ForensicVM’s state. Always ensure that you’ve selected the correct snapshot before initiating a rollback.

Delete a Snapshot

Snapshots can become redundant or unnecessary over time, and you might want to reclaim some storage space. Deleting a snapshot will free up this space without affecting the current state of your forensicVM. Here’s a step-by-step guide:

  1. Select the Snapshot:

    • In the list of snapshots, click on the one you wish to delete. The selected snapshot will be highlighted, indicating your selection.

  2. Navigate to the *Danger Zone!* Section:

    • Once you have the desired snapshot selected, move to the section labeled “Danger Zone!”.

  3. Initiate the Deletion:

    • Find and click on the button labeled Delete ???.

    • A confirmation popup will appear to ensure that you truly want to delete the selected snapshot. If certain, proceed by pressing the “OK” button.

    Deleting a snapshot from the interface.

    Snapshot Deletion Interface

Warning

Always double-check the snapshot you are deleting. Once deleted, it cannot be recovered. It’s a good habit to ensure you have backups or other necessary snapshots before deleting any.

In Conclusion

Snapshots in ForensicVM are not just a feature; they are a cornerstone of effective and responsible digital forensic investigations. They safeguard evidence, enable exploratory analysis, and provide peace of mind to investigators, ensuring that the quest for truth remains both accurate and uncompromised.

Plugins - Security Bypass Utilities

Plugins serve as a vital component of the forensicVM, offering an array of capabilities that can greatly assist forensic investigators. Often, forensic investigators encounter forensicVM machines that are locked or protected by certain security measures, making it difficult to access them. One common scenario is where the forensicVM is locked behind a user account, with the suspect not revealing the password. Plugins provide methods to bypass these protections.

Authentication Bypass Features

The suite of plugins specifically designed to bypass authentication includes:

  • Add Windows Forensic Admin:

    • This plugin creates a new Windows admin user under the “Administrator” group. The credentials for this user are:

      • Username: forensicAdmin

      • Password: forensicAdmin

      The newly created user can also be used to reset the password for any local account.

  • Add Linux Forensic Admin:

    • Creates a new Linux user with the following credentials:

      • Username: forensicAdmin

      • Password: forensicAdmin

      This user is granted ‘sudo’ permissions, allowing elevated access.

  • Patch Accessibility:

    • A strategic patch that enables forensic administrators to invoke a system-level cmd.exe prompt. This can be triggered by pressing the shift key five times consecutively on the Windows login screen.

  • Bypass Windows Password:

    • This plugin patches the “ntlmshared.dll” file, effectively allowing a bypass of Windows authentication. While the login screen will accept any password entered, it will still utilize the cached user password hash. This is particularly crucial when trying to access encrypted auto-mounted BitLocker files that depend on the original user’s credentials for access.

Additional Security Bypass Features

Apart from authentication bypass, there are plugins designed to circumvent other security measures:

  • Disable Windows Defender and Firewall:

    • Certain external security tools like NirSoft or Mimikatz necessitate the deactivation of antivirus programs. This plugin disables both Windows Defender and the firewall to accommodate such tools.

  • Reset Windows 2003 or XP Activation:

    • This is required for instances where a forensic investigator needs to access machines that are awaiting activation, like Windows 2003 or XP. The plugin resets the activation to allow unobstructed login.

  • BOOTFIX: Disable Driver Enforcement:

    • When working with older systems or in scenarios where you’ve converted a forensic image, you might encounter certain constraints related to driver signatures. The “Disable Driver Enforcement” utility addresses these challenges:

      • Allow Unsigned Drivers: By default, many operating systems, especially modern ones, enforce driver signing for security reasons. Disabling this enforcement lets you run unsigned drivers. This can be particularly handy for running drivers like virtio on older systems.

      • Support for Programs Using Unsigned Drivers: Some utilities or programs require the use of unsigned drivers. Disabling the driver enforcement provides flexibility to run these applications without any hitches.

      • Blue Screen Issue Resolution: After converting a forensic image, systems may sometimes experience the infamous Blue Screen of Death (BSOD) due to driver issues. This tool can assist in resolving those problems by ensuring that all drivers, even the unsigned ones, can run without any enforcement barriers.

Note

While these plugins provide powerful capabilities, they should be used responsibly and ethically. Misuse could lead to unintended consequences or legal issues.

Browsing Available Plugins

Forensic investigations often require an adaptable approach, and the ability to extend functionality through plugins makes the ForensicVM tool particularly versatile. To stay updated with the latest available plugins or to review the catalog of installed plugins, the Autopsy ForensicVM Client provides an easy-to-use interface.

Steps to List Available Plugins

  1. Navigate to the ‘Plugins’ Tab: Open the Autopsy ForensicVM Client and access the Plugins tab. This tab consolidates all plugin-related functionalities, making it easier to manage and deploy extensions.

  2. Refresh the Plugin List: To get the most recent list of plugins, simply click on the List Remote Plugins button. This action fetches and displays all available plugins from the remote repository, ensuring you’re working with the latest toolset.

    Interface displaying the 'List Remote Plugins' button for updating and viewing available plugins.

    Browsing and refreshing the available plugins

Executing Plugins

The capability to execute plugins enhances the versatility of the ForensicVM, allowing for specialized tasks and bypassing certain security measures. However, prior to running any plugin, precautions are necessary to ensure the integrity of the investigation and to minimize potential issues.

Important

Pre-plugin Execution Recommendation: Before initiating any plugin, it is imperative to capture the current state of the machine using a snapshot. This provision safeguards against any unintended or adverse actions by the plugin, facilitating a revert to the original state if necessary. Start the machine, create a snapshot, and then proceed to shut down the ForensicVM.

Procedure to Execute a Plugin:

  1. Ensure ForensicVM is Stopped: Before running any plugins, verify in the VM control area that the forensic virtual machine is in a stopped state.

  2. Select the Desired Plugin: Navigate to the plugin management area and designate the specific plugin you intend to run.

  3. Execute the Selected Plugin: Initiate the plugin execution by pressing the Run Selected Plugin button.

  4. Review the Plugin Output: Post execution, it’s vital to inspect the results and logs. These can be found within the Output Console tab.

    Running a plugin

    Running a plugin

Warning

For the integrity of the process, always ensure a complete shutdown of the ForensicVM before executing any plugins. In the context of Windows, pressing the shift key while initiating the shutdown ensures the machine isn’t placed in hibernation and undergoes a full shutdown. This step is crucial as hibernation can interfere with the functionality of certain plugins and the snapshot reverting process.

Join the Community Plugins Project and Shape ForensicVM’s Future!

The Community Plugins Project for AutoPsy ForensicVM is an open initiative aimed at driving innovation and enhancing the functionalities of the ForensicVM tool. As a community-driven platform, we invite individuals from all backgrounds to contribute. Whether you’re a seasoned developer, a forensic investigator with a penchant for coding, or a user with an innovative idea, your input can make a difference!

Here’s how you can get involved:

Access the Project Repository

The entire project is hosted on GitHub. You can view, clone, or fork the repository by visiting:

ForensicVM Plugins on GitHub

Contributing Code

If you’ve developed a new plugin or made improvements to existing ones, follow these steps to contribute:

  1. Fork the Project: Fork the main repository to create a personal copy you can work on.

  2. Commit Your Changes: Make your changes, ensuring they adhere to the project’s coding standards and best practices.

  3. Suggest a Merge: Once ready, submit a pull request. Our team will review your code, and if it meets our quality standards, it will be merged into the next release.

Feature Suggestions and Plugin Requests

If you have ideas for new plugins, features, or improvements, but aren’t looking to code them yourself, you can still contribute:

  1. Open an Issue: Navigate to the Issues section on our GitHub page.

  2. Describe Your Idea: Provide as much detail as possible. This helps in understanding and potentially implementing your suggestion.

  3. Engage with the Community: Once your issue is posted, community members might join the discussion, providing feedback, insights, or offering to develop your idea.

Note

Collaboration is the backbone of open-source projects. By sharing ideas, providing feedback, or contributing code, you’re not just enhancing a tool; you’re building a community.

Chain of Custody Management in ForensicVM

Recording and maintaining a chain of custody in digital forensics is paramount to ensuring the integrity and veracity of digital evidence. When it comes to making comments or annotations about the custody of particular items, it is essential to have a robust system in place that captures these comments accurately and provides mechanisms for their retrieval. The following elaborates on the importance of such a system:

Transparency and Accountability

By having a system that records all chain of custody comments, it ensures transparency in the process. If there are any questions about how evidence was handled, one can refer back to the comments made at any given point in time. This keeps all stakeholders accountable.

Collaboration and Consistency

Multiple investigators may handle a piece of evidence. By having a centralized system for comments, it ensures that all investigators have access to the same information, promoting consistency in the process.

Error Detection

Within ForensicVM, investigators have the capability to take snapshots and add comments at various stages of their analysis. If any errors are made regarding the custody of evidence or during the investigation, these snapshots provide a safe point to which investigators can roll back. This ensures that mistakes can be swiftly corrected without affecting the integrity of the ongoing analysis. Furthermore, the ability to review comments alongside these snapshots can assist investigators in pinpointing exactly where the mistake occurred, providing valuable insights for learning and improvement in future investigations.

Chain of Custody: Document, Save, and Download as DOCX

Save a comment

Open the chain of custody web modal popup by clicking on the designated button and enter your comment in the textbox provided. Once done, click the button to submit your comment to the database.

Open the chain of custody web modal popup and submit comment

Open the chain of custody web modal popup and submit comment

Download chain of custody docx

To download the chain of custody report, click on the “Download” button. This action will trigger a download on your browser.

Trigger the download action

Trigger the download action

Chain of custody document format

Review the downloaded chain of custody report. The report will display details such as the user, date, action, parameters of the action, UUID of the forensicVM, and the IP address of the user.

