X-Ways Software Technology AG. X-Ways Forensics
|
|
|
- Oswald Evan Skinner
- 9 years ago
- Views:
Transcription
1 X-Ways Software Technology AG X-Ways Forensics Integrated Computer Forensics Environment Advanced Data Recovery and IT Security Software in English, German, French, Spanish, Italian, and Portuguese Complete case management X-Ways Forensics manages your cases separately and will allow you to identify all sources and pieces of evidence related to your case. It creates a tree-like structure for each of your cases where you can freely add drives, images and any other file. For every item, notes and pieces of evidence found will be recorded separately. Automated activity logging (audit logs) Logging of all activity is enabled by default. This can be helpful when backtracking your steps if you have to interrupt your work and take it up again some time later. Since every action will be recorded, use this to show the integrity of your evidence collection methods. Automated reports in HTML format The automated activity logging will also allow you to generate a report from your audit using the descriptions you have entered and the steps you have taken. All your actions will be listed sorted by sources of evidence and including the results generated. This reporting feature saves you from the hassle of having to write your reports from your notes taken during the process. Refine the report by importing the HTML output into any application that supports HTML imports, like Microsoft Word or OpenOffice.org. Protection against accidental changes to the evidence objects X-Ways Forensics does not allow any changes to evidence objects at all. Only files created in the current case s output or temp directories can be modified using X-Ways Forensics, thus enforcing common forensic procedure. WinHex, using a forensic licence, will be able to switch to edit modes, but will first ask the user to explicitly confirm this change to ensure no accidental change occurred. View of all existing and deleted files on media by file type category X-Ways Forensics supports the approach of looking for specific file types beyond looking for one file extension at a time. Many times, forensic examiners are specifically looking for office documents, but not specifically Word files, or for image files regardless of the actual type. X- Ways Forensics can create a drive contents table that disregards the actual directory structure of the file system and instead uses predefined categories like images, office or Internet. These categories are fully customizable by the user. Gallery view for pictures 1
2 X-Ways Forensics offers a gallery view on image files contained in directories or the images category of the drive contents table. Viewing thumbnails of the images notably speeds up the search process for relevant images. Supported file types for the gallery view are JPEG, JPEG 2000, GIF, TIFF, Bitmap, PNG, TGA, PCX, WMF, EMF, MNG and JBG. File Viewing Select multiple files in the directory browser for viewing. For display in the integrated viewer, a file does not even need to be extracted internally from a hard disk partition or image file first. If the integrated viewer cannot open the file, it will invoke an external viewer. Up to 3 different external programs can be defined and invoked directly. The internal view supports various image file formats as well as Windows Registry files. Skin color detection In cases related to child pornography, it is clear from the start that relevant images most likely contain a notable amount of skin colors. To accelerate the examiner s search for images with potentially relevant content, X-Ways Forensics features an option to sort images by skin color percentage. Detection of filename/file type mismatches X-Ways Forensics is aware of attempts to hide relevant files by renaming them to innocuous looking files using a different extension. For example, a JPEG image file might be located in the Windows directory named sys782.dll, making it virtually impossible for the human examiner to notice the illegitimate content of this file. In order to draw attention to such obvious cases of information hiding, X-Ways Forensics allows the creation of drive contents tables that specifically mark any file whose header does not match its extension. File system examination Native support for FAT12, FAT16, FAT32, and NTFS, shortly also for Ext2, Ext3, ReiserFS, and CDFS. Ability to read EnCase images Forensic experts might have used EnCase to create an image for their forensic examination. X- Ways Forensics can add such EnCase images to a case and examine them like any other source of evidence. Detection of host-protected areas (HPA), a.k.a. ATA-protected areas One of the most sophisticated methods of hiding information on a hard drive is to change the size the hard drive reports to the operating system. This way, a 100 GB disk changed to 80 GB contains 20 GB of hidden storage space. These so-called host-protected or ATA-protected areas are discovered by X-Ways Forensics and brought to the examiner s attention. Disk Editor, File Editor, RAM Editor WinHex, the technical core of X-Ways Forensics, is an advanced binary editor that provides access to all files, clusters, sectors, bytes, nibbles, and bits inside your computer. It supports virtually unlimited file and disk sizes up to the terabyte region (thousands of gigabyte)! Memory usage is minimal. Speed of access is top-notch. 2
