Generating computer forensic supertimelines under Linux: A comprehensive guide for Windows-based disk images

When the authors first published this paper, their intentions were to develop a comprehensive guide to digital forensic timelines in order to consolidate the many fragmented sources of information concerning this topic.  What they discovered, however, was that quality references were often challenging to find among various books, papers, periodicals, filesystem specifications and source code.

While conducting their research, they found that practical tool-based solutions existed for generating digital forensic timelines, though they each had specific limitations.  Thus, efforts were undertaken by the authors to provide an alternative timeline generation framework.  Although some in the community had already proposed the use and generation of supertimelines, all too often important data sources were being left out.  In order to rectify this, it became necessary to couple additional tools in order to provide maximum evidentiary extraction.

Even though the leading date/time extraction software, The Sleuth Kit (TSK) and Log2timeline (and timescanner) are excellent tools in their own right, they require each other in order to create supertimelines.  Whereas Log2timeline’s timescanner provides automated disk image processing capabilities, it nonetheless has certain difficulties handling specific supported file formats.  As such, the authors’ proposed framework combines the best features of TSK, Log2timeline (while avoiding timescanner), additional date/time extraction software and shell scripting to deliver an improved supertimeline generation framework.  The proposed framework is largely automated once the correct parameters have been provided to the script.  Though it does not support all the same datasets as Log2timeline, this prototype can be readily augmented to provide the same dataset functionality as Log2timeline.  The proposed prototype, although specifically written for handling Windows-based disk images, could be readily modified to support various other filesystem formats.

The forensic investigator, equipped with the various in-depth sources of information provided by the authors’ paper, coupled with the prototype supertimeline generation script, should provide sufficient timeline generation capability for most Windows-based disk investigations.

Click here for the report: Generating computer forensic supertimelines under Linux – A comprehensive guide for Windows-based disk images.pdf


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.

All Shell (Bash) and C source code are persuant to the following Disclaimer and Licensing Agreement.  Use of this prototype code assumes that the user/reader agrees to the conditions set forth and is bound by them,  If the user/reader does not agree, do not use the code.

Click here for the Bash script timeline.sh.

Click here C code file_name_type_line_parser.c.

Click here for C code find_signature_evtlog.c.

Click here for C code unixtime_to_systime.c.

5 thoughts on “Generating computer forensic supertimelines under Linux: A comprehensive guide for Windows-based disk images”

  1. Hi, very good paper.
    I coud not find where to download bash and c sources published in the pdf.
    Document line numbers and formatting makes it a pain to edit the pasted text.
    Piero

  2. Hi very good article and tool, but…I saw that you hardcoded this “-z EST5EDT” into bash script…why did not you parameterize it?
    Not all the people live in Eastern Coast of USA 😀
    Thank you

    • Hi Nannib,

      Glad you liked the article and I hope the script works out for you.

      I left the timezone hardcoded as EST5EDT since I needed it as my default timezone for some investigative work I had to do. I figured others could always make additional changes to the script. But I admit that by the time I got the whole thing written, working, tested, peer-reviewed … I really didn’t want to make any more changes to it (I got a bit lazy).

      Cheers.

Leave a Comment

Latest Videos

Digital Forensics News Round Up, March 27 2024 #dfir #digitalforensics

Forensic Focus 22 hours ago

Digital Forensics News Round-Up, March 21 2024 #digitalforensics #dfir

Forensic Focus 21st March 2024 6:15 pm

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feeds settings page to add an API key after following these instructions.

Latest Articles