TTP for DFIR Windows Incident Acquisition

I built this collection guide/walkthrough as:

  1. A reinforcement of knowledge from my GCFE course
  2. A future reference for myself and others on collection of Windows evidence from devices. All tools see here are free for download from vendor website.

This is just my personal method — if things could be improved upon I would love to hear from you on X. (Handle on About Page)

Disclaimer

Windows OS is constantly changing with weekly patches and major version updates. Methods and techniques will need to be adapted over time. I will inevitably miss stuff — it is on the individual to validate current best practices.

Tools

Methodology Overview

Triage Acquisition Step-by-Step Overview

We are going to reference the above diagram throughout this guide. Memorize it — it’s an excellent cheat sheet if you ever get lost.

NIST Chain of Custody Form for download:
https://www.nist.gov/document/sample-chain-custody-formdocx

custody example

1) Memory Collection

  1. Do we have the right to collect? Have you recieved authorization?
  2. Do we have ability to use LAPS or admin credentials if UAC is enforced?
  3. Connect Forensic Collection Drive.
  4. Execute DumpIt → write back to cases folder on drive.
  5. Memory folder structure tools UAC prompt for DumpIt DumpIt execution completion output
  6. Hash memory collection for integrity validation.
  7. Hashing the memory dump
  8. Document timestamp of collection start/finish.
  9. timeline

2) Check for Encryption

  1. Run EDD (Encrypted Disk Detector) or other encryption checker tool on device to check for BitLocker or other encryption. This will dictate our next actions.
EDD folder EDD UAC prompt EDD results

Does Encryption Exist?

If YES (system is encrypted)

The goal is to preserve access to the decrypted volume while power is on. I will be treating this lab as if the drive is encrypted when in reality it was not.

If NO (no encryption)

Kape Triage Image Steps

KAPE folder KAPE execution KAPE results KAPE results KAPE results KAPE results KAPE results

FTK Imager Logical Image Steps

FTK Imager logical start FTK logical imaging progress FTK verification FTK verification FTK verification FTK verification FTK verification FTK verification

Post-Collection

  1. Make copies of evidence and move copies to forensic workstation for processing.
  2. Before processing, pause and write:
    • Is there a list of questions to answer?
    • Is there a list of statements to validate?
  3. Doing this before diving straight into processing is cruial to one saving time, but also framing what you are looking for.

Example Actions to Investigate

Final Notes & Best Practices

Happy hunting!