3 Directory Browser for FAT & NTFS Similar to and as easy to use as the Windows Explorer's right-hand list. This browser lists existing as well as deleted files and directories, with all details. Allows to list cluster chains, to navigate to files and directories in the disk editor, and to copy files off the drive. Works on image files and partitions even if not mounted in Windows. Disk Cloning/Disk Imaging under DOS and Windows X-Ways Forensics produces exact sector-wise copies of most media types, either to other disks (clones, mirrors) or to image files, using physical or logical disk access. Very important for forensic examiners because it allows to work on a forensically sound duplicate. Image files can optionally be compressed or split into independant archives. X-Ways Forensics can silently generate log files that will note any damaged sector it encounters during cloning. All readable data will make it into the mirror. X-Ways Forensics lets you check the integrity and authenticity of image files before restoring them. Besides, a simple DOS-based hard disk cloning tool is included. Most Windows environments tend to access a newly attached drive without asking, thereby e.g. altering the last access dates of some files. This is avoided under DOS. X-Ways Replica Hard Drive Cleansing/Disk Wiping X-Ways Forensics can quickly fill every sector of a disk with zero bytes (or in fact any byte pattern you like, even random bytes), as often as you like (to maximize security). This effectively removes any traces of files, directories, viruses, proprietary and diagnostic partitions, etc. X-Ways Forensics can also securely erase specific files or unused space on a drive only. Besides, you can fill sectors with a byte pattern that stands for an ASCII string such as Bad Sector on the destination disk before cloning: This will make those parts of the destination disk easily recognizable that have not been overwritten during cloning because of unreadable (physically damaged) source sectors or because of a smaller source drive. (Alternatively, unreadable source sectors can be written using a pattern of your choice on the destination disk.) File Slack Capturing Slack space occurs whenever a file's size is not evenly divisible by the cluster size (which is practically always the case). The unused end of the last cluster allocated to a file still contains traces of other, previously existing files, and often reveals leads and evidence. X-Ways Forensics gathers slack space in a file, so you can examine it conveniently and coherently. Specialist Gather Slack Space Unused Space Capturing Unused clusters, currently not allocated to any file or directory, also may still contain traces of other, previously existing files. X-Ways Forensics can gather free space in a file, too, for later examination. Specialist Gather Free Space Inter-Partition Space Capturing Gathers all space on a hard disk that does not belong to any partition in a file, for quick inspection to find out if something is hidden there or left from a prior partitioning. Specialist Gather Inter- Partition Space 3
4 Text Capturing Recognizes and gathers text from a file, a disk, or a memory range in a file. This kind of filter is useful to considerably reduce the amount of data to handle e.g. if you are looking for leads in the form of text, such as messages, documents, etc. The target file can easily be split at a userdefined size. Drive Contents Table Creates a table of existing and deleted files and directories, with user-configurable information such as attributes, all available date & time stamps, size, number of first cluster, hash codes, NTFS alternate data streams (which contain hidden data), etc. Extremely useful to systematically examine the contents of a disk. Allows to limit the search for files of a certain type using a filename mask (e.g. *.jpg). The resulting table can be imported and further processed by databases or MS Excel. Sorting by date & time stamps will result in a good overview of what a disk has been used for at a certain time. E.g. the NTFS attribute encrypted might quickly reveal what files may turn out to be the most important ones in a forensic analysis. The drive contents table can also be generated against a hash database of either know good files or malware to include or exclude files, respectively. Supported hash database formats are NSRL RDS 2.x, ILook, and HashKeeper. During drive contents table generation, a database can also be created in NSRL RDS 2.x format. CD Raw Mode Raw mode for reading Audio CDs and for access to the full 2352-byte sectors on data CDs (CD- ROM and Video CDs), including error correction codes. NTFS Compression Support Access, open, recover, and examine files that are compressed at the NTFS file system level. They are decompressed transparently to the user "on the fly" when needed. Media Details Report Shows information about the currently active disk or file and