πŸ”¬ Master SOP β€” Digital Forensics Workflow: Imaging β†’ Analysis β†’ Recovery

Environment: Bare-Metal / Live USB (SystemRescue, Kali Linux, Paladin) Status: Production Ready Target: HDD, SSD, NVMe, USB Flash, Memory Cards, Mobile Devices Goal: Forensic Soundness ↔️ Evidence Integrity ↔️ Maximum Data Recovery


🚦 FASE 0: Chain of Custody & Evidence Seizure

Prinsip Utama: β€œNever work on original evidence. Always create forensic image first.”

0.1 Pre-Acquisition Triage

Dokumentasikan kondisi fisik dan logis sebelum sentuhan apapun.

# 1. Catat waktu, lokasi, dan identitas penyita
# 2. Foto kondisi fisik device (port, label, kerusakan)
# 3. Catat apakah device ON atau OFF saat ditemukan
 
# 4. Jika device HIDUP β†’ Lakukan Live Acquisition (Volatile Data)
#    - RAM Dump (Critical! Data volatile hilang saat mati)
#    - Network connections, running processes, open files
#    - Encrypted volumes yang sedang mounted

0.2 Write-Blocking & Hardware Protection

WAJIB gunakan write-blocker hardware sebelum colok ke workstation.

Write-BlockerInterfaceCatatan
Tableau T35uSATA/USB 3.0Gold standard forensik
WiebeTech USB 3.0Multi-interfacePortable, field-ready
CRU DittoSAS/SATA/NVMeEnterprise-grade
Soft Block (Linux)Emergency onlyblockdev --setro /dev/sdX
# Verifikasi write-block aktif (Soft block emergency)
blockdev --getro /dev/sdX
# Output harus: 1 (read-only)
 
# Jika belum read-only, SET SEKARANG!
blockdev --setro /dev/sdX

0.3 Evidence Labeling & Hashing Baseline

# Generate hash dari device asli SEBELUM imaging
sha256sum /dev/sdX > evidence_sha256_original.txt
md5sum /dev/sdX > evidence_md5_original.txt
 
# Format penamaan evidence
# EVIDENCE_[CASE-ID]_[YYYYMMDD]_[ITEM-NO]_[INVESTIGATOR]
# Contoh: EVIDENCE_CYB2026_0428_001_AZHAR

πŸ›‘οΈ ALUR A: Forensic Imaging (Bit-for-Bit Copy)

Tujuan: Membuat duplikat forensik yang identik 100% dengan original.

FASE A1: Imaging Level 1 β€” Raw Image (.dd / .raw)

Cocok untuk: HDD/SSD kecil, kasus sederhana, tool universal.

# 1. Buat direktori evidence
mkdir -p /mnt/evidence/CASE-2026-001/
 
# 2. Imaging dengan dd (Basic, tidak resume)
dd if=/dev/sdX of=/mnt/evidence/CASE-2026-001/disk_image.dd bs=64K status=progress
 
# 3. Imaging dengan dc3dd (Forensic-grade, hashing on-the-fly)
dc3dd if=/dev/sdX of=/mnt/evidence/CASE-2026-001/disk_image.dd   hash=md5 hash=sha256 log=/mnt/evidence/CASE-2026-001/imaging.log
 
# 4. Imaging dengan dcfldd (Logging & progress bar)
dcfldd if=/dev/sdX of=/mnt/evidence/CASE-2026-001/disk_image.dd   bs=512 hash=sha256 hashlog=/mnt/evidence/CASE-2026-001/hash.log

FASE A2: Imaging Level 2 β€” Advanced Recovery (Bad Sector Handling)

Cocok untuk: Drive rusak, bad sector, sering hang, clicking sound.

# 1. ddrescue β€” Raja imaging drive rusak (BISA RESUME!)
ddrescue -f -n /dev/sdX /mnt/evidence/CASE-2026-001/disk_image.dd   /mnt/evidence/CASE-2026-001/rescue.log
 
# 2. Retry sektor yang gagal (pass kedua, lebih agresif)
ddrescue -d -r3 /dev/sdX /mnt/evidence/CASE-2026-001/disk_image.dd   /mnt/evidence/CASE-2026-001/rescue.log
 
# 3. ddrescue dengan splitting (untuk drive BESAR >2TB)
ddrescue -c 4096 -b 512 -f -n /dev/sdX image_part1.dd rescue1.log
# Lanjutkan part berikutnya jika perlu

FASE A3: Imaging Level 3 β€” Enterprise & Mobile

Cocok untuk: RAID arrays, Logical Volume, Mobile forensics.