Review the chain of custody report

Review the chain of custody report

Virtual Introspection

Virtual introspection, a pioneering feature in ForensicVM, revolutionizes the way forensic analysts, IT professionals, and cybersecurity experts interact with and analyze virtual machines. This tool is indispensable for in-depth digital investigations and cybersecurity assessments, as it provides an exhaustive and unobstructed view into the virtual machine’s operating environment. Through virtual introspection, users can meticulously examine real-time processes, command line executions, memory-loaded files, active handles, and the entire system’s status, gaining critical insights that are often elusive in traditional analysis.

The power of virtual introspection in ForensicVM is harnessed through the advanced capabilities of QEMU, an esteemed open-source machine emulator and virtualizer. QEMU’s sophisticated technology enables the creation of precise memory snapshots of the virtual machine at any given instance. These snapshots encapsulate the VM’s exact state at the moment of capture, providing a rich dataset for thorough forensic examination. To analyze these memory snapshots, ForensicVM integrates Volatility 3, a state-of-the-art memory forensics framework known for its robust analytical tools and detailed insights. Volatility 3 processes the captured data, uncovering intricate details about the VM’s internal operations and activities.

The integration of virtual introspection in ForensicVM represents a significant leap in virtual machine forensics. It not only simplifies the investigative process but also elevates the depth and quality of the analysis. Whether it’s uncovering hidden processes, detecting signs of malware, or exploring system anomalies, virtual introspection equips users with the necessary tools to conduct comprehensive and efficient examinations. This capability is especially crucial in today’s digital landscape, where virtual environments are increasingly complex and security threats are constantly evolving.

As the digital world continues to expand and evolve, tools like virtual introspection in ForensicVM become essential for maintaining cybersecurity and understanding the intricacies of virtual systems. Its ability to provide detailed snapshots and in-depth analysis of the Windows operating system makes it an invaluable asset for any professional dealing with digital forensics, cybersecurity, and IT management. By staying ahead with such advanced technologies, ForensicVM ensures that its users are well-equipped to face the challenges of modern digital forensics and cybersecurity.

The current iteration of ForensicVM’s virtual introspection is specialized and optimized exclusively for Windows operating systems. This focus is not without its limitations, particularly in its exclusion of Linux operating systems. While the specialized design for Windows ensures that the tool is precisely attuned to the distinct characteristics and complexities of Windows environments, enhancing its effectiveness and accuracy, it does mean that users working with Linux systems are currently unsupported.

Starting Virtual Introspection: To begin virtual introspection, first run the forensicVM until the operating system has fully booted. Then, press the ‘Virtual Introspect’ button located on the forensicVM web client interface:

Screenshot of the Virtual Introspect button in the forensicVM web client

Screenshot of the Virtual Introspect button in the forensicVM web client

Once you press the button, a progress window will appear. This window will automatically display the results of the introspection process upon completion.

Progress window for Virtual Introspection in forensicVM

Progress window for Virtual Introspection in forensicVM

Components of ForensicVM Introspection: The ForensicVM introspection process comprises seven informative tabs:

  1. Process Tree: Displays a list of all active processes within the system, providing insight even when the forensicVM is locked on the login screen.

Process Tree tab in ForensicVM Introspection

Process Tree tab in ForensicVM Introspection

  1. Command Line Arguments: Shows the commands and arguments that are or were being executed in the system.

Command Line Arguments tab in ForensicVM Introspection

Command Line Arguments tab in ForensicVM Introspection

  1. Environment Variables: Lists the environment variables associated with each running process.

Environment Variables tab in ForensicVM Introspection

Environment Variables tab in ForensicVM Introspection

  1. Possible Malware Injection Processes: Identifies processes that may have been injected or run with elevated privileges, which could suggest malware activity but also include false positives.

Possible Malware Injection Processes tab in ForensicVM Introspection

Possible Malware Injection Processes tab in ForensicVM Introspection

  1. Netscan Results: Provides a list of open network connections, which can be indicators of compromise, especially if connections to known malicious sites are detected.

Netscan Results tab in ForensicVM Introspection

Netscan Results tab in ForensicVM Introspection

  1. Netstat: Shows running network services, with potential signs of compromise if unknown systems are opening ports on the local forensicVM.

Netstat tab in ForensicVM Introspection

Netstat tab in ForensicVM Introspection

  1. Possible User Password Hashes: Displays password hashes found in memory. These hashes can be analyzed further on external platforms like crackstation.com to potentially uncover user passwords.

Possible User Password Hashes tab in ForensicVM Introspection

Possible User Password Hashes tab in ForensicVM Introspection

Example Case: An example is provided where the Bart Simpson hash is decoded to reveal the original password, “bart.”

Example of password hash decoding in ForensicVM

Example of password hash decoding in ForensicVM

Fine-Tuning ForensicVM

The conversion of a forensic image into a ForensicVM generates a configuration file in the background. This file encompasses various configuration parameters for the forensic virtual machine, such as memory size, attached disks, UEFI boot options, and more. The “Fine-Tuning” section within the Autopsy ForensicVM Client interface facilitates adjustments to certain parameters—currently, the ForensicVM’s memory size and its start date & time.

Modifying Memory Size:

  1. Navigate to the “Fine-Tuning” section in the interface.

  2. Use the slider to adjust the memory size as desired.

  3. Click the “Change” button to save your selection.

  4. For the changes to take effect, shut down the ForensicVM and then start it again.

Note

Merely restarting the VM will not apply the memory adjustments. It’s imperative to shut down and then start the VM afresh.

Setting the VM Date & Time:

  1. Enter the desired date and time in the format YYYY-MM-DD T HH:MM:SS. Note the T divider between the date and time components.

  2. Press the “Set” button to save the new start date & time for the VM.

  3. Again, to apply this change, shut down and then start the ForensicVM.

Below is an illustration showcasing both the memory size adjustment slider and the VM date & time setting option:

Fine-Tuning memory size and setting ForensicVM start date & time

Fine-Tuning memory size and setting ForensicVM start date & time

WebShell for Remote Administration

For enhanced remote server administration, a webshell has been crafted based on the shellinabox project which has been adapted into a Django application. This allows secure root access to the server, making it an invaluable tool for troubleshooting and remote server management tasks.

Accessing the WebShell:

There are two primary methods to access the WebShell:

  1. Through the Autopsy ForensicVM Client Plugin:

    • Within the plugin interface, click on the Open ForensicVM WebShell button. This action will open the WebShell in your default browser.

      WebShell accessed via Autopsy ForensicVM Client Plugin

      WebShell accessed via Autopsy ForensicVM Client Plugin

  2. Via the ForensicVM Main Web Interface:

    • Navigate to the main interface and click on the Shell link to access the WebShell.

      WebShell accessed via ForensicVM Main Web Interface

      WebShell accessed via ForensicVM Main Web Interface

WebShell Interface:

Upon accessing the WebShell, users will encounter an interface resembling the following:

ForensicVM WebShell Interface

Note

The WebShell provides a direct and secure interface to the server. However, ensure to logout after your session to maintain security.

Netdata on ForensicVM Server

Introduction

Netdata is a tool that helps watch over servers and apps in real-time. With ForensicVM Server, Netdata shows how the server is doing and makes sure everything runs smoothly.

Key Points

  • Real-time Look: Netdata updates every second, helping catch issues fast.

  • Sees Everything: It checks everything - like how the CPU is used, memory use, disk activity, and how the network is doing.

  • Alerts: Get warnings if something goes beyond normal levels.

  • Easy-to-Read Charts: A simple dashboard shows all the info in clear charts.

How to Start with Netdata on ForensicVM Server

Installation:

Netdata is already installed on ForensicVM Server.

How to Use the Netdata Dashboard:

You can open it from the Autopsy ForensicVM Client Plugin:

Opening Netdata through Autopsy

Opening Netdata through Autopsy

Or, use the ForensicVM main web page:

Opening Netdata from the main page

Opening Netdata from the main page

How Netdata Helps with ForensicVM Server

Example of what you see:

Netdata Dashboard view

Netdata Dashboard view

  • CPU: See how much CPU is being used. If it’s too much, maybe add more resources.

  • Memory: Make sure there’s enough RAM for all the tasks.

  • Disk Activity: Make sure the disk isn’t too busy. If it is, tasks might slow down.

  • Network: Keep an eye on data coming in and out, especially with big files.

  • Alerts: Set warnings for important things, like if RAM use is very high.

Making Netdata Work for You

  • Set Your Alarms: Set warnings for things that matter to you.

  • Your Dashboard: Make a dashboard that shows what’s important for your tasks.

  • Connect with Other Tools: Netdata can send alerts to places like Slack, Twilio, or email.

Netdata is a great helper for those using ForensicVM Server. It watches over things and makes sure all is good. For admins, it’s a must-have tool.

Note

To learn more about Netdata, visit the [Netdata website](https://learn.netdata.cloud/).

ForensicVM Case Study - Bart the hacker

Challenge Description

This appendix details the ForensicVM Case Study and Challenge, which is designed to highlight the differences between the evidence collected by dead-box forensics and live-forensics in a virtualized environment. The data set was created with VirtualBox and features a Windows 11 Pro environment equipped with various local and cloud applications. The image was captured using the FTK Imager in Expert Witness Format (EWF).

  • Virtualisation is required to extract vital evidence.

  • Bypassing the ‘Bart’ password is necessary to access the applications.

  • Existing passwords within the data set must remain unchanged to maintain the integrity of the challenge.

  • The Bart windows password is simple, but the challenge encourages ethical hacking skills to bypass or decrypt it.

Steps to Solve the Challenge

The following steps provide a structured approach to tackle the ForensicVM challenge:

  1. Utilise dead box forensics techniques in autopsy software to attempt full data retrieval from cloud applications and local applications. Document all findings.

  2. Virtualize the forensic image using the autopsy ForensicVM plugin.

  3. Attempt to identify and bypass the Bart password to gain access to the applications.

  4. Run the ForensicVM

  5. Without internet access, systematically extract information from each application cloud and local application. Document all findings.