lets you copy it e.g. into a report you writing. Most extensive on physical hard disks, where details for each partition and even unallocated gaps between existing partitions are pointed out. Interpret Image File As Disk Treats a currently open and active disk image file as either a logical drive or physical disk. This is useful if you wish to closely examine the file system structure of a disk image, extract files, etc. without copying it back to a disk. If interpreted as a physical disk, X-Ways Forensics can access and open the partitions contained in the image individually as known from real physical hard disks. X-Ways Forensics is even able to interpret spanned image files, that is, image files that consist of separate segments of any size. For X-Ways Forensics to detect a spanned image file, the first segment may have an abritrary name and a non-numeric extension or the extension.000. The second segment must have the same base name, but the extension.001, the third segment.002, and so on. The DOS cloning tool X-Ways Replica is able to image disks and produce such file segments. This is useful because the maximum image file size supported by FAT16 and FAT32 is 2 GB or 4 GB, respectively. 4
5 Bates-Number Files Bates-numbers all the files within a given folder and its subfolders for discovery or evidentiary use. A prefix (up to 13 characters long) and a unique serial number are inserted between the filename and the extension in a way attorneys traditionally label paper documents for later accurate identification and reference. Data Interpreter Knows all integer types, floating-point types, date formats, and more. (Details) Data Analysis Find out what kind of binary data you are dealing with. (Details) Binary Search/Text Search Search for any data you can imagine, specified in hexadecimal, ASCII, or EBCDIC, in both directions, even generic text passages hidden within binary data. X-Ways Forensics can either stop at each occurrence, or simply log the results, aborting only when prompted or if the end of disk is encountered. This is particularly useful for locating certain keywords for investigative purposes. X-Ways Forensics can also ignore read errors during searches, which proves useful on physically damaged media. Simultaneous Search Specialist Simultaneous Search. A parallel search facility, that lets you specify a virtually unlimited list of search terms, one per line. The search terms are searched simultaneously, and their occurrences can be archived either in the Position Manager, or in a tab-delimited text file, similar to the disk catalog, which can be further processed in MS Excel or any database. X-Ways Forensics will save the offset of each occurrence, the search term, the name of the file or disk searched, and in the case of a logical drive the cluster allocation as well! (i.e. the name and path of the file that is stored at that particular offset, if any) That means you are now able to systematically search multiple hard drives and image files in a single pass for words like street synonyms for drugs, alternative spellings, names of known dealers, at the same time! This will help to narrow down the examination to a list of files upon which to focus. Scripting Using tailored scripts you are able to automate routine steps in your investigation. For example, you may want to concatenate searches for various keywords, or repeatedly save certain clusters into files on other drives, or execute any long-running or toilsome operations while you are absent. Position Manager Save logged occurrences of search strings or otherwise important addresses within files or disks as bookmarks for later use. Archive bookmark collections as dedicated position files or export them as HTML tables (for use in MS Excel etc.). They are also automatically included in the case report. Checksums, CRC16, CRC32, MD5, SHA-1, SHA-256, PSCHF X-Ways Forensics can calculate several kinds of checksums and hash values of any file, disk, 5
6 partition, or any part of a disk, even 256-bit digests, for the most suspicious ones. In particular, the MD5 message digest algorithm (128-bit) is incorporated, which produces commonly used unique numeric identifiers (hash values). The hash value of a known file can be compared against the hash value of an unknown file on a seized computer system. Matching values indicate with statistical certainty that the unknown file on the seized system has been authenticated and therefore does not need to be further examined. Data Recovery With its sophisticated disk editor, X-Ways Forensics not only provides for manual file recovery. X-Ways Forensics is also able to automatically recover files. There are three data recovery mechanisms integrated: 1. File Recovery by Name : Simply specify one or more file masks (like *.gif, John*.doc, etc.) and let X-Ways Forensics do the rest. Works on FAT12, FAT16, FAT32, and NTFS. It can also simply list found files in the directory browser for inspection, without actually recovering them yet. 2. File recovery by type: X-Ways Forensics can recover all files that can be recognized by a certain file header. Support file types: jpg, png, gif, tif, bmp, dwg, psd, rtf, xml, html, eml, dbx, xls/doc, mdb, wpd, eps/ps, pdf, qdf, pwl, zip, rar, wav, avi, ram, rm, mpg, mpg, mov, asf, mid. This works on all file systems, even on raw physical disks with no healthy file system at all. The recovery can be limited to a certain range of sectors simply by selecting a block prior to using it. (Details) 3. There is a special automatic recovery mode for FAT drives, accessible via the Access button menu, which is able to re-create entire nested directory structures. (Details) Partition Recovery/Boot Record Recovery X-Ways Forensics lets you edit FAT12, FAT16, FAT32, and NTFS boot sectors as well as partition tables using tailored templates. Pricing: Base license: EUR / USD 305 Each additional license: EUR / USD 195 (subject to change) 6
