Home

EnCase Forensic Version 6.11 User`s Guide

image

Contents

1. Selecting Tree Entries for Operations Selection is the way to choose multiple items in the Tree pane to manage them While highlighting and including in the Tree pane drive the content of the Table pane selecting does not Selecting determines which entries are processed by analytic operations such as bookmarking searching filtering and hashing When you select an item by clicking a check box the selection propagates upwards in the hierarchy to include related structure Navigating the EnCase Interface 121 Figure 24 Selecting items where 1 is the item that you checked with a mouse click 2 is a selected ancestor that was propagated from the initial selection whose entire contents are included in a future operation as indicated by the white background of the checkbox and 3 is a selected ancestor that was propagated from the initial selection whose contents are not included as a result its checkbox has a gray background The arrow shows the direction of the propagation SOM Entries eos GSI DOC 102033 10 0 36 21 1 T uc DIE Extend HDS Documents and Settings Som E Administrator SOME Application Data OG Identities po co 1528F8281 FFEB 4B87 88BC 9EFA39428363 Wf C Microsoft I Credentials Click gt A S 1 5 21 1861619204 450663806 4267828160 500 ES Crypto HOLE Internet Explorer Lp Quick Launch DIE Media Player OG mmc BDO Protect gt I S 1
2. O file location Neseutil mh filepath publ edb If the EDB file is in an inconsistent state first try to recover as follows O c Exchange BIN Eseutil exe r E Click Yes to run the repair Note that the three character log file base name represents the first log file Files are sequentially named with E log being the first log file Run a check step 5 on the resulting EDB file If the file is still in an inconsistent state attempt to repair the EDB file This may result in the loss of some data currently in the log files Run the repair as follows O c Exchange BIN Eseutil exe p For additional information on the Eseutil program read the Microsoft article at http support microsoft com kb 272570 en us http support microsoft com kb 272570 en us Cleaning an EDB Database The MS Exchange Server stores email messages in an EDB file on a server with a corresponding log file named E log The log file is where Exchange stores data to be committed to the EDB file In older Server versions there is also a corresponding stm file When the log file contains data that has not been committed to the EDB file the EDB file is in an inconsistent or dirty state EnCase is unable to parse inconsistent EDB files When an EDB file is dirty there are several tests that can be run on it to determine whether the files are merely out of sync or are in fac
3. TI TTTTIIITT 4 Name Filter IC Application Data C3 Cookies Desktop Favorites C Local Settings C My Documents NetHood Cj PrintHood OD Vio nn sf ainiwe C3 Recent SendTo c Start Menu C3 Templates NTUSER DAT LJ sti Trace log O ntuser dat LOG e Q ntuser ini Highlighting differs from selecting Selecting clicking one or more check boxes constructs a collection for processing by an analytic operation such as bookmarking or hashing Highlighting also differs from including Including clicking to display the green polygon displays all the items found in the included branch of the tree from the top level down to the item you clicked Navigating the EnCase Interface 119 Displaying Expanded Tree Entry Information You can include all the lower levels of the hierarchy of an item for display in the Table tab with a single mouse click You do not have to explicitly expand the tree folders When you click the Set Include polygon in the Tree pane or right click and choose Set Include from the menu this occurs B The Set Include icon of the highlighted item turns green B Items on the lower levels of the hierarchy are also included as indicated by the green icons B The content of all the entries or object
4. sees nnne 322 Parsing a Locally Encrypted Mailbox nennen 322 Enery pted Block RR 323 Decrypted BIOK 5 aeuo ee n eO On NH ODEUURI eaa Re eH erts 324 Locally Encrypted NSF Parsing Results 325 CHAPTER 9 Analyzing and Searching Files 327 Signat reAnalysisu ime sesh toes INTER HEISE RI RIS ET RN DDR EGG NER TRISTE Rea tod 328 File Si BEBEUTOS ite m edet aE EIER EET TARTE Ug I te Ce Ote ttes EEE nee 328 File Signatures with Suffixes ssssssssssseeeeeenenenennneette tnnt nennen nennen tenet 329 Viewing the File Signature Directory cccsscsesessseeeeseteesesesesnsnenesescscscececeeeensneeceseeeeneneseseseanenenes 329 Adding a New File Signature c cccccccssssssetesesesesnensnesessscseecesesesenssesesesesnenenenessssseeceseeenensneseseseanenenes 331 Editing a Signature eene een ote sade dentro ort bas e p He We e ei po e e d nee 332 Performing a Signature Analysis seen tenente 333 Viewing Signature Analysis Results Part 1 334 Viewing Signature Analysis Results Part 2 sse 335 Sienat reArialysis begerid bite nep Rb rete ie Eidos tiv epe totae Eb pan 336 EnScript Programming Language iniiaiee ane en ie n E Ea E EEE a E 337 Included Brscript Comnporients eie iyeon ni ion pta aA e ai rE ier 337 BS CLIP ty POS 1 ETEA E EAEE EEE E E E E AEE esas 338 Hash Analysis eironi EEE E re rh o pee Ave E e Etat E AREA AEE 338 File Has bitin Beasties a n E E te ETE