  6. Enable internet access and repeat the information extraction process, noting any differences.

  7. Record any additional information obtained after establishing an Internet connection.

  8. Identify and document information related to the two financial applications present in the environment.

  9. Extract and analyse data related to cryptocurrency.

  10. Create a comprehensive chain of custody for all investigative actions taken.

  11. Conduct and document a memory dump and network traffic dump.

  12. Capture all investigative actions via video and take screenshots for evidence support.

For further information, refer to the ForensicVM Autopsy Plugin User Manual available at:

ForensicVM Autopsy Plugin User Manual

The complete dataset can be accessed via the following links:

Challenge Solution

Dead box forensics

The resolution of the digital forensic challenge began with the establishment of a new case within the forensic autopsy software. The initial phase involved the creation of a case as captured in Figure Fig. 252.

Creation of a New Case

Creation of a New Case

Subsequently, the case details were entered as demonstrated in Figure Fig. 253, ensuring that all pertinent information was correctly documented.

Entering Case Information

Entering Case Information

Optional case information was also provided to provide additional context and metadata for the investigation, as shown in Figure Fig. 254.

Providing Optional Case Information

Providing Optional Case Information

To facilitate analysis, host information was generated as shown in Figure Fig. 255, which helps align the investigative environment with the specifics of the case.

Generating Host Information

Generating Host Information

The subsequent step was to select the disk image or VM file that contained the forensic evidence, ensuring that the correct data source was incorporated into the investigation (Figure Fig. 256).

Disk Image or VM File Selection

Disk Image or VM File Selection

The timezone configuration is critical for accurate timestamp analysis; therefore, the forensic image path was established and the timezone was adjusted to Europe/Lisbon as part of the configuration process (Figure Fig. 257).

Configuring the Forensic Image Path and Timezone

Configuring the Forensic Image Path and Timezone :label: fig:autopsy_0006

For initial data processing, ingest plugins were selected, specifically ‘Recent Activity’ and ‘Picture Analyser’, to extract relevant user activities and image-related evidence (Figure Fig. 258).

Selection of Initial Ingest Plugins

Selection of Initial Ingest Plugins

The investigator then waited for the completion of the addition of the data source, monitoring the progress to ensure successful incorporation into the case (Figure Fig. 259).

Monitoring Data Source Addition

Monitoring Data Source Addition

Upon successful addition of the data source, as confirmed by the software, the evidence was ready for a thorough examination (Figure Fig. 260).

Confirmation of Data Source Addition

Confirmation of Data Source Addition

Exploration within the “Os accounts” section yielded security answers that were potential avenues for password bypass efforts, with all answers being “textbf{bart}”, which could provide a breakthrough in the case (Figure Fig. 261).

OS Accounts and Security Answers

OS Accounts and Security Answers

In the process of forensic analysis, the discovery of the password ‘textbf{Lisa@Springfield}’ via the Autofill feature in the Autopsy Web form represents a pivotal development. This password is a critical piece of evidence for the case, as it could potentially grant access to restricted areas that may contain further information or clues. The uncovering of this password, as displayed in Figure Fig. 262, underscores the importance of thorough examination of digital artefacts which may hold vital information within a forensic investigation.

Discovery of a Password via Web Form Autofill

Discovery of a Password via Web Form Autofill

Moreover, the identification of specific applications such as Eraser 6.2.0.2993, which is designed for secure file deletion, and HomeBank 5.7.1, a personal finance application, can offer valuable insights into the suspect’s actions and intents. As depicted in Figure Fig. 263, the presence of these applications may suggest attempts to conceal activities or manage finances in a way that is pertinent to the investigation.

Applications of Interest Including Secure File Deletion and Personal Finance Management Tools

Applications of Interest Including Secure File Deletion and Personal Finance Management Tools

The further discovery of Money Manager Ex v.1.6.4, another financial management tool, as indicated in Figure Fig. 264, reinforces the financial angle of the user’s activity profile. This could be integral to constructing a narrative regarding the suspect’s financial dealings or motivations.

Additional Financial Application Money Manager Ex Indicating In-Depth Financial Activities

Additional Financial Application Money Manager Ex Indicating In-Depth Financial Activities

Lastly, the opening of a financial database named example.xhb from the HomeBank files, as shown in Figure Fig. 265, further corroborates the financial dimension of the investigation. This particular file may contain transaction records, budgets, or other financial data which could be analysed to provide a clearer understanding of the suspect’s financial behaviour or potential illicit activities.

Opened Financial Database example.xhb Revealing Recent User Activities with Financial Data

Opened Financial Database example.xhb Revealing Recent User Activities with Financial Data

The discovery of the example.xhb database in XML format, as depicted in Figure Fig. 266, adds a layer of complexity due to the proprietary structure of the file. This could imply that special attention must be paid to decipher the data structure to interpret the financial information contained within. The proprietary nature of the format might necessitate the use of specific tools or methods to extract and analyse the data accurately.

Proprietary XML Structure of the example.xhb Database

Proprietary XML Structure of the example.xhb Database

The identification of cloud applications in the forensic investigation is critical as it may provide insight into data that is not stored locally on the device. The accounts discovered through the Autopsy software, including GitHub, live.com, discord.com, and evernote.com, extend the potential for finding evidence to the cloud. The presence of these services as shown in Figure Fig. 267, suggests a broad range of user activity, from software development and project management to personal communication and note-taking, which could be relevant to the case.

Overview of Cloud Applications Uncovered in Autopsy

Overview of Cloud Applications Uncovered in Autopsy

Tagging folders related to financial applications within Autopsy helps in organising evidence and highlights the importance of financial data in the investigation. As illustrated in Figure Fig. 268, tagging these folders ensures that relevant information is easily accessible and distinguishable from other unrelated data, facilitating a more efficient investigation process.

Tagging of Folders Pertaining to Financial Applications

Tagging of Folders Pertaining to Financial Applications

The creation of an Autopsy HTML report is a critical step for documenting the investigation, offering a comprehensive and accessible format for presenting the findings. The series of figures, from Figure Fig. 269 to Figure Fig. 273, encapsulate various aspects of the report, from the general overview to specific details regarding data sources and tagged items.

Snapshot of the Autopsy HTML Report Interface

Snapshot of the Autopsy HTML Report Interface

Detailing the Data Source 'bart.E01' within the HTML Report

Detailing the Data Source ‘bart.E01’ within the HTML Report

Autopsy HTML Report Showing Tagged Items and Analysis Results

Autopsy HTML Report Showing Tagged Items and Analysis Results

Compilation of All Results in the Autopsy HTML Report

Compilation of All Results in the Autopsy HTML Report

Report Detailing Found Cloud Applications and Associated Usernames

Report Detailing Found Cloud Applications and Associated Usernames

Local applications and those identified as relevant through tagging were systematically documented within the Autopsy report as well. This incorporation of tagged local and cloud applications allows for a more comprehensive review of the software environment of the system under investigation (Figure Fig. 274).

Tagged files depicting local and cloud applications within Autopsy

Tagged files depicting local and cloud applications within Autopsy

Live forensic with ForensicVM - Phase 1: Network disabled

The commencement of live forensics entails the virtualization of the forensic image, utilizing the capabilities of the ForensicVM server and client infrastructure.

The initial step involves initiating the ForensicVM client ingest module via Autopsy, as illustrated in Figure Fig. 275.

Run ingest modules: ForensicVM Client

Run ingest modules: ForensicVM Client

Subsequently, a comprehensive virtualization of the image was executed. Utilizing the command textbf{Virtualize - a) Convert to VM}, a duplicate of the forensic image is created. This process entails altering the hardware abstraction layer by incorporating virtio optimized drivers, culminating in the creation of a ForensicVM, as depicted in Figure Fig. 276, Figure Fig. 277, and Figure Fig. 278.

ForensicVM client main form

ForensicVM client main form

Forensic image to forensicVM Conversion progress

Forensic image to forensicVM Conversion progress

ForensicVM First execution

ForensicVM First execution

The recovery questions were noted to be identical (textbf{bart}), prompting an attempt to use them as the password. This strategy proved effective due to the recovery questions being set identically to the password, as shown in Figure Fig. 279.

Password recovery utilizing identical security questions

Password recovery utilizing identical security questions

Access was successfully gained to the Bart desktop, which featured a wallpaper indicating potential malicious intent with the message “I will hack Springfield…,” as seen in Figure Fig. 280.

Bart desktop with indicative wallpaper message

Bart desktop with indicative wallpaper message

The desktop was populated with numerous icons, one of which was for the Evernote cloud application. Activating this icon initiated Evernote, within which several recent notes were apparent: Extra images, Secret nuclear plants, Bart Simpson Passwords, and My pass, as illustrated in Figure Fig. 281.

Evernote application with recent notes

Evernote application with recent notes

In the forensic investigation within the Evernote application, a notebook titled textbf{Bart secret plans} containing three notes was identified. The procedure to export these notes to the forensicVM evidence drive is crucial, as illustrated in Figure Fig. 282.

Evernote notebook 'Bart secret plans'

Evernote notebook ‘Bart secret plans’

To commence the note export process, the notes were first converted into PDF format as shown in Figure Fig. 283.

Exporting notes as PDF

Exporting notes as PDF

The notes were then methodically stored in a subfolder named Evernote, located within the Cloud_applications tag in Autopsy. The textbf{Bart secret plans} file was exported to this specific folder, detailed in Figure Fig. 284.

PDF export destination folder structure

PDF export destination folder structure

A verification step was conducted to ensure that the exported PDFs contained all potential evidence, as confirmed in Figure Fig. 285.

Verification of exported PDF content

Verification of exported PDF content

The export procedure was repeated for another notebook titled textbf{Primeiro bloco de notas}, which was also moved to the Evernote folder on the evidence disk, as depicted in Figure Fig. 286.