7 About X-Ways X-Ways Software Technology AG Web: Carl-Diem-Str. 32 Product homepage: Bünde Ordering: Germany Support forum: Fax: address: X-Ways Software Technology AG is a stock corporation incorporated under the laws of the Federal Republic of Germany. WinHex was first released in X-Ways Forensics 11.7 was released in September X-Ways Forensics runs on Windows 95, 98, Me; Windows NT 4.0, Windows 2000, and Windows XP. Further reading: WinHex manual ( Excerpt from our customer list (referenced by name with permission): law enforcement and government agencies (e.g. the German national customs investigation service, the Australian Department of Defence), particularly in the USA, military units in various NATO countries, national institutes (e.g. the Oak Ridge National Laboratory in Tennessee), the Technical University of Vienna, the Technical University of Munich (Institute of Computer Science), the German Aerospace Center, the German federal bureau of aviation accident investigation, Microsoft Corp., Hewlett Packard, Toshiba Europe, Siemens AG, Siemens Business Services, Siemens VDO AG, Infineon Technologies Flash GmbH & Co. KG, Ontrack Data International Inc., KPMG Forensic, Ernst & Young, Ericsson, National Semiconductor, Lockheed Martin, BAE Systems, TDK Corporation, Seoul Mobile Telecom, Visa International, and many other companies. Related products: WinHex The core of X-Ways Forensics Evidor Electronic evidence acquisition X-Ways Trace Browser log files deciphered Davory Data recovery made easy X-Ways Replica Disk cloning under DOS X-Ways Security Reliable erasure 7
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR Supervised by : Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT)-Jordan X-Ways Software Technology AG is a stock corporation
COMPUTER FORENSICS. DAVORY: : DATA RECOVERY
COMPUTER FORENSICS. DAVORY: : DATA RECOVERY Supervised By: Dr. Lo ai Tawalbeh New York Institute of Technology (NYIT)-Amman-2006 TOPICS Definition Recovery from what?? Davory SOFTWARE. Restore Software.
Excerpts from EnCase Introduction to Computer Forensics
Guidance Software, Inc. 572 East Green Street #300 Pasadena, CA 91101 Tel: (626) 229-9191 Fax: (626) 229-9199 e-mail: [email protected] web: www.guidancesoftware.com Excerpts from EnCase Introduction
2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.
Acquisition and Tools COMP 2555: Principles of Computer Forensics Autumn 2014 http://www.cs.du.edu/2555 1 Planning Your Investigation! A basic investigation plan should include the following activities:!
Digital Forensics. Tom Pigg Executive Director Tennessee CSEC
Digital Forensics Tom Pigg Executive Director Tennessee CSEC Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze
X-Ways Capture. The program executes the following steps unless you specify a different procedure in the configuration file:
Executive Summary X-Ways Capture Specialized computer forensics tool for the evidence collection phase of a forensic investigation that captures Windows and Linux live systems. X-Ways Capture employs various
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
Active @ UNDELETE Users Guide
Active @ UNDELETE Users Guide Contents 2 Contents Legal Statement...5 Active@ UNDELETE Overview... 6 Getting Started with Active@ UNDELETE... 7 Active@ UNDELETE Views And Windows... 7 Recovery Explorer
Active @ UNDELETE Users Guide
Active @ UNDELETE Users Guide Contents 2 Contents Legal Statement...5 Active@ UNDELETE Overview... 6 Getting Started with Active@ UNDELETE... 7 Active@ UNDELETE Views And Windows... 7 Recovery Explorer
Digital Forensics. Module 4 CS 996
Digital Forensics Module 4 CS 996 Hard Drive Forensics Acquisition Bit for bit copy Write protect the evidence media EnCase for DOS Safeback (NTI: www.forensics-intl.com) Analysis EnCase FTK (www.accessdata.com)
VX Search File Search Solution. VX Search FILE SEARCH SOLUTION. User Manual. Version 8.2. Jan 2016. www.vxsearch.com [email protected]. Flexense Ltd.
VX Search FILE SEARCH SOLUTION User Manual Version 8.2 Jan 2016 www.vxsearch.com [email protected] 1 1 Product Overview...4 2 VX Search Product Versions...8 3 Using Desktop Product Versions...9 3.1 Product
User Guide. Laplink Software, Inc. Laplink DiskImage 7 Professional. User Guide. UG-DiskImagePro-EN-7 (REV. 5/2013)
1 Laplink DiskImage 7 Professional Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/contact E-mail: [email protected] Laplink Software, Inc. 600 108th Ave.