5. Lj App Descriptors Ab Archive Files Cases Cases L Encryption Keys Se EnScript Types Ag EnScripts A File Signatures A File Types 2 OM 5 File Viewers EZEZ Ten Dol I 04 Keywords A Name gi Export Machine Profiles 5 a p File Viewer Maximize view Window s Import M Packages E sd Projects ij New Folder Application Path 3 sare vSChange Request 54983G5 T cpview exe Imi B Set Included Folders Num i A Text Styles Command Line Include Sub Folders Shift Num jer Table Pane gt ile Include Single Folder Ctrl Num View Pane b Filter Pane gt Cancel X Close Tab Ctrl F4 EI Show Name 4 Previous Tab Ctrl Shift Tab gt Next Tab Ctrl Tab i E Table Report 7 Code C Auto Fit Reset view Name Filter end Path View Maximized C 1 jl Fie Viewert 000 YAChange Request file 1 Display the File Viewers tree in the Tree pane O On the main window click View gt File Viewers or O On the Tree pane click File Viewers The File Viewer tree appears Viewing File Content 295 2 Right click the root of the File Viewers tree and select New The New File Viewer dialog appears 3 Browse to the file viewer s executable make any other changes to the settings on the dialog and click OK The file viewer appears in the file viewer table Associating the File Viewer s File Types with the Viewer When you add a new file viewer to your EnCase application yo
6. CI 17 09 SucCese CI 18 E voe stock C 29 Ell SFT Alocasen trao Bom ied nex Eum Brn eene jest T conso Deisis Output C tok C Codeosge C of11691 oo Y rers 2 condtors ie coy DOG Y O y Dag y CQ Ge SOIT n E 2 pur Do cy Doy Doy Dag amp Quota nR Uy OQ y Dare y Sas y Doc e rocas nT ern E eral ti GUIDSSO ENTE Extend PS 13971256 LS 1392208 C 349974 0 288 FOO LE 1 4 The next figure shows the same files as they appear encrypted B8 EnCase Enterprise Training Ple Edt Vew Tools Help Stew UF Open ll Sove lt a Print e Add Device Cl search 3 togon T rogoft 3 sees D acqure aeo i Galery DTmeine Jox code 21 imo ew fhe afe LH BL f orot Otok Codepege 16 162 t LI pa BD rrereopt F acire deest T console pan T 00000126 3 2g1 84L78 MU AS Y Y Y V cr Q PSAOBa i MOEG OAG x1 ME Epes M P REP kt am BS N rne Ae e t Yr OO Evidence 10000010 xf NA U aA C t RAXSi m Cn I EG 94 p726 A i o I0 OB Os OO 2 a e a2k5C 14 N t e GY amp x SUC RR E E go eret Ikjnjd2 x2 oJDARDOF eje AZAZ S rSXS AR DyY a8 t s ED fto XIy KONG cf RTG SZI OH s3 0 dtDio soZW E ol d CO ProneDotarests 000020 x amp 4P Kiro amp Z ace 5 5200 GI Pv Fy G 108 O FO Sd Y a 0t IE RAN I A 12r 05 1 EGIL AIUK HO woe Dex EE Sou Corple H a d Aect7j oUtS P T N BOE A
7. Soge Entre D LJ 3 GH d Name Click nE R 2 Identities D wa Gd Arpication Dat Desktop 3 Gy 528F8281 FFEB 4 T em C Favorites 4 Microsoft GG Identities M Local Settings F3 c dential Lg 3C 4528F8281 FFEB 4 L 5 Credentials E Microsoft Kad My Documents O 6 5 1 5 21 18616192 HG Credentials NetHood LJ 7 Crypto D Crypto C PrintHood C 8 Grsa L Internet Explorer Ea Recent Lj 9 C35 1 5 21 18616192 Lea c Media Player SendTo 10 Internet Explorer Pee mac Start Menu 11 Quick Launch Protect jj s 5 1 5 21 18616 Sa erens 12 desktop ini C NTUSER DAT J 13 9 Launch Internet Ex OG SystemCertificates SUT HoD My L Sti_Trace log 14 _ Show Desktop scf BO Windows L ntuser dat LOG 15 amp 9 VMware Workstatio DE Themes L ntuser ini C 16 O Desktop htt CE Cookies G 17 C3 Media Player og Desktop L 18 MMC OB Favorites OG Local Settings Hog My Documents gG NetHood oG PrintHood 19 O Protect 20 5 1 5 21 18616192 21 Q 880b5e95 4e2e 45 22 Preferred Log Recent LJ 23 CREDHIST gt SendTo 24 SystemCertificates HHG Start Menu 2516 My Lg Templates 26 Certificates Ho All Users CJ 27 cns 28 CTLs G 29 windows 30 Themes 31 Custom theme 32 desktop ini 34 N indev dat
8. l Report 5 Gallery Timeline J Disk ig Code Name 2 Signature E ae ud 410 lal 9387129 120 1 1 gif AOL ART gif GIF 411 d 9388114 120 1 1 gif AOL ART gif GIF 3 412 E 9415634_120_1 1 gif AOL ART gif GIF 3 313 E AAAAAAXGPJ 1 GIF AOL ART GIF GIF 4 413 ad AAAAAAZDGZ 1 GIF AOL ART GIF GIF 415 account icon 1 aif AOL ART gif GIF 416 ud address icon 2 dif AOL ART gif GIF 417 id aim 1 gif AOL ART gif GIF 418 d all off 1 aif AOL ART gif GIF B 419 E all_on 1 gif AOL ART gif GIF o 420 3g alternate 728x90 15H1 gif AOL ART gif GIF 4 aa E aolhometown 1 gif AOL ART gif GIF 422 auction icon 1 aif AOL ART gif GIF 423 bewipe_ss 1 gif AOL ART gif GIF 424 block_carley_ZDNet 1 gif AOL ART gif GIF v Viewing Signature Analysis Results Part 2 1 Click Set Include in the Entries selection in the Tree pane App Descriptors gt EnScr 4 gt X i3 Home Bookmarks 4 oils File Extents d Permissio4 gt Ere Entries n 1 A list of case files and their associated file signature and other data appears in the Table pane C3 Home Beokmarks 4 afeFile Extents f Permissio4 gt 2 Sort the data if desired In this case the red triangle in the Name column indicates the display is sorted alphabetically by name 336 EnCase Forensic Version 6 11 User s Guide Signature Analysis Legend
9. In Fle File ll s Report Ext Type lai 3 Home s sFile Extents Permissions J References Gop Entries OSS belle mi ton ong y Gt Q DRIVER 0028 Lj 2 BY unallocated Clusters i Export Prerequisite Added Device X Close Delete CopyJUnErase Copy Folders inp Bookmark Data Ctri B Bookmark Folder Structure Create Hash Set Create Logical Evidence File xj HE Acquire lt he deh Search Hash and Signature Analysis Restore New Image Fie Hash Donot add Scan Disk Configuration C Add to Case Scan for LYM Replace source device Verify File Integrit Analyze EFS Restart Acquistion pa Ef Modify time zone settings Mount as Network Share Mount as Emulated Disk Rename F2 Expand Contract Space Expand All Contract All Ned Cancel Set Included Folders Num Include Sub Folders Shift Num Include Single Folder Ctri Num To open the Acquisition wizard 1 To reach the Entries tree in the Tree pane click Cases gt Entries gt Home The Entries tree displays in the Tree pane 2 In the Entries tree highlight the desired device 3 Right click the highlighted device object The Device right click menu appears 4 Click Acquire The Acquisition wizard appears Continue creating an EnCase evidence file by completing the acquisition specification us