Exporting 'Primeiro bloco de notas' from Evernote

Exporting ‘Primeiro bloco de notas’ from Evernote

Investigation revealed that the bart secret plans notebook was shared by a user named Nuno Mourinho, which may indicate collaborative or shared use of the contents, as evidenced by Figures Fig. 287 and Fig. 288.

Shared user detail for 'bart secret plans' notebook

Shared user detail for ‘bart secret plans’ notebook

Notebook sharing information indicating 'Nuno Mourinho'

Notebook sharing information indicating ‘Nuno Mourinho’

Additionally, the Evernote trash was scrutinized, and it was confirmed that no notes had been deleted, as shown in Figure Fig. 289. The absence of deleted notes might suggest that the user did not attempt to remove evidence or considered the contents of the notes to be non-incriminating.

Checking Evernote trash for deleted notes

Checking Evernote trash for deleted notes

The forensic analysis included the observation of software behavior in a controlled environment. The Discord application displayed a notification for an update, which could not be completed due to a lack of internet connectivity, leaving the application in a state of limbo as depicted in Figure Fig. 290.

Discord application unable to update without internet connection

Discord application unable to update without internet connection

Subsequently, GitHub Desktop was launched, which is a graphical client interface for interacting with GitHub repositories. It attempted to locate a repository named hackSpringField, but without internet access, the search was unsuccessful, as demonstrated in Figure Fig. 291.

GitHub Desktop failing to find the 'hackSpringField' repository

GitHub Desktop failing to find the ‘hackSpringField’ repository

Due to the absence of an internet or local network connection, the content within the GitHub repository could not be retrieved or reviewed, which is an essential aspect to consider for future investigative steps. This scenario is highlighted in Figure Fig. 292.

Unreachable GitHub repository contents due to lack of network connectivity

Unreachable GitHub repository contents due to lack of network connectivity

The investigation then moved to financial applications, with a specific focus on Homebank. An attempt to launch this application was made as indicated by the presence of its icon, and this is captured in Figure Fig. 293.

Locating the Homebank application

Locating the Homebank application

Upon accessing Homebank, the last opened file named example.xhb was identified, suggesting a possible area of interest for the investigation. The examination of this file is depicted in Figure Fig. 294.

Opening the last accessed file in Homebank

Opening the last accessed file in Homebank

Within the example.xhb file, the existence of a Bitcoin account was noted. Even though the file bore the name ‘example’, it was considered worthy of detailed examination to discern any potential financial improprieties or to trace financial transactions, as shown in Figure Fig. 295.

Evidence of a Bitcoin account in the Homebank file 'example.xhb'

Evidence of a Bitcoin account in the Homebank file ‘example.xhb’

So far, this analysis underscores the complexity of digital forensics, particularly when dealing with cloud-based services and financial software, where access to the content is often restricted without proper connectivity or credentials.

Upon uncovering Bitcoin-related transaction data within the Homebank application, steps were taken to document this information. The transactions were exported to a PDF file for ease of analysis and future reference, a process captured in Figures Fig. 296 and Fig. 297.

Exporting Bitcoin transaction data to PDF

Exporting Bitcoin transaction data to PDF

The process of printing transaction data to a PDF file

The process of printing transaction data to a PDF file

The forensic examination then proceeded to another financial application, Money Manager Ex. Upon initiation, the application’s dashboard revealed an account with the noteworthy title ‘Springfield ransom’, as displayed in Figure Fig. 298.

Dashboard of Money Manager Ex showing the 'Springfield ransom' account

Dashboard of Money Manager Ex showing the ‘Springfield ransom’ account

Within this application, two significant transactions were identified: a withdrawal of 222 million by a user named Homer, and a deposit of 100 million to a Mr. Burns. These transactions, detailed in Figure Fig. 299, could suggest a flow of funds that may be pertinent to the investigation.

Transactions in Money Manager Ex involving significant sums of money

Transactions in Money Manager Ex involving significant sums of money

To collate the findings, a PDF document was created and stored on an evidence drive, ensuring the preservation of the data uncovered during the investigation. This step is illustrated in Figures Fig. 300 and ref{fig:autopsy_0056}.

Compiling findings into a PDF document

Compiling findings into a PDF document

Saving the PDF document to the evidence drive

Saving the PDF document to the evidence drive

Finally, verification was carried out to ensure that the PDF created indeed contained the exported transaction data, as can be affirmed by Figure Fig. 302.

Confirmation of the exported transaction data within the PDF document

Confirmation of the exported transaction data within the PDF document

Live forensic with ForensicVM - Phase 2: Network enabled

In the continuation of the live forensic analysis using ForensicVM, the investigation progressed to include cloud-based evidence following the activation of the network interface. This crucial step is depicted in Figure Fig. 303.

Enabling the network interface on the ForensicVM webscreen

Enabling the network interface on the ForensicVM webscreen

One of the primary cloud applications scrutinised was GitHub Desktop. This application was of particular interest as it may contain repositories that could provide evidence of illicit activity if the computer in question belonged to a potential hacker. The repository named hackSpringField was cloned as an initial step, a process illustrated in Figure Fig. 304.

Cloning the deleted repository 'hackSpringField' using GitHub Desktop

Cloning the deleted repository ‘hackSpringField’ using GitHub Desktop

Within the cloned repository, a README file disclosed Bart’s likely malicious intent, containing the message “I will hack Springfield Buhahahahahaha!”, as seen in Figure Fig. 305.

The README file within the 'hackSpringField' repository indicating potential malevolent intentions

The README file within the ‘hackSpringField’ repository indicating potential malevolent intentions

The exploration of Bart’s GitHub repositories revealed several with names that suggest they could be tools for malicious purposes:

  • RATreeViewSpringField

  • StichRATSpringfield

  • TheFatRatSpringField

  • awesome-ratSpringField

  • basicRATSpringField

These repositories were cloned as part of the investigatory process, as documented in Figures Fig. 306, Fig. 307, and Fig. 308.

Cloning of repositories suspected to be associated with malicious activities

Cloning of repositories suspected to be associated with malicious activities

Acquiring repository content for further forensic analysis

Acquiring repository content for further forensic analysis

Documentation of the cloned repositories from the suspected hacker's GitHub account

Documentation of the cloned repositories from the suspected hacker’s GitHub account

Subsequently, the cloned repositories were transferred to a specifically labelled folder ‘Github-Internet On’ within the cloud_applications autopsy tag folder, with the process captured in Figures Fig. 309, Fig. 310, and Fig. 311.

Copying cloned repositories to the designated forensic analysis folder

Copying cloned repositories to the designated forensic analysis folder

Organising the collected repositories in the 'Github-Internet On' folder for detailed examination

Organising the collected repositories in the ‘Github-Internet On’ folder for detailed examination

The shared notebook named bart secret plans now has 14 notes, an increase of 11 notes from when the system was examined in offline mode. This surge in content could indicate active use or automated synchronization once the network was enabled. Among these notes, several are titled with ‘Command and Control (C2C)’, each followed by a sequence number, which suggests a structured approach to potentially illicit command sequences. Furthermore, the presence of Evernote Cloud API python guide notes could imply an intention to leverage Evernote as a platform for issuing commands to compromised systems or for managing a network of controlled devices. An illustrative note contains the command sdelete -z c:, which is known to overwrite free space on a drive with zeros, typically a method to prevent data recovery – a concerning find, possibly indicative of attempts to obfuscate or destroy evidence. This detail is depicted in Figure Fig. 311.

Screenshot illustrating the use of 'sdelete' command within a note from the 'bart secret plans' notebook

Screenshot illustrating the use of ‘sdelete’ command within a note from the ‘bart secret plans’ notebook

In a detailed examination, all notes from the bart secret plans notebook were exported as multiple webpages to be preserved as evidence, as shown in Figures Fig. 312 and Fig. 313.

Exporting the contents of 'bart secret plans' to webpages, part 1

Exporting the contents of ‘bart secret plans’ to webpages, part 1

Exporting the contents of 'bart secret plans' to webpages, part 2

Exporting the contents of ‘bart secret plans’ to webpages, part 2

Similarly, the Primeiro bloco de notas (First Notebook) was exported, revealing an additional note not previously visible in offline mode. The findings are presented in Figure Fig. 314.

The export process of the 'Primeiro bloco de notas' indicating the presence of an additional note

The export process of the ‘Primeiro bloco de notas’ indicating the presence of an additional note

Upon inspecting the Discord application, which was set to the Portuguese language, we accessed the user bart.simpson’s server. The server’s activity log, accessed via the bart.simpson_springfield login, can be observed in Figure Fig. 315.

Accessing Discord server with bart.simpson\_springfield user credentials

Accessing Discord server with bart.simpson_springfield user credentials

Further investigation within the server revealed a channel named ‘Servidor de bart.simpson’ (bart.simpson’s server), which contained an announcement seemingly related to the sale of data on the dark web, as captured in Figure Fig. 317 after opening the server shown in Figure Fig. 316.

The Discord server 'Servidor de bart.simpson' accessed for investigation

The Discord server ‘Servidor de bart.simpson’ accessed for investigation

Announcement on 'Servidor de bart.simpson' revealing intentions to sell data on the dark web

Announcement on ‘Servidor de bart.simpson’ revealing intentions to sell data on the dark web

Within the Discord channel named cyber-security-bypass, the user ‘bart’ claimed to have ex-filtrated data from the Springfield Nuclear Plant. Evidence of such a breach was showcased in an Excel format, which was presented as a sample of the exfiltrated data. Additionally, ‘bart’ stipulated a ransom demand of 1000 dollars for the recovery of the data, directing the payment to be made to a specified Bitcoin wallet. This incriminating interaction, including the digital ransom note and the proof of the stolen data, is captured in Figure Fig. 318.