Microsoft Vista: Serious Challenges for Digital Investigations
Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 2 nd, 2008 Microsoft Vista: Serious Challenges for Digital Investigations Darren R. Hayes and Shareq Qureshi Seidenberg School of
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
1. Digital Asset Management User Guide... 2 1.1 Digital Asset Management Concepts... 2 1.2 Working with digital assets... 4 1.2.1 Importing assets in
1. Digital Asset Management User Guide....................................................... 2 1.1 Digital Asset Management Concepts.................................................... 2 1.2 Working with
File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1
File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New
Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide for Use With Your FreeAgent Drive 1
Seagate Manager User Guide For Use With Your FreeAgent TM Drive Seagate Manager User Guide for Use With Your FreeAgent Drive 1 Seagate Manager User Guide for Use With Your FreeAgent Drive Revision 1 2008
EnCase 7 - Basic + Intermediate Topics
EnCase 7 - Basic + Intermediate Topics Course Objectives This 4 day class is designed to familiarize the student with the many artifacts left behind on Windows based media and how to conduct a forensic
PRODISC VER. Computer Forensics Family. User Manual. Version 4.8 9/06
PRODISC VER Computer Forensics Family User Manual Version 4.8 9/06 Copyright 2003-2006 Technology Pathways, LLC. All rights reserved. This manual, as well as the software described in it, are furnished
Determining VHD s in Windows 7 Dustin Hurlbut
Introduction Windows 7 has the ability to create and mount virtual machines based upon launching a single file. The Virtual Hard Disk (VHD) format permits creation of virtual drives that can be used for
1. Digital Asset Management User Guide... 2 1.1 Digital Asset Management Concepts... 2 1.2 Working with digital assets... 4 1.2.1 Importing assets in
1. Digital Asset Management User Guide........................................................................... 2 1.1 Digital Asset Management Concepts........................................................................
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE Jesús Alexander García Luis Alejandro Franco Juan David Urrea Carlos Alfonso Torres Manuel Fernando Gutiérrez UPB 2012 Content INTRODUCTION... 3 OBJECTIVE 4 EVIDENCE
Forensically Determining the Presence and Use of Virtual Machines in Windows 7
Forensically Determining the Presence and Use of Virtual Machines in Windows 7 Introduction Dustin Hurlbut Windows 7 has the ability to create and mount virtual machines based upon launching a single file.
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
Digital Evidence Search Kit
Digital Evidence Search Kit K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K. H. Pun, W.W. Tsang, H.W. Chan Center for Information Security and Cryptography Department of Computer Science The University
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
Ans.: You can find your activation key for a Recover My Files by logging on to your account.
Faqs > Recover Q1. I lost my activation key Ans.: You can find your activation key for a Recover My Files by logging on to your account. Q2. I purchased on-line, when will my activation key be sent to
Paraben s P2C 4.1. Release Notes
Paraben s P2C 4.1 Release Notes Welcome to Paraben s P2C 4.1! Paraben's P2C is a comprehensive digital forensic analysis tool designed to handle more data, more efficiently while keeping to Paraben's P2
ACE STUDY GUIDE. 3. Which Imager pane shows information specific to file systems such as HFS+, NTFS, and Ext2? - Properties Pane
ACE STUDY GUIDE *Note* All of the actual exam questions are in multiple choice format. This Study Guide is designed to cover all of the material on the exam, 1. FTK Imager supports the encryption of forensic
Digital Forensic Techniques
Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured
PTK Forensics. Dario Forte, Founder and Ceo DFLabs. The Sleuth Kit and Open Source Digital Forensics Conference
PTK Forensics Dario Forte, Founder and Ceo DFLabs The Sleuth Kit and Open Source Digital Forensics Conference What PTK is about PTK forensics is a computer forensic framework based on command line tools
New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer
New Technologies File System (NTFS) Priscilla Oppenheimer NTFS Default file system for Windows NT, 2000, XP, and Windows Server 2003 No published spec from Microsoft that describes the on-disk layout Good
Importing and Exporting With SPSS for Windows 17 TUT 117