10. m a Notes about the Faculty err Workshop on Secure Software Development The Guidance Software Support Portal includes the EnCase User Hardware and EnScript New Record for the Largest forums our new bug tracking system a knowledge base and other important tools and links This site CVE Entry brings valuable resources and message boards into one convenient location allowing law lock Admnistrati e A Look at MITRESOOs OVAL enforcement and corporate security professionals to exchange ideas ask questions and provide e Block Admnistration Schemas A Weak Proof of solutions Thousands of skilled and experienced users are registered on the boards reviewing posts every day and can Pe i ror Entries Compliance offer their expertise on the functionality of EnCase software forensic hardware issues and EnScript writing The z imk ian e Virtualization Is Successful Guidance Software Support Portal is an important resource for the forensic analyst e Submit Poll Because Operating Systems Are Weak Welcome Open Source Outclassing 123 reads Home Router Vendor C Cs Firmware Announcing EnCase Lab Edition Guidance Software Home Page oon jp M M M Download Center My ys N V D Information amp Responses Hello EnCase Users Guidance Software is please to announce our new collaboration forensic solution for government users called EnCase Guidance Product Version Matris e New forensic lab opened at Lab Edition
11. fie Sagart ie M8 Comnpuwsmor dd en Sn C funt emat Somali m Cum tas o re lace Working with Evidence 247 To create a logical evidence file 1 In the Tree pane click Cases Entries Home The Entries tree appears in the Tree pane Select the files and folders to be associated with the logical evidence file Right click the parent object on the Entry tree and click Create Logical Evidence File The Sources page of the Create Logical Evidence File wizard appears Accept the default settings or enter desired values and then click Next The Outputs page of the Create Logical Evidence File wizard appears Enter the appropriate values and enter or browse to the path and filename of the logical evidence file to be created Click Next The results dialog appears with a status of complete Recovering Folders The following types of folders can be recovered E Folders on FAT volumes as described in Recovering Folders on FAT Volumes NTFS folders as described in Recovering NTFS Folders E UFS and EXT2 3 partitions as described in Recovering UFS and EXT2 3 Volumes 248 EnCase Forensic Version 6 11 User s Guide Recover Folders on FAT Volumes After adding an evidence file to a case run Recover Folders on all FAT partitions by right clicking on each device and selecting it This command searches through the unallocated clusters of a specific FAT partition for the dot double dot
12. seen 413 Creating Bookmark ET REISEN EE UIDI EH PUR E EE GO tI ode ce e DS eir eieol 414 Creating a Highlighted Data Bookmark eere 415 Creating a Notes Bookmark tenente tenentes 416 Creating a Folder Information Structure Bookmark sese 417 Creating a Notable File Bookmark sse 418 Creating a File Group Bookmark sse tenere nne enne 419 Creating a Log Record Bookmark sse nen enne 420 Creating a Snapshot Bookmark sse nennen nennen 421 Creating a Datamark as a Bookmark cccscscsssssseesseeeesetetesesesesnenenesesessseececeeesenesesesesesnanenesenesseeeeeees 422 Usins Bookmarks notet intei dieere Cutie biet o tete eta lbes bre ond 422 Biting a Bookmark 3055 8 ipee e ott ie IR uri eei bier SA 423 Bookmark Editing Dialogs iab tege he bibere decia ebbe ese airan 424 Edit Highlighted Data Bookmarks Dialog sse 425 Edit Note Bookmarks Dialog nene 426 Edit Folder Information Structure Bookmarks Dialog see eee 426 Edit Notable File Bookmarks Dialog sse eee 427 Edit Snapshot Bookmarks Dialog sse nennen 427 Edit Log Record Bookmarks Dialog seen 428 BditDatamiatrks Dial g eiue ena estes eror estas ied aret d vars R oe 428 Editbookmark Folder Dialogs 5 i bero en eh D tote o tret ed sen ied 429 Edit Poldet Dial g 5 dona
13. 2 Copy the files shown here from the server to the appropriate location The table assumes the server installation is c program files Nsbaadmin 386 EnCase Forensic Version 6 11 User s Guide Additional SafeBoot installation files Copy from Copy To C Program Files SBAdmin SDMCFG INI C Program Files EnCase6 Lib SafeBoot Technology C Program C Program Files EnCase6 Lib SafeBoot SDAIMES Exporting a Machine Profile from the SafeBoot Server Before you can perform an offline decryption of a SafeBoot encrypted drive you first need to export the target machine profile from the SafeBoot server Here are the steps to accomplish an offline machine profile Be sure that you have obtained the SDMCFG INI and SbAlg dll files from the SafeBoot Server as described in SafeBoot Setup on page 385 1 Logon to the SafeBoot server with an administrator account 2 Launch SafeBoot Administration Tools from Start Menu Programs SafeBoot Administrator Tools SafeBook Administration Log in with the SafeBoot administrator account Click the Device tab Expand the SafeBoot Machine Group tree ov Ur E w Double click on the SafeBoot Machine child in the SafeBoot Machine Group tree A list of all computers registered to this particular SafeBoot database appears on the right side of the SafeBoot Administrator screen 7 Right click the computer name you wish to decrypt then select Export Configuration from the m