Screenshot displaying the ransom demand and sample of exfiltrated data from Springfield Nuclear Plant on Discord

Screenshot displaying the ransom demand and sample of exfiltrated data from Springfield Nuclear Plant on Discord

Subsequent to the discovery of the Discord communication, efforts were made to download the chain of custody report utilizing the ForensicVM webscreen interface. This procedure is critical for maintaining the integrity of the digital evidence and ensuring that all investigative actions are properly documented. The process of downloading this report is depicted in Figures Fig. 319 and Fig. 320.

Downloading the chain of custody report via the ForensicVM webscreen interface, part 1

Downloading the chain of custody report via the ForensicVM webscreen interface, part 1

Downloading the chain of custody report via the ForensicVM webscreen interface, part 2

Downloading the chain of custody report via the ForensicVM webscreen interface, part 2

The next phase in the investigative process involves exporting the ForensicVM evidence disk in the virtual machine disk (VMDK) format. This step is necessary to facilitate the importation of the disk into the Autopsy analysis tool for a comprehensive examination. The sequence of actions taken to halt the ForensicVM, followed by the initiation of the ‘Import Evidence Disk’ process, is sequentially illustrated in Figures Fig. 321 through Fig. 324.

Initiating the export of ForensicVM evidence disk from the Autopsy Forensic Client main interface

Initiating the export of ForensicVM evidence disk from the Autopsy Forensic Client main interface

Stopping the ForensicVM in preparation for exporting the evidence disk

Stopping the ForensicVM in preparation for exporting the evidence disk

Selection of the 'Import Evidence Disk' option in the Autopsy Forensic Client

Selection of the ‘Import Evidence Disk’ option in the Autopsy Forensic Client

_images/autopsy_0079.jpg

Finalization of the ForensicVM evidence disk export in VMDK format.

In the final step of the digital forensic analysis, a new data source was added to the Autopsy forensic software. This new data source was the VMDK disk which contained the evidence that had been previously gathered from ForensicVM. This action is paramount for enabling a detailed examination and analysis within the Autopsy environment. The step-by-step process of adding this new evidence source is captured in Figures Fig. 325 through Fig. 330.

_images/autopsy_0080.jpg

Initiating the addition of a new data source in Autopsy.

_images/autopsy_0081.jpg

Selecting the evidence disk for the new data source.

_images/autopsy_0082.jpg

Confirming the selection of the VMDK disk file.

_images/autopsy_0083.jpg

Setting up the data source parameters in Autopsy.

_images/autopsy_0084.jpg

Progression of the data source addition process.

_images/autopsy_0085.jpg

Completion of the new data source addition in Autopsy.

Post-importation of the meticulously crafted evidence disk into Autopsy, the investigation is poised to enter a detailed examination phase. The evidence disk, structured with folders mirroring the tags utilized within Autopsy, allows for an organized and efficient review process. The subsequent investigative steps will leverage the logical structure and tagging system to ensure a comprehensive analysis of the data.

The primary step involves the cataloging and verification of the imported data against the original evidence tags. This ensures that the transfer has been successful and that the integrity of the data has been maintained during the process. The alignment of folders with Autopsy tags streamlines the verification process, allowing investigators to swiftly confirm the presence and accuracy of all tagged items.

Following this, a thorough content analysis within each tagged folder will be undertaken. Since these folders are organized based on the categorization relevant to the investigation, the analysis can be targeted and specific. Investigators will parse through each category, looking for suspicious patterns or incriminating evidence that correlates with the activities under investigation.

Subsequently, cross-referencing the extracted evidence with the case timeline will be imperative. The analysis will involve correlating timestamps of file creation, modification, and deletion with the case events. Such a timeline analysis can often unearth critical insights into the suspect’s behavior and modus operandi.

The investigation will also include a thorough review of any executable files and scripts that were used or potentially created as part of the suspect’s activities. The scripts found in the ‘C2C’ (Command and Control) folders, for example, will be scrutinized to understand the nature of the commands issued, their targets, and the extent of control exerted over compromised systems.

A meticulous examination of communication logs and metadata is also essential. This includes not only traditional system logs but also any extracted communication from applications such as Discord, as indicated by the presence of specific tags and folders. Insights gleaned from these sources can be invaluable in establishing the suspect’s network of contacts and the breadth of the cyber-security breach.

In addition, a deep-dive analysis into the files marked for deletion or those found within the unallocated space of the file system will be conducted. Using file carving techniques, investigators aim to recover and reconstruct such files, as they may hold critical evidence that the suspect attempted to obscure or erase.

Finally, the entire investigation will be supported by a robust documentation process. Each step, discovery, and piece of evidence will be recorded with exacting detail. This ensures that the chain of custody is preserved and that all the investigative actions can withstand the rigorous scrutiny of legal proceedings.

Troubleshooting

Booting without signed drivers

If your machine cannot boot due to the virtio drivers installed during the automatic driver installation in the virtualization phase being unsigned or having an invalid signature for your operating system, the machine may enter a recovery boot loop. To address this issue, follow these steps:

  • 1. Advanced options in the Automatic Repair boot screen: Press the “Advanced options” button.

    Advanced options in the Automatic Repair boot screen

    Advanced options in the Automatic Repair boot screen

  • 2. Troubleshoot: Select the “Troubleshoot” option.

    Troubleshoot option

    Troubleshoot option

  • 3. Advanced options: Choose the “Advanced options”.

    Choosing Advanced options

    Choosing Advanced options

  • 4. Startup Settings: Within the Advanced options, select the “Startup Settings” to change Windows startup behavior.

    Startup Settings option

    Startup Settings option

  • 5. Restart: Press the “Restart” button and await the system restart.

    Restart option

    Restart option

  • 6. Press F7: Once the system restarts, press the F7 key to choose “Disable driver signature enforcement”.

    Pressing F7 for Disable driver signature enforcement

    Pressing F7 for Disable driver signature enforcement

  • 7. Windows normal boot: Your Windows should now boot normally.

    Windows booting normally

    Windows booting normally

Note

This behavior has been observed in older Windows versions, such as Windows 8.1. Mismatches or odd dates in the driver certificate can lead to this issue.

DEBUG: Remote ssh to folder

If you encounter issues with the forensicVM, you might need to directly edit its configuration files or control its state (start/stop). Below is a step-by-step guide on how to perform these actions:

  1. In the Autopsy ForensicVM Client Plugin, select DEBUG: Remote ssh to folder.

    DEBUG: Remote ssh to folder option in the Autopsy ForensicVM Client Plugin.

    DEBUG: Remote ssh to folder option in the Autopsy ForensicVM Client Plugin.

  2. Elevate to root permissions. Enter the su command and provide the root password when prompted.

    Elevating to root using the su command.

    Elevating to root using the su command.

  3. Input the following command to edit the configuration file associated with the forensicVM:

nano `ls *vnc*`
Editing the VNC configuration file with the forensicVM.

Editing the forensicVM configuration file with nano.

  1. Inside the editor, modify the configuration file as needed. Adjust the relevant parameters to your requirements.

The configuration file open in nano.

The configuration file open in nano for editing.

  1. Once done, exit the remote shell. Now, you can start the forensicVM as you typically would.

Note

It’s essential to ensure that the configurations are correct to prevent any unexpected behaviors.

For advanced techniques and in-depth configurations for the forensicVM, consider referring to the official QEMU documentation: QEMU Documentation.

Glossary

1980x1080 resolution

A specific pixel count for display screens. This resolution is recommended to ensure a clear and detailed view of the ForensicVM interface.

64-bit multi-core processor

A processor with multiple cores capable of handling 64-bit data chunks simultaneously. It’s essential for ForensicVM to achieve optimal performance, especially during intricate tasks.

7-zip

A free and open-source file archiver, commonly used for compressing and decompressing files.

Access the Project Repository

The hosted project on GitHub where you can view, clone, or fork the ForensicVM Plugins repository.

Accessing the WebShell

Refers to the methods available for users to access the WebShell for remote administration.

Add Linux Forensic Admin

A plugin to create a new Linux user with ‘sudo’ permissions.

Add Windows Forensic Admin

A plugin that creates a new Windows admin user with specific credentials. The user belongs to the “Administrator” group.

Additional Security Bypass Features

Plugins designed to bypass other security measures apart from authentication.

Adjusting Screen Scaling: Local Scaling

Steps to optimize the viewing experience within the webscreen console.

Advanced options

A deeper layer of settings, usually accessed after selecting “Troubleshoot”, that offers more specific ways to address boot issues.

Advanced options in the Automatic Repair boot screen

An option in the boot screen that provides advanced repair capabilities when facing boot-related issues.

Alerts

Notifications triggered when certain parameters exceed predefined limits.

API key

A code passed in by computer programs to identify the calling program. It grants access to a service, in this case, the ForensicVM server.

Authentication Bypass Features

A suite of plugins designed specifically to bypass various authentication measures.

Autopsy

An open-source digital forensics platform designed for analyzing, managing, reporting, and conducting digital investigations. It is used for disk forensics, post-mortem analysis, and handling forensic data. The platform also provides a user interface to manage various functionalities, including the ForensicVM. ForensicVM requires compatibility with at least Autopsy version 4.20.

Autopsy Case

Displays Autopsy case details, including existing case tags and the generated unique UUID.

Autopsy ForensicVM Client Plugin

An extension for the Autopsy framework, this plugin facilitates interaction with the ForensicVM environment. Through this interface, forensic investigators can access and manage various functionalities, including snapshot, ISO, and tools management like WebShell and Netdata. It is also tailored for managing and analyzing virtual forensic machines.

Autopsy ForensicVM Client Plugin: A Comprehensive Interface Guide

A detailed guide describing the functionalities and operations of the Autopsy ForensicVM Client Plugin.

Autopsy framework

A subset of the Autopsy platform focused on tools and functionalities used for conducting investigations, such as analyzing disk images or VM files, and post-mortem analysis.

Autopsy Plugin

Extensions or tools within the Autopsy platform designed to enhance its forensic investigation capabilities. These plugins extend the core functionality of the Autopsy platform. The ForensicVM Client Plugin is a notable example.

