# Folder structure

The Revealer Toolkit2 defines its own structure to organize the forensic cases. The main folder is refered as the morgue, and stores all the disk images and results of forensic analysis.

RVT2 can handle more that one morgue. By default, one morgue is defined at the location /morgue.

The morgue location, as well as its subfolders, can be custom defined within configuration files. However, some RVT modules rely on a predefined structure that allows to correlate differents forensics artifacts easily. It is advisable not to modify the structure beyond the morgue location itself and the images location.

Graphical representation of general folder structure.

# Cases

Each forensic case is by default determined by a case number and a case codename, separated by a dash. For example, 100101-ghost.

Each case has a folder assigned in the morgue, where all the forensic data is stored for each source.

# Sources

Under the Revealer Toolkit2, information sources are organized with:

  • Devices: each case has a number of devices: computers, cell phones, digital cameras, ... They are numbered sequencially from 01 to 99.
    A device is named as casenumber-devicenumber, for example, 100101-01 for the case 100101 and device 01.
  • Disks: each device has a number of disks: hard disks, CD’s, memory cards, ... They are numbered sequencially from 1 to 9.
    A disk is named as case-device-disknumber, for example, 100101-01-1, for the disk 1

# Images

The disk images are stored, in raw format, in a designed folder for every case inside the directory images.

# Source directory structure

The Revealer Toolkit2 manages and executes modules, which performs forensic operations on the disk images and disk information. All these forensic results are stored in the source directory the image is associated to. Each source generates three main folders: mnt, output and analysis.

Graphical representation of general directory structure.

# mnt

Location where disk partitions are mounted. Contents of each partition are stored in subfolders like p03, following the numeration used by the Sleuthkit command mmls.

Partitions with Windows filesystems may contain VShadow Snapshots. These are mounted with names such as v2p03, which in this case indicates the second vshadow snapshot of partition 3.

Some partitions requiere auxiliary mounting points (using mounted fusedevices with bindfs, vshadowmount or dislocker), and are stored inside aux subfolder. The contents still can be found in the subfolder corresponding to the partition name.

# output

Main folder with the results of automated extraction of various artifacts.

# output/timeline

Timeline for the all files found in every partitions of a disk (VShadow Snapshots excluded). The documents show paths, timestamps and other metadata associated to every file found in the filesystem.

# /output/browsers

Information about history, downloads, cookies, ... for all browsers found in every partition.

# output/indexer

Documents indexed in order to be used by searching services, such as Elastic.

# output/mail

Parsed data of mails found in disk, either individual or contained in bigger mail structures such as pst.

# output/string

Relation of all printable character sequences found in disk, also in the slack space.

# output/searches

Results of keyword searches against strings

# output/ios

Documents specifically related to IOS systems.

# output/linux

Documents specifically related to Linux systems.

# output/macos

Documents specifically related to MacOS systems.

# output/windows

Documents specifically related to Windows systems.

# output/windows/events

Information extracted from Windows event logs

# output/windows/execution

Information extracted from Windows artifacts such as prefetch, bam or rfc, associated with program and services executions.

# output/windows/hives

Information extracted from registry hives. Output files are organized depending on the type of information or hive parsed.

# output/windows/hibernation

Information obtained from hiberfil.sys.

# output/windows/i30

Parsing of I30 Index attributes, both in allocated and slack space.

# output/windows/recentfiles/

Information related to jumplists and lnk files found in disk.

# output/windows/recyclebin

Information about files found in RecycleBin.

# output/windows/srum

Information from the System Resource Usage Monitor (SRUM)

# output/windows/usb

Specific usb artifacts information, like usb_setupapi. More information on usb devices can be found in the registry and is stored under output/windows/hives.

# output/windows/usnjrnl

Folder with NTFS Journal dump, and a filter with ended journal processes.

# output/vss

All the information extracted from VShadow Snapshots. Follows a substructure based on output and windows folders. These subfolders contain the same information previously described, but applied only to VShadow Snapshots found.

# analysis

Contain general reports and other documents with selected information about different artifacts. This is a start point for analysis, since the reports are more descriptive than the raw information they are based on, found in output directory.

# analysis/events

Series of filtered information reports for some event logs.

# analysis/mails

Relation of metadata information about all mails found in disk.

# analysis/recentfiles

Documents containing selected data from jumplists and lnk files.

# analysis/searches

Location of pdf files describing the full results of searches against strings.

# Log file

RVT2 stores by default the logs of all executed jobs in a directory ${sourcedir}/log. The filename is the job identifier.

In addition, a list of the already executed jobs and their status can be found at ${casedir}/rvt2.jobs.json. You can also access to this information using the job status.