14. 6 Right click the Palm Pilot object in the Entry tree and click Acquire The After Acquisition page of the Acquisition wizard appears EOC fe Entry 09a O Copy Folcers EARE ii Bookmark Folcer Stuctue ATE eae x Activate Single Files Crete Hash Get Acquire another disk Search Hash and Signature Analysis Close Delete M New Image File Delete All Selected FD dete Do not add Export Recover Folders C Add to Case Lol SERT Replace source device Hash i Scan Disk Corfiquration Restart Acquisition Scan for LVM i Verify File Integrity Existing Evidence File wen 7 Continue the acquisition from Step 1 of Specifying and Running an Acquisition When the Acquisition Results dialog closes the acquisition is complete Leaving Console Mode To leave console mode you must do a soft reset on the Palm Pilot Turning the Palm Pilot off and back on does not take it out of console mode and leaving it in console mode causes the battery to drain faster than usual To leave console mode 1 Locate the small hole on the back of the Palm Pilot labeled RESET 2 Press the tip of a pen into the hole Working with Evidence 223 Acquisition Times Initially previewing a serial Palm Pilot PDA may be slow because standard serial ports transfer data at a maximum speed of 115kbps The preview and acquisition of a Palm Pilot Vx for example takes between 30 and 40 minutes USB Palm Pilots
15. 1 Start EnCase 2 Vista displays a prompt with the heading An unidentified program wants access to your computer User Account Control es Don t run the program unless you know where it s from or you ve used it before C T EnCase exe J Unidentified Publisher Cancel I don t know where this program is from or what it s for gt Allow Itrust this program I know where it s from or I ve used it before v Details User Account Control helps stop unauthorized changes to your computer Installing EnCase Forensic 41 3 Click Allow Vista does not allow drag and drop between applications with different security levels You must disable the User Account Control UAC to drag files to EnCase from the Windows shell For details see Disabling Microsoft Windows Vista User Account Control on page 41 Disabling Microsoft Windows Vista User Account Control You can use the User Account Control UAC security feature in Microsoft Windows Vista to perform common tasks as a non administrator called standard user and as an administrator without having to switch users log off or use Run As In prior versions of Windows the majority of user accounts were configured as members of the local administrator s group because administrator privileges are required to install update and run many software applications without conflicts and to perform typical system level tasks With UAC enabled you can run most app
16. 22 show Columns Go ASNE Fies E OK d Cancel Column SDC Eanpds zip Sort gt EHO s Zip Volume Select Item Space Lor Nes Goto Parent BkSp To view or mount compressed files 1 Navigate to the compressed file you want to view or mount 2 Continue with step 2 of Viewing File Structure The file structure of the compressed file displays and component files or layers in the compound volume folder can be opened and displayed in the view of your choice Viewing File Content 303 Viewing Lotus Notes Files Lotus Notes versions 5 6 6 5 and 7 provide NSF support which allows you to view email appointments and journal entries 1 2 9 Navigate to the NSF file you want to view or mount As needed select Calculate unallocated space then select Find deleted content Continue with step 2 of Viewing File Structure The file structure of the email nsf file displays and component files or layers in the compound volume folder can be opened and displayed in the view of your choice Notice the icon for the compound email file looks like a disk drive and no compound volume indicator is added to the icon after it is parsed Viewing MS Exchange Files MS Exchange 2000 2003 edb support provides the ability to view mailboxes and emails 1 2 3 Navigate to the edb file you want to view or mount As needed select Calculate unallocated space then select Find deleted content Continue with step 2
17. Miew Search Hits Bookmark Selected Items ES Show Columns Column Hide Ctrl H Sort gt Set Lock Select Item Space I Go to Parent BkSp Fit to Data PO Auto Fit All You can change the order in which the columns appear by grabbing the column header and dragging the column to the desired location Note Change column order by left clicking the column header and dragging it to another location Setting a Lock on Columns Use Set Lock to scroll right and left in a table while continuing to show certain columns Columns are locked on the left side of the Table pane To lock a column 1 Place the cursor in a column to be locked 2 Right click and select Set Lock in the sub menu P m File File 43 Copy Ctrl C LJ Show Excluded CI Show Deleted X Delete Delete Delete All Selected Ctrl Delete Exclude Ctrl E Exclude All Selected Ctrl Shift E a Export Tag File Ctrl T A View Search Hits Bookmark Selected Items ES Show Columns Column Hide Ctrl H Select Item Space Reset 3 Go to Parent BkSp Fit to Data Auto Fit All Navigating the EnCase Interface 127 The lock is set on the position of the column If other columns are moved into that position they too are locked To release the lock 1 Right click the locked column 2 Select Columns 3 Select Unlock Excluding Search Hits The Exclude option hides one or more search hits fr
18. X U G P wa pr s Ya uB 20 4g FSTest j Boi 91 y Q a9Ey C f et 99 S D Lia y DUS ita yw p S iX usi tO yxp 6ux n 8 Z 9 210 nG Heg Indexing 2 za Kova DZ IPIN Let cius sig ox Pif R t zjS8z X pZDR w wkQ UST AMEN H D 2 ge EC g Internet search gt p I t Keywords Hig Lotus IZ Ax5 amp d gen 342 L pae xEY V YARDS Boks 6j8mQcEu a F 70 ZesADII By teemaspo gii g OutsideIn d26iy8q clO eW NxeOfipy t Oyur a i X kYK x FX 2g 965Y i xXAXP QY L1oe3z lf Y e GErP ce E Z0 0 0 A Heg SafeBootEncryption 1 sa er re IAA g SmokeTest E email th Analyzing and Searching Files 399 When parsing is complete and successful a directory list displays In the illustration the folder is entitled smime p7m The text of the email is shown in the Text pane while the email s attachments appear in the Table pane You should view and work with content in the Records tab E Fle Edt View Tools Meb ien Fen lel Sove Ld Print se Add Device Q Search CI Logon 3 Refresh i x fige coe GA eaey 2 rine oe 9s code Cyrene inl Uses Cu sues ines Cones 0 EAE fi Hace sac Pie extents B Permasecs References LY Hash Propertes O 1 C Alternate Body boe Envies IC 2 G wee 1050 Horiz smer Sz Gr Pact BOC 3 sre Fies osa amp OCC Encrypted Sgned weh att thot C1 Gl weter ioc po FEG Picture BOO veox SOO D 5erypted Signed with Att