Autopsy Tags

Markers or labels within the Autopsy platform that aid in organizing and categorizing evidence. They are represented as directories or folders on the evidence disk.

Bare metal server

A physical server dedicated to a single tenant or purpose.

Base Snapshot

Often referred to as the ‘first snapshot,’ this represents the initial state of a system or piece of evidence, functioning as an untouched reference point.

Belkasoft Evidence Center

A software solution that includes the ability to analyze computer memory.

BIOS

Basic Input/Output System, a software that is built into the PC, and is the first code run by a PC when powered on.

BitLocker Drive

A drive encryption feature integrated into the Microsoft Windows operating system. In the provided context, the entire encrypted BitLocker drive is showcased being transferred for forensic analysis.

Blue Screen of Death

A colloquial term for a Windows system crash.

Boot Manager

A software process that starts the operating system when the computer is powered on.

Bootable Media

Digital storage media, like an ISO, that contains a boot sector, allowing a computer to start up from it. It provides details about booting from an ISO or CD-ROM for specific forensic tasks.

BOOTFIX: Disable Driver Enforcement

A utility that addresses challenges related to driver signatures.

Booting without signed drivers

Refers to the potential issue of a machine not booting when certain drivers, such as virtio drivers, are unsigned or possess an invalid signature for a given operating system.

Browse and Upload ISO

The process to navigate the interface and upload essential ISO files to the ForensicVM environment.

Browse ForensicVM

Accessing and navigating the forensic virtual machine using interfaces like web browsers.

Browsing Available Plugins

A process to view, manage, and deploy available plugins for ForensicVM using the Autopsy ForensicVM Client.

Bypass Windows Password

A plugin that patches the “ntlmshared.dll” file, allowing for the bypass of Windows authentication.

C2C (Command and Control) client

A centralized computer that issues commands to a botnet (a group of private computers infected with malicious software) and receives reports back.

Case

A specific digital forensic investigation project in Autopsy that may contain one or more data sources.

Case Information

Metadata associated with a case, including its name and other optional details.

Chain of Custody

The chronological documentation or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of physical or electronic evidence.

Client

Provides a user-friendly interface for managing forensic images. It allows users to create, run, and decommission instances as per their needs.

Cloud Services

Platforms and applications that provide data and services over the internet, often requiring network access to retrieve data.

Command Line Window

A windowed interface for command-line interactions.

Community Plugins Project

An open initiative aiming to enhance ForensicVM functionalities through community contributions.

Configuration File

A file that stores settings and parameters that define how a software or system behaves, and contains various parameters for the forensic virtual machine, such as memory size, attached disks, UEFI boot options, and more.

Confirmation Dialog

A prompt or interface that seeks affirmation from a user for a potentially critical action.

Confirmation Popup

A user interface element that appears to ensure that the user wants to proceed with an action, in this case, the deletion of the ForensicVM.

Connect with Other Tools

Refers to Netdata’s integration capabilities, where it can relay alerts to other platforms such as Slack or Twilio.

Contributing Code

Steps to contribute developed plugins or improvements to existing ones.

Control

A UI element, such as a button, that provides management capabilities (e.g., “Start,” “Stop,” “Reset”) for the forensicVM.

Control Bar icon

An icon that reveals the tool panel in the ForensicVM’s web interface.

Convert Forensic Image to VM

Options that facilitate transforming the forensic image into a forensic virtual machine.

CPU

Central Processing Unit, a primary indicator of a server’s processing capability. Netdata provides insights into its utilization.

Danger Zone

A section within the ForensicVM client interface dedicated to critical or potentially irreversible operations, such as deleting snapshots.

Data Extraction and Analysis

Tools or functionalities that help to extract and analyze data from a forensic image.

Data Overload

A situation where the amount of captured data is so vast that it becomes challenging to identify essential and relevant information.

Data Source

An entity from which digital evidence is extracted. This can refer to a repository, location, specific input, or reference. In the context of Autopsy, it encompasses evidence such as disk images, VM files, or any origin of forensic data. It is used as a connection or reference to gather, analyze, and acquire evidence within the forensic tool.

Data Source Processing Progress

A visual representation, usually a progress bar, showing the ongoing processing of a data source.

Deactivate

The process or act of shutting down or turning off a virtual machine or forensicVM, making it inactive or non-operational.

Debian 11 (Bullseye)

A specific version of the Debian operating system, also known as Bullseye. Recommended for installing the ForensicVM server and supported by ForensicVM.

DEBUG: Remote ssh to folder

A feature that provides a direct remote connection to the forensicVM, facilitating the editing of configuration files or control over its state.

Decoding Protocols

The process of translating network data from a machine-based protocol into a format that is human-readable.

Delete

The action of permanently removing an item, in this context, an ISO file, from storage or memory.

Delete ISO

Instructions to remove unwanted ISO files.

Delete VM Button

A designated button within the ForensicVM interface or related software used to initiate the deletion process of the virtual machine.

Digital Evidence

Information stored or transmitted in binary form that might be relied upon in court.

Direct Copy to Server

A method that duplicates the forensic image, creating a new forensic virtual machine on the server.

Disable driver signature enforcement

A startup option that allows Windows to bypass driver signature checks during boot, potentially enabling problematic or unsigned drivers to load.

Disable Network Card

The action of turning off the network card to halt all network communications for the forensicVM.

Disable Windows Defender and Firewall

A plugin that disables both Windows Defender and the firewall.

Disk Activity

Indicates how actively a disk is being read or written to, monitored by Netdata.

Disk Image or VM File

A digital copy or replica of a physical disk, also known as a bit-by-bit copy, often used in digital forensics to preserve the state of a drive. In the context of ForensicVM, a forensic image is used as a source for virtualization. As a data source, it represents either a snapshot of a disk or a virtual machine image.

Django

A high-level Python web framework that promotes rapid development and pragmatic, clean design. Allows for rapid web development.

Documentation and Chain of Custody

A process to ensure that the evidence is genuine and reliable, maintained through a documented and unbroken sequence of possession or control.

Download Progress

An indicator that displays the current status of a download operation.

Eject ISO / Web Eject CD-ROM

Guidance on ejecting a mounted ISO file or CD-ROM.

Elevate to root permissions

The act of gaining elevated system access rights, commonly achieved using the “su” command in Unix-like systems.

Evidence Collection

The process of gathering evidence, often digital, to support investigations and potentially use in court.

Evidence Disk

A disk or drive that serves multiple functions. It contains all tags from Autopsy Software and is automatically generated during the conversion of a forensic image to a ForensicVM. The disk contains directories named after Autopsy tags and serves as a container for evidence related to each tag. Additionally, it is the specific storage area where collected forensic evidence is saved and is often labeled as “possible evidence”.

Evidence Preservation

The safeguarding of the original state of evidence, reducing risks of contamination or alteration.

evidence.vmdk disk

A specific format of a virtual disk image used to store forensic evidence in the context of Autopsy and VMs.

Executing Plugins

The process of running plugins on the ForensicVM.

Fallback Conversion

A backup method of conversion for unidentified OS.

Feature Suggestions and Plugin Requests

A method to contribute ideas for new plugins, features, or improvements without coding them.

Fiber Optics

A type of high-speed internet connection.

File Explorer

A graphical user interface (GUI) component that lets users manage and view files. It is used to navigate and identify the evidence disk.

Fine-Tuning ForensicVM

The process of making adjustments to various configuration parameters of a ForensicVM. This is done via a configuration file that is generated when a forensic image is converted into a ForensicVM.

Firewall

A network security system or component that monitors and controls incoming and outgoing network traffic based on predetermined security policies. Designed to block unauthorized access, it allows only permitted communications to pass.

Forensic Administrator User

A user profile with elevated privileges, potentially created for the purpose of a forensic investigation, to ensure unrestricted access to required data.

Forensic Analysis

Using memory dumps in digital forensics to reconstruct events, recover data, and analyze user and system interactions.

Forensic Image

A digital representation, snapshot, or copy of a storage device or data from a device. It preserves both the structure and content and is used for the purpose of analysis and investigation in digital forensics. Crucial for digital forensic investigations.

Forensic SSH Server Redirection

A method used by ForensicVM to safely access Windows shared folders over the internet via a reverse SSH connection.

Forensic Virtual Machine (VM)

A digital environment replicated from a forensic image that serves as a snapshot of a system at a specific point in time.

ForensicVM / forensicVM

A specialized or comprehensive virtual machine environment tailored for forensic investigations. It operates on a hypervisor and is derived from a forensic image. The operating system is detected, and necessary drivers are installed to replicate the functionality of the original system. An initial snapshot is created to preserve the original state. The ForensicVM allows detailed examination within a safe and controlled environment, without risk to other systems or compromising the original data. It often has a network card disabled by default for security reasons and offers tools and functionalities essential for digital forensic investigations. Designed to assist forensic investigators in the virtualization, management, and analysis of forensic images, it’s essential to manage its operations correctly to preserve the integrity of the evidence.

ForensicVM Client Plugin

A specialized Autopsy plugin that forms one of the two primary components of the ForensicVM project. It is the main program interface running in Autopsy Software and is designed to assist in the processing, converting, and forensic analysis of virtual machines and forensic images. Tailored for managing and interacting with Forensic Virtual Machines (VM), it facilitates the analysis of VM images.

ForensicVM Loader

A component that is part of the ForensicVM toolset and plugin, responsible for initializing and setting up the forensic analysis environment for VM analysis.

ForensicVM Main Screen

The primary interface of the forensic virtual machine when accessed via the web.

ForensicVM Main Web Interface or web page

The primary interface of the ForensicVM, where users can navigate to various tools and features, including the WebShell and Netdata.

ForensicVM Server

The main backbone of the ForensicVM system, developed using Django and Python, it facilitates the functionalities of the ForensicVM.