# 1. E01 Format (EnCase) β€” Compressed + CRC + Metadata
ewfacquire /dev/sdX -t /mnt/evidence/CASE-2026-001/disk_image   -C case2026 -D "Evidence HDD" -e "Azhar" -b 64 -c best -S 1.5GiB
 
# 2. AFF4 Format β€” Next-gen forensic format (Volatility compatible)
aff4imager -i /dev/sdX -o /mnt/evidence/CASE-2026-001/disk_image.aff4
 
# 3. Mobile Device Imaging (ADB untuk Android)
adb backup -apk -shared -all -f /mnt/evidence/CASE-2026-001/mobile_backup.ab
# Untuk iOS: gunakan iTunes backup + GrayKey/Cellebrite

FASE A4: Verification & Integrity Check

# 1. Hash image yang sudah jadi
sha256sum /mnt/evidence/CASE-2026-001/disk_image.dd > image_sha256.txt
 
# 2. Bandingkan dengan hash original
diff evidence_sha256_original.txt image_sha256.txt
# Harus IDENTIK! Jika beda β†’ imaging gagal, ulangi.
 
# 3. Mount image read-only untuk verifikasi
mkdir -p /mnt/verify
mount -o ro,loop /mnt/evidence/CASE-2026-001/disk_image.dd /mnt/verify
ls -la /mnt/verify
umount /mnt/verify

πŸ” ALUR B: Forensic Analysis (Investigasi Image)

Prinsip: β€œAnalysis dilakukan pada IMAGE, bukan original device.”

FASE B1: File System Analysis

# 1. Identifikasi file system & partisi
file /mnt/evidence/CASE-2026-001/disk_image.dd
fdisk -l /mnt/evidence/CASE-2026-001/disk_image.dd
mmls /mnt/evidence/CASE-2026-001/disk_image.dd
 
# 2. Mount image dengan offset (jika ada multiple partitions)
kpartx -av /mnt/evidence/CASE-2026-001/disk_image.dd
# Output: loop0p1, loop0p2, dll
 
# 3. Mount partisi spesifik (READ-ONLY!)
mkdir -p /mnt/analysis/p1
mount -o ro,loop,offset=1048576 /mnt/evidence/CASE-2026-001/disk_image.dd /mnt/analysis/p1
# Offset didapat dari `mmls` atau `fdisk -l` (start sector Γ— 512)

FASE B2: Automated Analysis Tools

ToolFungsiUse Case
AutopsyGUI forensik lengkapTimeline analysis, keyword search, file carving
Sleuth Kit (TSK)CLI forensikfls, ils, icat untuk analisis file system
VolatilityMemory forensicsAnalisis RAM dump: process, network, malware
Plaso / log2timelineTimeline super-detailedRekonstruksi aktivitas per-detik
Bulk ExtractorScan cepatEmail, CC, URL, SSN dari seluruh image
PhotoRecFile carvingRecovery file tanpa metadata (header/footer)
ScalpelFile carving (custom)Definisi header/footer sendiri
ForemostFile carving (predefined)Recovery file umum: jpg, doc, pdf
# 1. Sleuth Kit β€” List deleted files
fls -r -p /mnt/evidence/CASE-2026-001/disk_image.dd > deleted_files.txt
 
# 2. Bulk Extractor β€” Scan semua data sensitif
bulk_extractor -o /mnt/analysis/bulk_out/ /mnt/evidence/CASE-2026-001/disk_image.dd
 
# 3. PhotoRec β€” Carving file (tanpa nama file & folder)
photorec /d /mnt/analysis/recovered_files /mnt/evidence/CASE-2026-001/disk_image.dd
 
# 4. Foremost β€” Carving dengan predefined types
foremost -t jpg,pdf,doc,zip -i /mnt/evidence/CASE-2026-001/disk_image.dd   -o /mnt/analysis/foremost_out/
 
# 5. Strings analysis (untuk data mentah)
strings -n 8 /mnt/evidence/CASE-2026-001/disk_image.dd | grep -i "password\|secret\|key" > strings_analysis.txt

FASE B3: Timeline & Metadata Analysis

# 1. log2timeline β€” Buat timeline super detailed
log2timeline.py /mnt/analysis/timeline.plaso /mnt/evidence/CASE-2026-001/disk_image.dd
 
# 2. psort β€” Sort & filter timeline
psort.py -z "Asia/Jakarta" -o l2tcsv /mnt/analysis/timeline.plaso > timeline.csv
 
# 3. ExifTool β€” Analisis metadata file
exiftool -r /mnt/analysis/p1/ > metadata_report.txt
 
# 4. Analyze MFT (NTFS Master File Table)
analyzeMFT.py -f /mnt/evidence/CASE-2026-001/disk_image.dd -o mft_analysis.csv

FASE B4: Keyword Search & Pattern Matching

# 1. grep dengan regex (case-insensitive)
grep -rai "password\|passwd\|secret\|token\|api_key" /mnt/analysis/p1/ > keyword_hits.txt
 
# 2. YARA β€” Pattern matching malware/IOC
yara -r /rules/malware_rules.yar /mnt/analysis/p1/ > yara_hits.txt
 
# 3. Regular Expressions (CC, email, phone)
grep -roE "[0-9]{4}[[:space:]]?[0-9]{4}[[:space:]]?[0-9]{4}[[:space:]]?[0-9]{4}" /mnt/analysis/p1/ > cc_numbers.txt

πŸ”„ ALUR C: Data Recovery (Dari Image atau Drive Langsung)

Catatan: Recovery dari IMAGE lebih aman. Recovery langsung hanya jika image gagal dibuat.

FASE C1: Logical Recovery (File System Intact)

# 1. TestDisk β€” Recovery partisi & file yang terhapus
testdisk /mnt/evidence/CASE-2026-001/disk_image.dd
# Pilih: [Intel] β†’ [Analyse] β†’ [Quick Search] β†’ [Deeper Search] β†’ [List] β†’ Copy files
 
# 2. R-Studio (via Wine/Linux) β€” Recovery GUI powerful
# atau gunakan PhotoRec untuk recovery tanpa struktur folder
 
# 3. Extundelete β€” Recovery file ext3/ext4 yang terhapus
extundelete /mnt/evidence/CASE-2026-001/disk_image.dd --restore-all

FASE C2: Physical Recovery (Drive Rusak / Firmware Corrupt)

# 1. Jika drive terdeteksi tapi tidak bisa diakses β†’ Firmware issue
#    Gunakan: PC-3000 (Rusia) atau Dolphin (China) untuk firmware repair
 
# 2. Jika drive clicking / not spinning β†’ Hardware failure
#    Bawa ke clean room untuk head swap / platter transplant
 
# 3. Jika bad sector parah β†’ ddrescue (lihat FASE A2)

FASE C3: DVR / CCTV Video Recovery

# 1. Dolphin Data Lab β€” Spesialis recovery video DVR
#    - Support 99% merek DVR: Hikvision, Dahua, XMeye, dll
#    - Bisa recovery video yang ter-overwrite (loop recording)
#    - Deep scan untuk fragmentasi video khusus DVR
 
# 2. PC-3000 + Video Recovery plugin
#    - Untuk DVR yang menggunakan harddisk standar
#    - Firmware repair + file carving video
 
# 3. Manual hex analysis (last resort)
#    - Cari signature video: H264, H265, MPEG4
#    - Reconstruct fragments secara manual

πŸ“Š Reporting & Chain of Custody Closure

Format Laporan Forensik

═══════════════════════════════════════════════════════════════
FORENSIC ANALYSIS REPORT
Case ID: [CASE-2026-001]
Investigator: [Nama]
Date: [YYYY-MM-DD]
═══════════════════════════════════════════════════════════════

1. EVIDENCE INFORMATION
   - Device Type: [HDD/SSD/NVMe/Mobile]
   - Capacity: [Size]
   - Serial Number: [SN]
   - Condition: [Physical/Labelling]

2. ACQUISITION DETAILS
   - Method: [dd/dc3dd/ddrescue/ewfacquire]
   - Image Path: [Path]
   - Hash Original: [SHA256]
   - Hash Image: [SHA256]
   - Integrity: [VERIFIED / FAILED]

3. ANALYSIS FINDINGS
   - File System: [NTFS/ext4/APFS]
   - Deleted Files: [Count]
   - Recovered Files: [Count]
   - Keywords Found: [List]
   - Timeline: [Summary]

4. CONCLUSION
   - [Summary of findings]

5. ATTACHMENTS
   - Hash logs
   - Timeline CSV
   - Screenshots
═══════════════════════════════════════════════════════════════

⚠️ Pro-Tips & Anti-Patterns

❌ Janganβœ… Lakukan
Mount original device RWSelalu mount read-only atau pakai write-blocker
Skip hashingHash sebelum & sesudah imaging WAJIB
Kerja langsung di drive rusakAlways imaging dulu, analysis dari image
Lupa catat Chain of CustodyDokumentasikan setiap sentuhan
Panik saat I/O errorGunakan ddrescue, sabar, bisa resume
Recovery tanpa backup imageImage dulu, recovery dari image

Thermal & Handling

  • Suhu aman HDD saat imaging: < 45Β°C
  • Jika > 50Β°C: Hentikan, dinginkan dengan fan, lanjutkan
  • Click of Death: STOP! Jangan force spin-up, bawa ke lab

Forensic Golden Rule: "You only get ONE chance with original evidence. Do it right the first time."