19. sssssssssseseeeeeeeneneeeneneenenennenen nnt tenente CaseOpti nsiTab 5i e E be setenta tient ibit eb ods tides Global Taba ke ceith e etenim emet eroe atate ted E E jud Fonts Tab of the Options Dialog ccccesesseseeseseseseesetetesesesesnsenesessscecscecesensnesesesesnsnenenesessseeseceeeeenenes EnSctipt TAD sevice ac tem dem er ER ER eere RO D e dien m ee RT Ten Eon esee estat Storage Paths Taba 55st ee eed n te ere ee enn iet ere e v Aon rtt Sharing Configuration Files ertet ome eet te t ep de ene hi ipei deoa e tete ovens Vista Examiner Support ies ende rn a e E E re risa der ORN Disabling Microsoft Windows Vista User Account Control sss Running a 32 bit Application on a 64 bit Platform sss CHAPTER 4 Using LinEn IntrOdUChON e Viewing the License for Lin EN siseste i E E ee E E oa aE a E E a EENE Creating a LINEN Boot Disc E E E A E E E e RE AST Configuring Your Linux Distribution rrt Obtaining a Linux Distribution veneni E E E eene nennen 15 16 EnCase Forensic Version 6 11 User s Guide Contents EinEnset Up Under SU SE ettet teet tree tte d ete ee eee eee ete eri d eb e e dan 49 LinEn Set Up Under Red Hatero rrine EE EREE E E tentent nnne 49 Performing Acquisitions with LinEn ccccccssssssessssseesssstesesesesnsnsnesesescecececeeeeneneseseseanenenesesssssceceeeeeeneies 50 Setup for a Drive to Drive Acquisition 50 Doing a Drive to Drive Acquisit
20. Add Device Add Raw Image Exit You may see different options on the File menu depending on your context The File menu provides the following commands New displays the Case Options dialog where you define the case you want to add Open displays the Open dialog where you select a previously saved case Save saves the previously saved case file or displays the Save dialog where you enter the filename path and file type for the case file you want to save Save As displays the Save As dialog where you enter the filename path and file type for the case file under a different name Save All displays the Save All dialog where you enter the filename path and file type for both the case file and EnCase global settings Navigating the EnCase Interface 63 Print displays a Print dialog where you define the print settings for the content Table Report Code depending on what is displayed in the Table pane Printer Setup displays the Print Setup dialog where you select a printer and choose printer settings Add Device displays the Add Device wizard where you define the preview and acquire parameters for a device This command appears in the menu only when a case is open Add Raw Image displays the Add Raw Image dialog where you select image files to be added to the open case This command appears in the menu only when a case is open Exit closes the program If content has changed you are prompted to save it E
21. The Table Pane menu corresponds to the tabs appearing in the table pane The tabs in the table pane depend on the tab currently selected in the tree pane View IE App Descriptors 3b Archive Files a Cases 35 Encryption Keys Rg EnScript Z EnScript Types Z File Signatures Al File Types E File viewers Keywords B Report 3 Gallery Timeline p Disk Code Machine Profiles Ix o p T un e t in Packages Projects SAFEs Text Styles i u gw a SAFEs Sub Tabs Table Pane E Table view Pane Report Filter Pane ks Gallery Timeline X Close Tab Ctrl F4 A Disk II Show Name M Code 4 Previous Tab Ctrl Shift Tab gt Next Tab Ctrl Tab Ll Auto Fit Reset view 71 72 EnCase Forensic Version 6 11 User s Guide Table Pane Menu The Table Pane command on the View menu displays the Table Pane menu The table pane contains a collection of context sensitive tabs The context is driven by the tab displayed in the tree pane The table pane menu is context sensitive as well Each of the tabs in the Table pane has a corresponding tab in the Table pane tab bar and a corresponding command on the Table Pane menu HH Table E Report ux Gallery 2 Timeline f Disk 4 Code Table displays the Table tab in the table pane It displays by default Report displays the Report tab in the table pane It displays by default Galler
22. ai MOG800B BMP Yes BMP Bitmap Image Picture 540 d MOG800x BMP Yes BMP Bitmap Image Picture 541 d PAG6106 BMP Mo BMP BitmapImage Picture 542 MoGs00Bx BMP No BMP Bitmap Image Picture 543 i OkG700 BMP No BMP Bitmap Image Picture 544 d MOdG9000 BMP Yes BMP BitmapImage Picture 545 8 665 No BBS Bulletin Board Text Document 546 d ATG1100 BMP Mo BMP BitmapImage Picture 547 d CLG1100 BMP Mo BMP Bitmap Image Picture E 2 Place the cursor anywhere in the In Report column and right click for a dropdown menu In Report Ctrl R In Report Invert Selected Items Ctrl Shift R 43 Copy Ctrl C gg Export Copy UnErase i Bookmark Data Ctrl B Activate Single Files Create Hash Set View File Structure Analyze EFS SS show Columns Column gt Sort Select Item Space Go to Parent BkSp 446 EnCase Forensic Version 6 11 User s Guide 3 Select In Report On the Table pane the In Report column entry changes to a true value 4 Click the Report panel to see its contents Report Multiple Files Open a case and display its contents in the Table pane 1 Check the boxes next to the record numbers to include in the report 538 539 541 544 and 545 in the figure 3 Report E Gallery lt Timeline Disk ig Code ars Fiter E aed ud wi 538 La MOG750 BMP No BMP Bitmap Image Picture M 539 MoGs00B
