Академический Документы
Профессиональный Документы
Культура Документы
Presented at the
1.
Make sure the Windows version of EnCase and the DOS version of EnCase are the same; i.e., if you have EnCase 3.19 on your Windows side, you MUST have EnCase for DOS 3.19 on your EnCase boot floppy disk. Make sure the parallel-port settings in the BIOS are the same for both the Subject PC and the Storage PC. The recommended BIOS settings are: Bi-Directional EPP ECP + EPP ECP
2.
Boot the suspect machine into DOS with one of the new automated EnCase Network boot disks Type EN at the dos prompt. Select sever and then network. Boot the forensic machine into Windows. Make sure the network settings are correct in the windows machine: TCP/IP protocol must be installed IP address should be set at 10.0.0.50 Subnet mask should be 255.255.255.0 You must remove your WINS and DNS settings Open EnCase, choose preview/acquire Select network for source
EnCase can interpret the following file systems: FAT12 FAT32 EXT2 (Linux) HFS+ (Mac and PowerMac) CDFS (CD-ROM) Note: FAT16 NTFS HFS UFS (Unix) UDFS *
If EnCase does not recognize the file system on the drive (HPFS for example), it will show the unrecognized file system as an "unallocated cluster" file. You can still search for keywords and file headers, and make bookmarks, but you will not see file names or folder structure. You can still perform EScript searches against these file systems as well.
To move recovered graphics files from the recovered graphics files folder into one of the Final Report folders, typically the Pictures folder, do this: 1. Go to the bookmark tab on the left 2. Highlight Recovered Graphics Files folder 3. Go to the Table view on the right 4. Drag and drop the desired images, by the number next to the file, into the folder of choice. Note: At this time, you cannot multiple-select the images. You have to drag and drop them one at a time.
1. Navigate to Tools!File Signatures and Viewers!Viewers Tab 2. Right click and select New File Viewer. 3. After you add the file viewer, go back to the file signatures page and associate the new viewer with whatever type of file you wish.
Note: Many laptop hard drives are "married to the motherboard" so that they will not work correctly if you try to acquire them outside of the laptop. For that reason, many people only consider using methods 3 & 4. Method 3 is definitely faster than number 4.
1.
Run a hex search for the characters '55' and 'AA' and see if you can find the end of a partition. If you do, count 63 sectors to the right of that. If there is a "MSWIN4.1" or "NTFS" text in that sector, then that sector (with the text) is the beginning of a new partition. Right-click that sector and click Add Partition."
2.
Note:
You can find more information regarding recovering partitions in Chapter 19 of the EnCase 3.18 User Manual.
The only Palms supported, at this time, are the following: III series V series VII series M105 M100 Note: You can acquire other PDAs that use the Palm OS 3.0, such as certain models of the Handspring Visor.
Note:
Note:
Design Features
Based on a secure public key authentication, 128-bit encryption for 128-bit transmissions and files
" Granular user permissions " Vendor must authorize each SAFE setup " Tamper resistant storage of SAFE private key on SAFE " Secure backup of SAFE private key for disaster recovery " Secure binding between SAFE hardware and SAFE private key " All session keys generated on SAFE hardware " Prevent replay attacks without relying on synchronized clocks " Node can validate SAFE public key with vendor signature
S.A.F.E. Server
" Maintains EnCase Authentication Keys " Authenticates Examiners " Controls Examiners Privileges " Controls Access to Target Node via Servlet # Enables/Disables Examiner Sessions " Monitors and Logs Sessions
Multi-SAFE Environment
Keymaster 1
Keymaster 2
Node 1
SAFE1
SAFE2
Examiner
Node 2
Consultant
Corporate Advantage
$ $ $
Best Practice Incident Response Situation: Employee deletes files and company data or information Action: Use EnCase to search for deleted files Secure scene Preview media or drive Use undelete to recover files Recover deleted folders and file fragments Document findings in report Outcome: Files recovered, evidence is secured and available for judgment on the act. Without a forensic copy, litigation for possible malicious intent would be compromised.
Corporate Advantage
Best Practice Incident Response
$ $
Situation: Unusual activity of an employees computer use after work, possible inappropriate graphics or content. Action: Use EnCase to determine misuse. Gallery view for visual review Recover deleted files Review files with after hours activity in the Timeline view Document findings in report Outcome: Verified use, you have court approved evidence in support your HR policies toward computer use. HR takes action if necessary.
Corporate Advantage
Best Practice Exit Interview
$ $
Situation: Employee leaves the company, involved in projects and programs or not, on good terms or not. Action: Use EnCase to search for intellectual property, deleted files, programs, databases and communications. Secure scene Image PC drive(s) Recover deleted folders and file fragments Search using key words or code names Document findings in report Outcome: Understand exposure to intellectual property on the subject drive and now able to pursue recourse up to litigation if necessary. Imaging the drive of all exits (good or bad) helps reduce HR issues resulting from employees feeling singled out.
Bill Siebert
Director of Computer Investigative Services Guidance Software
CIS@GuidanceSoftware.com www.GuidanceSoftware.com