ForensicVM Server Remote Web Screen/Console Control Interface

A web-based interface designed for remote forensic investigators to collaborate and control the ForensicVM. It lets users interact with the forensicVM directly and provides an interactive console for access to the virtual screen of the remote ForensicVM. It serves as a display of the forensicVM as seen when accessed remotely, especially through web interfaces.

ForensicVM Webscreen Console Control Toolbar

A detailed overview of the Control Toolbar in the ForensicVM Webscreen Console.

ForensicVM.exe

The setup file responsible for installing the AutopsyVM client plugin on a user’s system.

FTK Imager

A product by AccessData, used for capturing and analyzing memory dumps.

Gigabit connection

A network connection that offers speeds of up to 1 gigabit per second.

GRR (Google Rapid Response)

An incident response framework that includes memory analysis capabilities.

Halt

The act of temporarily pausing or stopping the operations of the forensicVM without fully shutting it down.

Hash Dump File

A file that contains hashed representations of data. In the context, it is identified as potential evidence.

Hibernate File Management

Tools or methods to manage or remove hibernation files.

Hibernation

A power-saving mode for computers. In Windows, when the system goes into hibernation, it saves the current state of the system (including open applications and documents) into the hibernation file and shuts down, allowing for a faster start-up later.

Host

In the context of Autopsy, refers to a machine or system from which data is being collected or investigated.

Host configuration

The settings that determine how the data source is treated or processed within a forensic analysis environment.

HP ILO

Integrated Lights-Out. A remote management tool used for server administration.

Hypervisor

A piece of software, firmware, or hardware that creates and manages virtual machines (VMs). Also known as a virtual machine monitor (VMM), it is responsible for the execution of virtualized forensic images, manages resources, and ensures isolation between different instances.

ifconfig

A system administration utility in Unix-like operating systems to configure, control, and query TCP/IP network interface parameters.

Immediate Reboot

A rapid restart of the forensicVM without fully shutting it down. This is especially useful in scenarios requiring quick troubleshooting, testing, or managing different VM states.

Immutable Record

Non-alterable and chronological documentation, especially in the form of a video, captures every action and finding during an investigation.

Import

The act of bringing data into a software platform (like Autopsy) from an external source.

Import Evidence Disk

A function or feature that allows users to introduce an evidence disk into the analysis environment.

Ingest Modules

Modules in Autopsy that perform data extraction, analysis, and organization tasks automatically for the investigator.

Ingest Plugins

Plugins or modules in forensic software that are used to process and analyze specific types of data or evidence.

Insert ISO / Web Insert CD-ROM

Procedure to virtually insert an ISO file or CD-ROM for access within the ForensicVM environment.

Installation / Installation and Setup

The process of setting up various components, such as Netdata on a system. For ForensicVM Server, Netdata comes pre-installed. It also involves the steps necessary to install and prepare ForensicVM for use.

Interface

The user-friendly platform of ForensicVM that presents various features and tools systematically.

IP Conflict

Occurs when two or more devices or components on the same local network claim to have the same IP address, leading to network malfunctions.

ISO / ISO files

ISO 9660, also known as ECMA-119, is a file system for optical disc media standardized by the International Organization for Standardization (ISO). It is an optical disc image containing the content from a CD, DVD, or Blu-ray Disc that can be used to reproduce the content of these media. In the context of forensic tools, ISO files are encapsulations of entire file systems used to house specialized forensic tools. (Reference: ISO 9660 on Wikipedia)

ISO Management

The handling of ISO files, which are typically used for optical disk images.

Kali Linux Forensic Tools

A set of forensic tools provided by the Kali Linux distribution.

KVM / Kernel-based Virtual Machine

A virtualization infrastructure for the Linux kernel that allows the kernel to function as a hypervisor.

KVM drivers

Drivers optimized for KVM virtualization.

Adhering to standards and requirements established by legal authorities, ensuring the chain of custody is maintained.

In legal proceedings, memory dumps might provide evidence related to computer usage, unauthorized access, and intellectual property theft.

A method where a link is established between the local forensic image and a new VM on the server.

A specific mode in which a forensic image is linked, rather than copied, to the forensicVM.

Linux Terminal

A command-line interface in Linux-based operating systems for executing commands.

List Remote ISO Files

An overview of ISO files stored remotely on the ForensicVM server.

List Remote Snapshots

A feature that allows users to manually fetch and view the list of all snapshots associated with a ForensicVM from a remote server.

Logical Files

A type of data source in Autopsy representing non-physical files, often used for importing various types of digital data.

Login Button

A button clicked after entering username and password to gain access to the web interface.

Magnet RAM Capture

A free tool designed to capture physical RAM.

Main Panel Overview

A detailed breakdown of the main display area based on the selected tab option.

Main Plugin Interface

The primary user interface within a specific framework, such as Autopsy, from where the forensicVM can be initiated, managed, and controlled. It also offers options to shut down the forensicVM.

Main Toolbar Overview

A description of the primary toolbar on the Autopsy ForensicVM Client Plugin.

Main Web Interface

The primary browser-based interface for managing and interacting with the forensicVM.

Media Control Modal Box

An interface component used in the process of inserting or ejecting ISOs via the web interface.

Media Control Modal Panel

A specific part of the web screen interface that provides controls for media management.

Media Management in ForensicVM

The procedure to navigate, upload, select, insert, eject, delete, and boot from ISO files within ForensicVM.

Media Panel

An interface section within the Autopsy ForensicVM Client Plugin used to manage different media files, including ISOs.

Media Panel Separator

A component in the ForensicVM Client Plugin to access the Media Panel.

Memory

RAM (Random Access Memory) usage and availability, tracked by Netdata.

Memory Dump

A snapshot or the recorded state of the working memory (RAM) of a computer program or system at a specific time. Used in forensic analysis to review the state of the system and includes tools to engage with the active memory data of the forensic virtual machine.

Meterpreter

A type of payload in the Metasploit framework that provides an investigator with a command line interface to the targeted system. In the context, its deployment is considered as potential evidence.

Modifying Memory Size

The process of adjusting the ForensicVM’s memory size within the “Fine-Tuning” section of the Autopsy ForensicVM Client interface.

MoonSols DumpIt

A tool for creating memory dumps from Windows systems.

MS-DOS Command Window

A command-line interface available in older versions of Windows.

Netdata

A real-time health monitoring and performance troubleshooting tool for systems. It offers insights into server and application performance.

Network

Options to manage network settings and operations for the ForensicVM.

Network Card

A hardware component or a virtual representation that connects a computer to a network.

Network Isolation

A safety measure that eliminates the need for network connectivity to mitigate associated risks.

Network Troubleshooter

A built-in Windows tool designed to diagnose and fix common network issues.

Notable Item Tag

A label or marker in Autopsy, used to identify and categorize significant pieces of evidence or data points during forensic analysis.

Notification Area

A designated area on the interface for system notifications, warnings, and error messages.

NVMe

Non-Volatile Memory Express. A modern protocol developed for SSDs to exploit the full potential of high-speed PCI Express storage devices.

Open ForensicVM

An action or option to access and interact with the forensicVM’s main display, either through the Autopsy plugin or web interface. This can be initiated through various means such as a button within the Autopsy ForensicVM Client Plugin that allows users to launch the WebShell in their default browser.

Output Console

A console that captures all system messages and is instrumental for debugging.

Panel Opener

An interface element within the forensicVM used to reveal various options or configurations.

Password Administration

Tools or methods to reset forgotten passwords or generate new administrator accounts.

Patch Accessibility

A strategic patch enabling the invocation of a system-level cmd.exe prompt by pressing the shift key five times on the Windows login screen.

pcap Directory

The directory or folder where pcap files, often extracted from the pcap.zip, are stored for analysis.

pcap.zip

A compressed file containing Wireshark pcap files collected during the network card activity periods.

Picture Analyser Plugin

A plugin in Autopsy used to analyze and manage pictures or images.

Plugin Architecture

A method by which external additions can be made to extend a software’s capabilities.

Plugin Interface

The user interface provided by a software plugin, such as the one in Autopsy for the forensicVM.

Plugin Location

The directory or file path where the AutopsyVM client plugin will be installed on your computer.

Plugin/Plugins

Modular software components that add specific features to an existing computer program. Within the context of ForensicVM and Autopsy, the plugin architecture fosters community involvement and functionality expansion. They enhance or extend functionality and provide forensic investigators with capabilities to bypass protections in locked forensicVM machines. They may also help in functions such as creating new user credentials or resetting existing ones.

Possible Evidence virtual drive

A dedicated virtual drive within ForensicVM designed to store potential pieces of evidence without contaminating the original data.

Power Off/Log Out Option

An option in operating systems (like Ubuntu 22.10) that allows users to either shut down or log out of their accounts. Proper shutdown is recommended to ensure the integrity of collected evidence.

Pre-plugin Execution Recommendation

A cautionary advice to capture a snapshot of the machine’s state before initiating any plugin.

Protective Shield

The protection provided by ForensicVM’s virtual environment to the host system against potential threats.

Python

A high-level programming language known for its clear syntax and readability.

ython Ingest Plugin A plugin in Autopsy written in Python, used to automate the ingestion of data from a data source.

qcow2

A disk file format commonly used in QEMU and KVM virtualization. It is a free and open-source hardware virtualization solution.

QEMU

Quick Emulator. An open-source machine emulator, virtualizer, and hypervisor that performs hardware virtualization. ForensicVM uses QEMU to create a new forensic hypervisor server.

RAID 10

A type of RAID (Redundant Array of Independent Disks) configuration that combines mirroring and striping to protect data. It’s recommended for storing forensic images in ForensicVM.

RAM

Random Access Memory. A type of computer memory used for temporary storage and quick access. ForensicVM requires a minimum of 16 GB RAM for efficient operation, although 32 GB or more is recommended for efficient virtualization of forensic images. The Autopsy documentation suggests that the software can use up to 4GB of RAM, not including the additional memory the Solr text indexing server might use.

Readonly windows shares

Network-shared folders in the Windows operating system that do not allow modifications to the shared files. The ForensicVM plugin may create such shares and therefore requires specific permissions.