23. A coordinated set of glyphs designed with stylistic unity A font usually comprises an alphabet of letters numerals and punctuation marks G Globally Unique Identifier GUID A GUID is a pseudo random number used in software applications While each generated GUID is not guaranteed to be unique the total number of unique keys 22s or 3 4 x 10 is so large that the probability of the same number being generated twice is exceptionally small Glossary of Terms 529 GREP An acronym for search Globally for lines matching the Regular Expression and Print them GREP is a command line utility originally written for use with the Unix operating system The default behavior of GREP takes a regular expression on the command line reads standard input or a list of files and outputs the lines containing matches for the regular expression The GREP implementation in EnCase has a smaller subset of operators than GREP used in Unix GUID See Globally Unique Identifier H Hash A method used to generate a unique identifier for the data the hash value represents There are several standardized hashing algorithms EnCase uses the 128 bit MD5 hashing algorithm which has 2 128 unique values This ensures that the chance of finding an identical hash value using a different data set is exceptionally small Hash Sets Collections of hash values for groups of files Hexadecimal A numeral system with a radix or base of 16 usual
24. Close Case 177 152 EnCase Forensic Version 6 11 User s Guide Overview of Case Structure An evidence case has a tripartite structure consisting of an evidence file a case file and EnCase program configuration files The case file contains information specific to one case It contains B pointers to one or more evidence files or previewed devices E bookmarks E search results B sorts E hash analysis results B signature analysis reports Note A case file must be created before any media can be previewed or evidence files analyzed Indeed one of the most powerful features of the program is its ability to organize different media so they can be searched as a unit rather than individually Case Management Before starting an investigation give consideration to how the case is accessed once it is created For example more than one investigator may need to view the information To accomplish this evidence files can reside on a central server Creating temporary export and evidence folders allows file segregation and control A temporary folder holds any transient files created during an investigation The export folder provides a destination for data copied from the evidence file Create an evidence folder to store evidence Temp and Export folders are built when a case is created Case Management 153 Concurrent Case Management The program can open more than one case at a time Each case appears in the Table pane and
25. HOOG Root Entry Select Item Space OG BDocumentSumr Goto Parent BkSp op BSummaryInforr To view or mount OLE files 1 Navigate to the OLE file you want to view or mount 2 Continue with step 2 of Viewing File Structures The file structure of the OLE file displays and component files or layers in the compound volume folder can be opened and displayed in the view of your choice 302 EnCase Forensic Version 6 11 User s Guide Viewing Compressed Files EnCase applications can mount compressed files including WinZip zip GZip gz and Unix tape archive tar files The contents are displayed as long as the container is not password protected Only the modified date and times are shown on gz and tar files as the compression processes do not store any other dates or times GZip files are not labeled by name only by their content file type and a gz extension For example decompressing the file document doc gz displays the uncompressed doc file Bookmarks J Search Hits i Records Devices ep Secure Storage Keywords Report E5 Gallery Timeline Z Disk 4g Code 4 Name es NN SDL Single Files E d E npds zip 43 Copy Ctrl C a Export Copy UnErase rr Bookmark Data Ctrl B View File Structure xj Create Hash Set This file has a GZ signature Continue parsing View File Structure Send To Calculate unallocated space x Analyze EFS
26. New open la Save Print se Add Device Q Search 3 Logon Refresh gt lt Delete Update gt EnScript Types ig EnScripts File Signed gt x d Report E2 Gallery Timeline f Disk 4g Code A Search Hits 3Records fZ Devices VD secure Sto4 gt Name Preview J n exl al DE Phone Numbers 2 7 1 S unallocated Clusters OQfce 3RI XHYBoMb VA DIKE BoMb Big ThumbiBig Thumb Unallocated Clusters rou ee with 4 dg year 12 gj Unallocated Clusters NvscP e 3L V beebomBy n t bomB Big Thumb Big Thumb Unallocated Clusters MoL Bore n Eo amp Unallocated Clusters S8 b 3 md i BoMby r 4 BoMb Big Thumb Big Thumb Unallocated Clusters HD Stopscript o SetUp OO Enterprise E Text oc Transcript E Picture Report C Console F Details a Output Lock Codepage 0 196 D 0141230910 F8 16 A6 29 AC 19 ZB 64 17 58 2E 9F C5 B3 40 15 6C D 77 EA FB 81 FB 4F ES 67 F4 OD C6 69 s jotta X YAR 1 v D 0sg Ei a 0141230940 58 4F OB 60 E D9 E6 AF E6 3C Dl 54 46 42 87 56 BO 23 EC 1 EC E6 76 57 7B 95 DD DZ 79 C3 X0 gUs e HTFB V fi isvU YOyk 141230970 59 EC 3C Fl AE EB AC AZ 14 42 A8 88 04 DA 85 EE AZ CA 58 EO F6 78 24 7E 07 4F 83 GA AE CO i fi oc B icEX xf 0fSe LsG BQpOpy B LFZ d 0141231030 56 C3 D4 38 FS 55 BS 1D E8 BS Fl AO C9 OE 80 22 3B 00 08 70 9C 96 SO Al CD 07 BC FD 08 FS 886Un f pe P tMers 01412310
27. sharren redmond Home Forum Knowledge Base Bug Tracker My Profile Request Form Support Portal Tutorial LogOut Administer v Notes about the Faculty Search Workshop on Secure Software Development The Guidance Software Support Portal includes the EnCase User Hardware and EnScript e EUIVAXL ELLLLLLLLLLI e New Record for the Largest orums our new bug tracking system a knowledge base and other important tools and links This site CVE Entry brings valuable resources and message boards into one convenient location allowing law e ALook at MITRE ZZs OVAL enforcement and corporate security professionals to exchange ideas ask questions and provide Block Admnistration Schemas A Weak Proof of solutions Thousands of skilled and experienced users are registered on the boards reviewing posts every day and can x Sa Compliance offer their expertise on the functionality of EnCase software forensic hardware issues and EnScript writing The z See Virtualization Is Successful Guidance Software Support Portal is an important resource for the forensic analyst e Submit Poll Because Operating Systems fc ELSE Are Weak Welcome Open Source Outclassing 123 reads Firmware Announcing EnCase Lab Edition e Guidance Software Home Page more e Download Center ino herrera at 2008 04 03 22 21 News Items My Account Hello EnCase Users e N V D Information amp Responses Guidance Softw
28. ts Files Containing Index Terms Stemming f Files Containing Index Terms Diacritic Match f Files Containing Index Terms Umlaut fE Files Containing Index Terms Exact Match _ f Files Containing Index Terms Any distance x 2 Double click on the condition you would like to use All of the Index Conditions use the same dialog Edit Conditions xj Body Contains maoo Cancel 3 Enter the term you want to search for and click OK When complete the Table pane lists files that meet the condition requirements E Table Report Ez Gallery 4 Timeline f Disk ig Code In File File Name Filter TPE ENA Dos LJ 1 j Bomb Making Instruction Bomb Finder htm Web Page LJ 2 3 Stuff to do doc Bomb Finder doc Word Document The Filter column shows the condition that was run Analyzing and Searching Files 367 Generating an Index Open a case containing evidence files 1 2 If you know the files you want to specifically index select them in the Table pane Home I Bookmarks 4 gt Name ote File Extents Pern4 P 1 Film Canister Fireball files DOM Entries 7 2 Anarchist Book doc dog J Bonnie and Clyde NI 31 Bomb Making Instruction oC Bonnie Wi 4 3 Film Canister Fireball htm DL Clyde NI 51 stuff to do doc A E Select Tools Index Case File Edit View Tools Help iL New ZZ Oper 4l Index
29. 04 29 2003 05 04 29 2003 05 Kimberly Stone ki deci pee support O 18 3 RE Where are the True False False RE Where are the 04 29 2003 03 04 29 2003 03 35 Mike Ciaramitaro lt i Message 19 HB RE Entry 964 is no True False False RE Entry 964 is no 04 29 2003 01 04 29 2003 01 Mike Ciaramitaro lt LOD Read RE Block Size 20 RE Tell me somethi True False False RE Tell me sometl 04 29 2003 11 04 29 2003 11 Mike Ciaramitaro lt oc feature requests integrated into list L 21 Q FW Can you prepa True False False FW Can you prepa 04 29 2003 08 04 29 2003 08 13 Mike Ciaramitaro lt OC Read 22 RE bug True False False RE bug 04 29 2003 08 09 04 29 2003 08 09 Sharren Redmond roD Fw 23 Q RE version 4 13 n True False False RE version 4 13 n 04 29 2003 08 04 29 2003 08 07 Jeffrey Misner lt jef HOT RE More on the missing Checksum error 2 new build as of 25th True False False newbuldasof25th 04 28 2003 09 49 04 28 2003 09 49 QA Team QATea 00 a RE Safe True False oT 04 25 2003 05 44 04 25 2003 05 44 QA Team lt QaTe Emails and their attachments can be accessed and used for investigative purposes Export to msg The Export to msg option for mail files and mail files attachments lets you preserve the folder structure from the parsed volume down to the entry or entries selected This option is available
30. Add the evidence files to one case View Cases Subtabs Devices Right click any evidence file row and select Edit Disk Configuration PF ww P n The Disk Configuration dialog appears 230 EnCase Forensic Version 6 11 User s Guide 5 In Disk Configuration right click on the appropriate disk configuration then click New 6 Enter the start sector and size of the selected disk configuration and then click OK Validating Parity on a RAID 5 The Validate Parity command checks the parity of the physical disks used to assemble the RAID 5 Thus if the RAID 5 was rebuilt with a missing disk this feature will not work To check the parity 1 From the Cases tab right click the RAID 5 volume icon and then click Validate Parity 2 The validation process status displays in the Thread Status line at the bottom right of the EnCase main window RAID 10 RAID 10 arrays require at least 4 drives implemented as a striped array of RAID 1 arrays Acquiring Virtual PC Images With Microsoft Virtual PC 2004 you can run multiple PC based operating systems simultaneously on one workstation Users save images of these virtual PCs in a fashion similar to VMware EnCase applications treat Microsoft Virtual PC 2004 images as devices to be submitted to the same investigation as physical devices Virtual PC can create flat and sparse files both of which are supported transparently by EnCase applications Add Virtual PC files via the Add
31. B DH 96 08 26 amp B DH 96 09 06 amp B DH 96 09 09 amp B DH 96 09 13 amp B DH 96 0 x b The Picture Tab The Picture tab of the View pane displays the contents of an image file r Text amp dlHex foo A Transcript Report C Console died e eos The Report Tab Navigating the EnCase Interface The Report tab displays a detailed list of file attributes in the View pane rme ghe ow rese renee Icora fere oar lock Dose LJANI Nome 104 0421 _MG JPG File Ext JPG File Type JPEG File Category Pieture Descnption Pie Archive 1s Deleted No Last Accessed 06 04 02 05 04 30PM File Created 05 14 02 11 02 304M Last Written 14 25 02 04 06 000M Entry Modified 06 04 02 05 50 00M Pie Acqured 07 03 02 11 10 098 Loges Size 06 758 inalged See 06 758 Physical Size 06 064 Starting Odert 0C C283589 File Extents 1 Permissions ves References 0 Physical Location 60 622 528 PhysicalSector 1 134 418 E Hurter x Fi 10067 Code Page 0 Ful Path Hurter XP Hunter XPVCDocuments snd Settings Bob MunteriLocal SettingsWoplicstion Dana MicrosomcD BurringiHunter Pics Chnstina Oetewt 104 0421_IMG PG 15 Duplicate No 15 Interval No IsOverenter No Permissions Name Gob Humar w 1 5 21 127927 2021 1580010081 854245190 1004 Property Allow Percisenns J cLM P FLM pref Name Syatom 1518 Property Allow Pa m EAM REALM end Name Aamineslrators Li 1532504 Property