Information Systems Services Importing and Exporting With TUT 117 Version 2.0 (Nov 2009) Contents 1. Introduction... 3 1.1 Aim of this Document... 3 2. Importing Data from Other Sources... 3 2.1 Reading
Chapter 8: On the Use of Hash Functions in. Computer Forensics
Harald Baier Hash Functions in Forensics / WS 2011/2012 2/41 Chapter 8: On the Use of Hash Functions in Computer Forensics Harald Baier Hochschule Darmstadt, CASED WS 2011/2012 Harald Baier Hash Functions
User Manual. Published: 12-Mar-15 at 09:36:51
User Manual Published: 12-Mar-15 at 09:36:51 Chapter Contents Published: 12-Mar-15 at 09:36:48 Chapter 1 - Introduction... 11 1.1 Introducing Forensic Explorer... 12 1.2 Supported file formats... 12 1.3
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
Applications of Data Recovery Tools to Digital Forensics: Analyzing the Host Protected Area with the PC-3000
Applications of Data Recovery Tools to Digital Forensics: Analyzing the Host Protected Area with the PC-3000 Richard Leickly and David Angell Circle Hook Data Recovery { Richard, David}@CircleHookDR.com
NovaBACKUP. User Manual. NovaStor / November 2011
NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without
Alternate Data Streams in Forensic Investigations of File Systems Backups
Alternate Data Streams in Forensic Investigations of File Systems Backups Derek Bem and Ewa Z. Huebner School of Computing and Mathematics University of Western Sydney [email protected] and [email protected]
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
Computer Forensics Principles and Practices
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 7: Investigating Windows, Linux, and Graphics Files Objectives Conduct efficient and effective investigations of Windows
NETWRIX FILE SERVER CHANGE REPORTER
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
Survey of Disk Image Storage Formats
Survey of Disk Image Storage Formats Version 1.0 Common Digital Evidence Storage Format Working Group Digital Forensic Research Workshop September 1, 2006 Digital data that could be used as evidence are
Microsoft Exchange 2003 Disaster Recovery Operations Guide
Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Corporation Published: December 12, 2006 Author: Exchange Server Documentation Team Abstract This guide provides installation and deployment
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers Brian Carrier Research Scientist @stake Abstract This paper uses the theory of abstraction layers to describe the purpose
www.vmpcrypt.com User s manual Table of content
www.vmpcrypt.com User s manual Table of content 1. INTRODUCTION... 3 2. INSTALLATION OF VMPCRYPT... 3 3. GENERAL IDEA OF CRYPTOGRAPHY AND CRITICAL ROLE OF KEY... 3 4. ENCRYPTION OF FILES AND FOLDERS...
UTILITIES BACKUP. Figure 25-1 Backup & Reindex utilities on the Main Menu
25 UTILITIES PastPerfect provides a variety of utilities to help you manage your data. Two of the most important are accessed from the Main Menu Backup and Reindex. The other utilities are located within
(b) slack file space.
Hidden Files A Computer Forensics Case Study Question Paper 1. Outline the meaning of the following terms: (a) cookie, [2 marks] A cookie is data stored locally that is used by some websites for data that
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
ediscovery 5.3 and 5.3.1 Release Notes
ediscovery 5.3 and 5.3.1 Release Notes Document Date: 4/7/2014 2014 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues for this
Q1. What are the differences between Data Backup, System Restore, Disk Image, System Recovery Disc and System Repair Disk?
Windows Q & A April 2012 By Mary Phillips, Secretary, Icon Users Group, MO April 2011 issue, The ICON-Newsletter of the Interactive Computer Owners Network www.iconusersgroup.com [email protected]
ImageNow User. Getting Started Guide. ImageNow Version: 6.7. x
ImageNow User Getting Started Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2012 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact, and WebNow
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012 Jan Balatka, Deloitte Czech Republic, Analytic & Forensic Technology unit Agenda Introduction ediscovery investigation
Active @ UNDELETE Users Guide
Active @ UNDELETE Users Guide TOC 2 Contents Legal Statement...4 Active@ UNDELETE Overview... 5 Getting Started with Active@ UNDELETE... 6 Active@ UNDELETE Views And Windows...6 Recovery Explorer View...
Computer Forensics Processing Checklist. Pueblo High-Tech Crimes Unit
Computer Forensics Processing Checklist Pueblo High-Tech Crimes Unit Cmdr. Dave Pettinari Pueblo County Sheriff's Office [email protected] The purpose of this document is to provide computer forensic technicians
4 II. Installation. 6 III. Interface specification. 9 1. Partition selection view. 9 1.1. Partition selection panel. 9 1.2.
