Sunday, April 12, 2026

Forensic: Analysis Flash Disk with FTK Imager & Autopsy

 Scenario: We found a flashdiks on the road. Then we tried to investigate using FTK Imager and Autopsy.

Press enter or click to view image in full size
Digital Forensic Flow
FTK Imager and Autopsy
# Case Evidance Steps:
1. Create Image using FTK Imager
2. Analysis Image using Autopsy

# Download
1. FTK Imager: https://www.exterro.com/ftk-product-downloads/ftk-imager-version-4-7-1
2. Autopsy: https://github.com/sleuthkit/autopsy/releases/download/autopsy-4.17.0/autopsy-4.17.0-64bit.msi

1. FTK Imager

FTK Imager is a tool for previewing and creating images that we can use to test digital evidence. FTK imager can also do a perfect copy (forensic image) without changing the data or metadata of the original evidence.

Press enter or click to view image in full size
Click File Menu, then Select Create Disk Image
Select the source or device to be imaged
# Explanation:
- Physical Drive, for sources sourced from internal or external storage which will then be imaged as a whole from the storage.
- Logical Drive, for sources sourced from storage directories. For example, only imaging Local Disk C: / or Local Disk D: / and not the entire storage.
- File Image, for sources that come from a single file that is then imaged.
Press enter or click to view image in full size
Select Flashdisk and Finish
Select Add
Choose the Raw (dd) format
Fill in the imaging information on the Evidence form, then Next
Select the storage location of the imaging file and give the imaging file a name, then Finish
Click Start
Wait for the imaging and file verification process to complete

2. Autopsy

Autopsy application is an open source forensic platform that is easy to use, and is able to analyze all types of mobile devices as well as those of you who use PCs and laptops. The Autopsy application can run and be used on Operating Systems that use Linux and Windows. Autopsy application is an application that can find out hidden information from a file, starting from when the file was created, when the file was last changed, when the file was last accessed, when the file was deleted, this application uses what encryption, and what password.

Select New Case
Press enter or click to view image in full size
Fill in the Name case and select the location where the autopsy results will be stored.
Press enter or click to view image in full size
Fill in Optional Information, then Finish
Press enter or click to view image in full size
Select Disk Image, then Next
# Explanation:
- Disk Image, for files that have the *raw, *bin, *img, *e01 extension.
- Local Disk, for sources taken from the local disk of the connected device
- Logical File, for one specific file only
Press enter or click to view image in full size
Select the data source image, then next
Press enter or click to view image in full size
Select the information that will be required in configure ingest
Press enter or click to view image in full size
Wait for the add source to complete
Press enter or click to view image in full size
Result of Scanning Flashdisk
Press enter or click to view image in full size
The results of digital data retrieval using Autopsy there are the results of deleted files totaling 333 files
Press enter or click to view image in full size
There is a result of file metadata that has been deleted
Press enter or click to view image in full size
To recover deleted data, click extract files
Press enter or click to view image in full size
Right-click data sources-> Flasdisk.001-> View Summary Information

3. Conclusion

From the autopys results above, we can get some files that have been deleted before. By using these two applications, we can try some of the advantages of the application, one of which is finding lost files. Because every file or data that has been deleted will not always just disappear, there is a possibility that artifacts of a file or data are left behind.

Share: