Analyze disk images and file systems for digital evidence recovery in forensic investigations and CTF challenges. Use when the user mentions 'disk forensics,' 'forensic analysis,' 'disk image,' 'file carving,' 'deleted files,' 'evidence recovery,' 'autopsy,' 'sleuthkit,' or needs to examine a forensic image.
68
83%
Does it follow best practices?
Impact
—
No eval scenarios have been run
Passed
No known issues
Analyze disk images and file systems to recover evidence, reconstruct timelines, and identify artifacts.
Identify the image format and verify integrity:
file <image> # Identify format (E01, dd/raw, VMDK, VHD)
sha256sum <image> # Compare to provided hashFor E01 images, use ewfinfo to extract metadata.
Examine the partition structure:
fdisk -l <image> # Partition table
mmls <image> # Sleuth Kit partition layoutCalculate mount offsets: sector_start × sector_size
Mount read-only and survey the file system:
mount -o ro,loop,offset=<bytes> <image> /mnt/evidence
ls -laR /mnt/evidenceFor encrypted volumes, identify the encryption type and request the key/passphrase.
fsstat -o <offset> <image> # File system details
fls -r -o <offset> <image> # Full file listing (deleted files marked with *)
icat -o <offset> <image> <inode> # Extract specific file by inodeDeleted files: Use fls to find (marked with *), icat to extract by inode.
File carving: Run foremost or scalpel on unallocated space to recover files by header signatures.
Hidden data:
exiftool, binwalk, steghideSystem artifacts:
~/.mozilla, ~/Library/Safari, AppData\Local\Google/var/log/*, Windows Event Logsexiftool <file> # EXIF, XMP, IPTC metadata
stat <file> # MAC times (Modified, Accessed, Changed)For NTFS: examine $MFT timestamps and $UsnJrnl for change journal entries.
Use mactime (Sleuth Kit) to generate a unified timeline from body files.
strings <image> | grep -i <keyword> # Raw string search across imageUse bulk_extractor for automated extraction of emails, URLs, credit card numbers, and other structured data.
Collect all timestamps into a unified timeline. Cross-reference file events with log entries. Flag anomalies:
# Forensic Analysis Report
## Case: [identifier]
## Image: [filename] — SHA256: [hash]
## Date of Analysis: [date]
### Image Integrity
- Hash verified: [yes/no]
- Algorithm: [SHA256]
### Partition Layout
| # | Type | Start | Size | File System |
|---|------|-------|------|-------------|
### Key Findings
#### Finding 1: [Title]
- **Evidence:** [file path or artifact]
- **Content:** [description]
- **Timestamp:** [UTC]
- **Significance:** [why this matters]
### Recovered Files
| File | Source | Recovery Method | SHA256 | Significance |
|------|--------|-----------------|--------|-------------|
### Timeline
| Timestamp (UTC) | Event | Source | Notes |
|-----------------|-------|--------|-------|
### Conclusions
[Summary of findings and their implications]2400590
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.