Contents 2 I. Introduction 4 II. Installation 6 9 1. Partition selection view 9 1.1. Partition selection panel 9 1.2. Information panel 11 1.2.1. Current configuration 11 1.2.2. Storage information 12
Unicenter Desktop DNA r11
Data Sheet Unicenter Desktop DNA r11 Unicenter Desktop DNA is a scalable migration solution for the management, movement and maintenance of a PC s DNA (including user settings, preferences and data.) A
Recover Data Like a Forensics Expert Using an Ubuntu Live CD
Recover Data Like a Forensics Expert Using an Ubuntu Live CD There are lots of utilities to recover deleted files, but what if you can t boot up your computer, or the whole drive has been formatted? We
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL)
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COURSE DESCRIPTION: Computer Forensics is focused on teaching
User Guide Replica Automatic Backup System
User Guide Replica Automatic Backup System 2009 Seagate Technology Contents 1 Getting Started with the Seagate Replica Automatic Backup System...4 Replica s First Steps...4 Safely Disconnect...4 Using
Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014
Chapter Contents Operating Systems and File Management Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup Security
Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012
Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used
Lab III: Unix File Recovery Data Unit Level
New Mexico Tech Digital Forensics Fall 2006 Lab III: Unix File Recovery Data Unit Level Objectives - Review of unallocated space and extracting with dls - Interpret the file system information from the
3. USB FLASH DRIVE PREPARATION. Almost all current PC firmware permits booting from a USB drive, allowing the launch
3. USB FLASH DRIVE PREPARATION 3.1 INTRODUCTION Almost all current PC firmware permits booting from a USB drive, allowing the launch of an operating system from a bootable flash drive. Such a configuration
Computer Forensics as an Integral Component of the Information Security Enterprise
Computer Forensics as an Integral Component of the Information Security Enterprise By John Patzakis 10/28/03 I. EXECUTIVE SUMMARY In addition to fending off network intrusions and denial of service attacks,
SIPAC. Signals and Data Identification, Processing, Analysis, and Classification
SIPAC Signals and Data Identification, Processing, Analysis, and Classification Framework for Mass Data Processing with Modules for Data Storage, Production and Configuration SIPAC key features SIPAC is
File System Management
Lecture 7: Storage Management File System Management Contents Non volatile memory Tape, HDD, SSD Files & File System Interface Directories & their Organization File System Implementation Disk Space Allocation
Configuring Backup Settings. Copyright 2009, Oracle. All rights reserved.
Configuring Backup Settings Objectives After completing this lesson, you should be able to: Use Enterprise Manager to configure backup settings Enable control file autobackup Configure backup destinations
Backup Software Comparison Table
Backup Software Comparison Table Features Summary SyncBackPro SyncBackSE New in Version 6: Amazon S3 and Google Storage support New in Version 6: Microsoft Azure support New in Version 6: Backup of emails
TrusCont TM TSFD Protection Toolkit
TrusCont TM TSFD Protection Toolkit Version 2.4 User's Manual September 2011 2006-2011 TrusCont Ltd. Table of Contents 1. INTRODUCTION 8 1.1 TSFD KEY FEATURES 8 1.2 WHAT S NEW IN VERSION 2.4 8 1.3 WHAT
Computer Forensics: Permanent Erasing
Computer Forensics: Permanent Erasing Prepared By : Yousef T. Aburabie and Mohamd Alomari Supervised By: Dr. Lo ai Tawalbeh, New York Institute of Technology (NYIT)-Jordan s campus-2006 Introduction "Delete"
www.thedatalocker.com Customer Service: 1-877-264-3715 Email Us: [email protected]
TheDataLocker online backup allows you to store, backup and retrieve any computer data over the internet to a secured remote system. Its main function is to generate a duplicate of your important files
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 9 Data Acquisition Objectives Determine the best acquisition method Plan data-recovery contingencies Use MS-DOS acquisition tools
Installing Windows XP Professional
CHAPTER 3 Installing Windows XP Professional After completing this chapter, you will be able to: Plan for an installation of Windows XP Professional. Use a CD to perform an attended installation of Windows
ACTIVE@ UNDELETE 7.0 USER GUIDE
ACTIVE@ UNDELETE 7.0 USER GUIDE COPYRIGHT Copyright 27, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative
Sophos for Microsoft SharePoint Help
