Difficulty
unknown
Technologies
Difficulty
unknown
Technologies
Exercise designed to practice digital forensic analysis skills with Autopsy, based on the examination of a .E01 image obtained from a suspicious Windows system.
In this lab, you will simulate the role of a digital forensic analyst who receives a segmented .E01
image, previously created with FTK Imager on Windows.
ℹ️ If you want to learn how the
.E01
image was created, check the complementary article: How to Generate a Forensic .E01 Image with FTK Imager
Your objectives will be:
.E01
image. download hereOpen Autopsy and select "New Case".
Load the .E01
image as a disk image or VM file. You do not need to import each segmented image separately; just select the .E01
file and the rest will load automatically, as Autopsy detects all associated segments as long as they are in the same folder and have sequential names.
Run the following modules:
Explore artifacts such as: compressed files, recently opened files history, suspicious browsing, 7-Zip prefetch, recycle bin, and timeline.
Next, you must complete a structured report with your findings. Each section contains a brief explanation to help you write a clear, professional, and evidence-based presentation.
Write a general summary of the case. Include:
.E01
image) and how it was processed.Example:
A possible data leak committed by the internal userjohndoe
is analyzed. For this, a forensic.E01
image extracted from a Windows Server 2019 system is examined. The goal is to identify traces of sensitive file manipulation, compression, browsing to transfer sites, and possible evidence deletion.
List all tools used during your investigation. Include both forensic and complementary software.
Example:
Clearly describe the evidence found that indicates malicious or suspicious activity. Organize it into subsections:
backup.zip
).Reconstruct key events in chronological order. Use file metadata, prefetch, and recent activity.
Example:
11:55 – Sensitive file accessed from an unusual path 12:03 – Creation of a compressed file detected in a user folder 12:11 – Browsing activity to file transfer services 12:18 – Deletion actions recorded on the system 12:25 – Clean shutdown event recorded by the system
Write your conclusions as if presenting your report to a supervisor or client:
Avoid personal opinions: your analysis should be based on concrete evidence.
Include any additional resources that support your investigation:
The completed report must be submitted in PDF
format through the academy platform.
Difficulty
unknown
Technologies
Difficulty
unknown
Technologies
Difficulty
unknown
Technologies
Difficulty
unknown
Technologies
Difficulty
unknown
Technologies
Difficulty
unknown
Technologies