TryHackMe | Autopsy

Date

03/10/2025

Read Time

5 min read

Author

Tom Page

TryHackMe | Autopsy

Tags

TryHackMe Autopsy Windows Forensics

Article Content

After digging into Windows and Linux forensics, this room shifted gears and introduced me to Autopsy, a tool I'd heard of but never properly used. Unlike the command-line heavy Linux room, this one was all about working with a GUI, and I quickly learned that mastering the interface is just as much a skill as knowing which artefact to investigate.

Why Autopsy Matters

What struck me right away is that Autopsy doesn't just present raw data, it organises it. In Windows Forensics, for example, I had to manually hunt through registry hives. Autopsy, on the other hand, puts everything in one place with categories like “Deleted Files,” “Installed Programs,” and “Interesting Items.” This taught me that a big part of forensic work isn't only finding data, it's managing and interpreting it efficiently.

The Learning Curve of a GUI

My initial challenge wasn't with the forensics but the tool instead. Just like with Registry Explorer earlier, I spent a surprising amount of time figuring out where things were. Once I realised that Autopsy uses a case-based workflow (with its own file extension, .aut), it started to make sense. I now see why organisations lean on tools like this. When working with large disk images, having everything indexed and searchable is invaluable.

Artefacts Look Different, Lessons Stay the Same

Autopsy exposed me to a wide variety of artefacts, from deleted files to sticky notes to web search history. Although these look different from Windows registry keys or Linux logs, they still build upon the same skill, piecing together the fragments into a story. For example, seeing installed software, network shares, and search queries side by side gave me a better sense of how all these traces interact to describe user behaviour.

Timelines Tell Stories

The timeline feature was extremely useful. Instead of looking at artefacts in isolation, I could zoom in on a single day and see everything that happened: files opened, programs run, and searches performed. It is a tool to help visualise a complete timeline of when events happened and how they link together. It provided that in a tangible way that raw logs or registry values don't.

Challenges and Surprises

Not everything was smooth sailing. I struggled to locate specific files (Sticky Notes, in particular, gave me a hard time), and at times, I had to look for external guidance. But I see that as part of the process. What I realised is that even when tools are powerful, they won't always give you the answer, you still need persistence, focus, and sometimes a bit of creative searching.

What I Took Away

  • Learn the Workflow: Autopsy streamlines the analysis process, but it requires learning its workflow and structure first.
  • GUI Navigation: GUI-based tools don't remove complexity; they shift it from command syntax to navigation and interpretation.
  • Cross-Platform Skills: Artefacts may look different across Windows, Linux, and Autopsy cases, but the skill of building a timeline and narrative is constant.
  • Use Timelines: Timelines are one of the most powerful ways to transform isolated artefacts into a bigger picture of system behaviour.
  • Keep Trying: Struggling with searches reminded me that forensic work isn't about perfection; it's about persistence and learning from mistakes.

Final Thoughts

This room felt like my first real taste of professional forensic tooling. Where the earlier rooms taught me to dig into individual artefacts, Autopsy showed me how those pieces come together in a case-driven workflow. My biggest lesson here is that if in doubt, be methodical, stay curious, and that every trace contributes to the story a system is trying to tell.