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28
Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide
Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide White Paper Descriptor This document provides administrators with information and steps-by-step technique for deploying Microsoft Diagnostics
Forensic Analysis of Internet Explorer Activity Files
Forensic Analysis of Internet Explorer Activity Files by Keith J. Jones [email protected] 3/19/03 Table of Contents 1. Introduction 4 2. The Index.dat File Header 6 3. The HASH Table 10 4. The
Digital Forensics Tutorials Acquiring an Image with Kali dcfldd
Digital Forensics Tutorials Acquiring an Image with Kali dcfldd Explanation Section Disk Imaging Definition Disk images are used to transfer a hard drive s contents for various reasons. A disk image can
Forensics on the Windows Platform, Part Two
1 of 5 9/27/2006 3:52 PM Forensics on the Windows Platform, Part Two Jamie Morris 2003-02-11 Introduction This is the second of a two-part series of articles discussing the use of computer forensics in
Introduction To EnCase 7
Georgia State University CIS 8630 - Business Computer Forensics and Incident Response Workshop Protocol Introduction To EnCase 7 David McDonald (with special thanks to Richard Baskerville) Acknowledgement:
Detection of Data Hiding in Computer Forensics. About Your Presenter
Detection of Data Hiding in Computer Forensics NEbraskaCERT Conference August 22nd, 2008 James E. Martin CISSP, JD About Your Presenter 2008-Present: Security Engineer, West Corporation 2004-2008: Senior
Clickfree Software User Guide
Clickfree Software User Guide Last Revised: Nov 2, 2011 Clickfree_backup_software_user_guide_v1.0 Clickfree and the Clickfree logo are trademarks or registered trademarks of Storage Appliance Corporation.
The following features have been added to FTK with this release:
FTK 2.0.2 Readme The following sections present information on the new features, resolved issues, and known issues with the FTK 2.0.2 release. NEW FEATURES The following features have been added to FTK
ImageNow User Getting Started Guide
ImageNow User Getting Started Guide Version: 6.6.x Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software, Inc. All other products
Improved document archiving speeds; data enters the FileNexus System at a faster rate! See benchmark test spreadsheet.
Feature Sheet Version 6.100.14 FileNexus Major Advances Client Server Communication - Dependency on Windows DCOM protocols eliminated which means NO additional configuration required on Client PCs after
Computer Forensics Today
L A W, I N V E S T I G A T I O N S, A N D E T H I C S Computer Forensics Today Kelly J. (KJ) Kuchta When people hear the word forensics, it often generates a mental image of the movie series with Jack
Chapter 5: Fundamental Operating Systems
Chapter 5: Fundamental Operating Systems IT Essentials: PC Hardware and Software v4.1 Chapter5 2007-2010 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Chapter 5 Objectives 5.1 Explain the purpose
About this release. McAfee Application Control and Change Control 6.1.1. Addendum. Content change tracking. Configure content change tracking rule
Addendum McAfee Application Control and Change Control 6.1.1 About this release For use with epolicy Orchestrator 4.6 5.0 Software This document is an addendum to the McAfee Change Control and Application
PRIVAZER USER GUIDE Version 1.2 Dated 08 June 2013
PRIVAZER USER GUIDE Version 1.2 Dated 08 June 2013 CONTENTS Introduction... 3 System Requirements... 4 Install PrivaZer... 5 Uninstall PrivaZer... 9 Scan and Clean C Drive... 11 Scan Options... 20 Cleanup
Active@ Boot Disk User Guide
Active@ Boot Disk User Guide Copyright 2008, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work
Technical Note. Image Studio Software Work Area Folder Best Practices. Developed for: Image Studio Software
Technical Note Image Studio Software Work Area Folder Best Practices Developed for: Image Studio Software Please refer to your manual to confirm that this protocol is appropriate for the applications compatible
Learning Objectives. Chapter 1: Networking with Microsoft Windows 2000 Server. Basic Network Concepts. Learning Objectives (continued)
Chapter 1: Networking with Microsoft Learning Objectives Plan what network model to apply to your network Compare the differences between Windows 2000 Professional, Server, Advanced Server, and Datacenter
Cabcharge Australia Limited, 2005. Cabcharge TMS Help Manual
Cabcharge TMS Help Manual Cabcharge Australia Limited, 2005 p1 p2 Table of Contents Welcome to TMS 5 A Brief Overview 6 Getting Started 8 System Requirements 8 Downloading Statement Data 9 Set up your