Real-time Look

Refers to Netdata’s capability to update its insights every second.

Recreate Evidence Disk

An action that leads to the deletion and fresh generation of the evidence disk within the Autopsy environment.

Redline

A tool provided by FireEye offering advanced memory and file analysis capabilities.

Rekall

A memory forensics toolkit.

Reset

The act of immediately rebooting the forensicVM, similar to a hard restart. It brings the machine back to its initial or default state without shutting it down completely.

Reset Button

A user interface control designed to immediately reboot the forensicVM, bringing it to its default or initial state.

Reset Windows 2003 or XP Activation

A plugin that resets activation for Windows 2003 or XP.

Reverse SSH connection

A technique where an SSH connection is initiated from a remote machine to the user’s machine, essentially reversing the typical connection direction.

Rollback

The process of reverting the state of the ForensicVM to a previously taken snapshot.

Root privileges

The highest level of access rights on a system, allowing full control over all functions and files.

Samba CIFS share

A type of shared resource that can be accessed by other computers. Known as Windows share.

Screenshot

A digital image that captures the contents of a computer screen, often used for documentation, analysis, or reporting purposes.

Screenshot Management

Tools to capture and manage screenshots during forensic investigations.

Sector Size

A fundamental unit of data storage on a disk, usually specified in bytes (e.g., 512 bytes). It is the smallest addressable unit on a disk.

Security Analysis

In cybersecurity, it involves using memory dumps to uncover malware behavior, detect hidden processes, analyze injected codes, and assess user credentials.

Session Cookies

Small pieces of data stored on a user’s computer during a browsing session, often containing information about user preferences or authentication status.

Set Your Alarms

A feature in Netdata that allows users to customize alert thresholds based on their needs.

Setting the VM Date & Time

A function that allows users to define the start date & time for the ForensicVM.

Shellinabox project

An open-source project that enables users to access remote servers from a web browser using a web-based terminal emulator.

Shutdown
  • Shut Down VM on the Web Interface: The method of deactivating the forensicVM directly from the web-based interface.

  • Shut Down VM on the Web Remote Screen: The method of shutting down the forensicVM when accessed remotely via the web.

  • Shutdown Button: A user interface control designed to initiate the process to deactivate and shut down the forensicVM. This button is present in the Autopsy Plugin and various other interfaces.

  • Shutdown Icon: A graphical representation or symbol indicating the control to shut down the forensicVM.

Snapshot

A saved state of a virtualized resource, such as a VM or forensic image.

Snapshot Deletion Interface

An interface or prompt within the ForensicVM client that facilitates the process of deleting a snapshot.

Snapshot Management
  • Snapshot Management: The control and management of VM snapshots.

  • Snapshot Management in ForensicVM: A section or functionality within the ForensicVM or its client interface, where snapshots are created, viewed, and managed.

Snapshots

A feature in ForensicVM that captures and preserves the state of the system or evidence at a specific point in time.

SSD
  • SSD (Solid State Drive): A storage device that uses integrated circuit assemblies to store data persistently, typically using flash memory.

  • SSD for Acquisition: A faster type of storage device compared to traditional HDDs, beneficial for speeding up acquisition processes.

SSH
  • SSH (Secure Shell): A cryptographic network protocol used for secure data communication and server administration.

  • SSH for Network Services: Used for operating network services securely over an unsecured network.

  • SSH Connection: Refers to a Secure Shell connection, which utilizes the cryptographic network protocol for secure data communication.

Start Button

A button used to initiate the forensicVM.

Startup Settings

An option within the “Advanced options” which allows changing the behavior of Windows during startup.

Stop Button
  • Stop Button in Autopsy Plugin: A button within the Autopsy Plugin interface specifically used to halt the forensicVM.

  • UI Control for Halting: A user interface control designed to initiate the process to halt and stop the forensicVM.

Tag

A label or marker within Autopsy used to identify and categorize data points or items of interest during forensic analysis.

Tagging
  • Tagging Action: The act of marking or labeling a specific item (like a screenshot) for identification, organization, or further analysis.

  • Tagging in Forensic Context: The process of marking or labeling a piece of evidence or finding with a specific tag or label to easily categorize, search, or identify it later.

Tampered Data

Information that has been intentionally altered or falsified to mislead or deceive.

Third-Party Tools

Software or utilities that are not part of the original package or platform but can be integrated or used alongside it for additional functionalities.

Time Zone

A region that observes a uniform standard time for legal, commercial, and social purposes.

Timestamps

Digital records of specific times at which events occurred.

Tools

Additional utilities for forensic operations within the ForensicVM interface.

Traffic Analysis

The process of intercepting and examining messages to deduce information from patterns in communication, endpoints, and more.

Transparency and Accountability

The assurance that the forensic process is done ethically and without tampering, as demonstrated by a detailed log such as a video recording.

Troubleshoot

A selection available during boot-up that aids in diagnosing and fixing issues that prevent the system from starting.

TTPs (Tactics, Techniques, and Procedures)

Patterns of activities or methods associated with a specific threat actor or group of threat actors.

Ubuntu 22.10

A version of the Ubuntu operating system. Ubuntu is an open-source software platform that runs everywhere from the PC to the server and the cloud.

UEFI

Unified Extensible Firmware Interface, a specification for the software program that connects a computer’s firmware to its operating system.

UEFI QEMU DVD-ROM

A UEFI-compatible DVD-ROM virtual device provided by QEMU, a hosted virtual machine monitor.

UUID (Universally Unique Identifier)

A 128-bit number used to uniquely identify some object or entity on the Internet. In this context, it identifies the specific ForensicVM instance that was deleted.

Virtual CD-ROM Drive

A simulated or software representation of a CD-ROM drive that allows the mounting and reading of ISO files as if they were physical discs.

Virtualization

The creation and management of virtualized instances of certain resources, in this context, forensic images.

Virtualize Tab

The main tab within the toolbar that provides access to core ForensicVM operations.

VM

Virtual machine - In computing, a virtual machine (VM) is the virtualization or emulation of a computer system. Virtual machines are based on computer architectures and provide the functionality of a physical computer. Their implementations may involve specialized hardware, software, or a combination of the two. Virtual machines differ and are organized by their function, shown here: System virtual machines (also called full virtualization VMs) provide a substitute for a real machine. They provide the functionality needed to execute entire operating systems. A hypervisor uses native execution to share and manage hardware, allowing for multiple environments that are isolated from one another yet exist on the same physical machine. Modern hypervisors use hardware-assisted virtualization, with virtualization-specific hardware features on the host CPUs providing assistance to hypervisors. (Reference: https://en.wikipedia.org/wiki/Virtual_machine)

VM Control

Options to manage the basic operations of the forensic virtual machine.

VM File (Virtual Machine File)

A file representing a virtual machine, which contains an OS, applications, and data, and can be executed on a hypervisor.

VM Image

A virtual disk image, which contains a virtual system’s disk data, used for creating replicas of or taking snapshots of original virtual disks.

vmdk

A disk file format used for virtual appliances developed for VMware products.

Volatility

An open-source memory forensics framework.

Web Interface

An interface accessible via a web browser where users can control the forensicVM.

Web Interface
  • Web Interface for Managing ForensicVM: A web-based platform from which users can manage and control the forensicVM. It offers different functionalities, including shutting down or stopping the machine.

  • Web Interface for Controlling ForensicVM: A web-based platform through which users can manage, control, and reset the forensicVM. It is accessible through a browser and might be preferable for remote operations or specific service interfaces.

Web Interface URL

The web address used to access the forensicVM’s browser-based interface.

Web Remote Screen / Web Remote Screen (Shutdown)
  • Web Remote Screen: A specific section of the web interface tailored for remote access. It allows users to remotely control and manage the forensicVM, providing options like shutting down the machine.

  • Web Remote Screen (Shutdown): A method to shut down the forensicVM when accessed remotely, offering flexibility for those working from distant locations or specific service interfaces.

Web Remote Screen Interface

A web-based interface allowing users to remotely control and manage the forensicVM. It can be accessed after logging in. It provides options to reset the machine, among other functionalities.

Web Screen Interface
  • Web Screen Interface: A web-based platform through which users can interact with and manage the forensicVM.

  • Web Screen Interface: An interface within the forensicVM that provides access to various settings including network configurations.

  • Web Screen Interface: A web-based interface that provides access to various functionalities, including the ability to eject and manage media within the ForensicVM.

Webscreen Console Main Area

A description of the main area in the ForensicVM Webscreen Console.

WebShell

A script that can be uploaded to a web server to enable remote administration of the machine.

WebShell for Remote Administration

A tool based on the shellinabox project adapted into a Django application that facilitates enhanced remote server administration, offering secure root access to the server.

WebShell Interface

The user interface that is presented upon accessing the WebShell, providing a direct and secure interaction with the server.

What-If Analysis

A series of hypothetical scenarios in forensic investigations, where investigators simulate actions to test different hypotheses.

WinDbg

Microsoft’s debugger used for debugging Windows applications and analyzing memory dumps.

Windows 10 or later

A version of the Microsoft Windows operating system. ForensicVM supports Windows 10 and its successors for running the Autopsy plugin.

Windows Explorer

The default file manager in Microsoft Windows operating systems that provides a graphical user interface for accessing the file system.

Windows Share

A feature in the Windows operating system that allows files and folders to be shared over a network.

Wireshark

A network protocol analyzer tool that captures network packets in real-time and displays them in a human-readable format for detailed analysis.

Wireshark pcap

A specific file format used to capture and store network packets for later analysis using tools like Wireshark. It is commonly used to capture and save network traffic data.

Wizard Interface

A user-friendly interface in software that guides users through a process step by step.

X-Ways Forensics

A commercial forensic software with strong memory analysis features.

ZIP File

A file format that allows for lossless data compression. It can contain multiple files or folders compressed into a single file.

List of Figures