32. B Other enables you to specify your own time format Current Time contains the current time in the time format selected Show True contains the symbol indicating a value of true in table columns displayed in the Table tab of the Table pane Show False contains the symbol used indicating a value of false in table columns displayed in the Table tab of the Table pane Installing EnCase Forensic 35 Backup Files contain the maximum number of files stored as backup files when a case is saved Debug Logging contains the various settings that determine where debugging is logged Color Tab This tab enables you to associate colors with various case elements Colors Default Colors Bookmark Search Hit Index Query Hit Code Comments Style Logical Style Slack Style Report Logical Style Report Slack Filter Frame Filter Text Figure 2 Default Colors contains a list of case elements that can be associated with a color Double clicking on a listed element opens the Color Palette dialog so you can choose and associate a color with the listed case element 36 EnCase Forensic Version 6 11 User s Guide Fonts Tab of the Options Dialog This tab enables you to associate fonts with various case elements Installing EnCase Forensic 37 Default Fonts contains a list of case elements that you can associate with a font Double clicking on a listed element opens the Font dialog so you can choose and associa
33. Codepage MW 1 40659 1 ooo Sree EP rm enm yr fiessees rrt Dw D uE Dw D uE Dw uE t oOrCe reece see mte E 110 amp 5 2 8 F 8 2 8 1 F F E B 4 B 8 7 8 8 B C 94 E F1 As 3 9 4 2 8 BGs Br e tt nnn n ht Bener ener Owen 220GuE Dw D uE Dw Q uE t oQrQrsseettm eee eee eee 5 Z B F Beesleeseen nnn nnn nnn Oo aj I L Status Line The status line provides details on the physical and logical drive location of a selection The status line displays at the bottom of the main window Figure 17 The Status Line where 1 is the status line and 2 is the cursor in the View pane driving the content of the status line 2 1 Case 12222333331 GSI DOC 102033 10 0 36 21 E 1 070306 145010x0409 ini P570 LS 70 CL70 SO 000 FOO LE 1 Navigating the EnCase Interface 97 The file being examined in your EnCase application drives some of the status line content The location of the cursor in the content of the file being examined and content selected by the cursor also drives some of the status line content The status line content of the file being examined includes E Name of the case E Name of the device E Name of the volume B Path to the file m Filename The status line content relative to the beginning of the file being examined includes B Physical sector PS displays the sector number of the physical sector relative to the beginning of the physical disk B Logical s
34. D U 2 5 141231000 6B FO 17 78 1B DE 85 F El AS F8 47 7C 15 DF C 4F 70 79 12 42 C2 89 46 SA 92 15 64 07 09 k x P amp Big Thumb Big Thumb Unallocated Clusters PS 314453 LS 314453 CL 4907 SO 209 FO 141231313 LE 4 To view your search hits B Click the Search Hits tab in the menu bar or B Click View Cases Sub TabsSearch Hits Exclude Files Sometimes a keyword search returns more files than are useful to report Hide these files from view by excluding them Run then view a keyword search 1 Select files to exclude then right click the view 2 Select either Exclude or Exclude AII Selected Analyzing and Searching Files 361 v Show Excluded Show Deleted Delete Delete Delete All Selected Ctrl Delete Exclude Ctrl E Exclude All Selected Ctri Shift E Export Tag File Ctrl T View Search Hits Bookmark Selected Items Show Columns Column gt Sort gt Select Item Space Go to Parent Selecting Exclude All Selected displays a second option dialog x Start From C Root Folder 2 items Current Folder 2 items Cancel 3 Select the appropriate option and click OK The selected files disappear from view Show Excluded Files Excluded files are not deleted They are merely hidden from view To see them again select the Show Excluded function To show excluded files 1 Select Sho
35. Device H Log Record Total Sectors 32 256 Read errors 0 Write errors 0 Verify errors 0 Cancel You must reformat this drive in order to use it again Verifying Evidence Files Verify Evidence Files checks CRC values of selected files It is a way to ensure that evidence is not tampered with Verified CRC information is written out to a log file If a CRC verfication fails a notification appears and you can log the error to the console bookmark tab or log file Acquire the evidence files 1 Click Tools Verify Evidence Files The Verify Evidence Files file browser appears Verify Evidence Files 2 x Look in C3 Evidence 3 rpm My Recent Documents Desktop My Documents ww Pr My Computer JBig Thumb Case Big Thumb E01 bootfloppy EO1 V6 Hunter XP Forensic Case A Hunter XP EO1 E kill linux Little Thumb Case Little Thumb E01 Lotus Notes LO1 S suse 8 2 with Reiser FS ED1 Suse 8 2 with Reiser FS E02 a DITE Fie name Class1 01 Places Files of type Evidence File J Cancel ly za 2 Select one or more evidence files and click Open 522 EnCase Forensic Version 6 11 User s Guide When files are verified a status report appears Verify Evidence Files Creating a LinEn Boot Disc You have a copy of a Linux distribution See Creating a LinEn Boot Disc on page 47 for more information Using EnCase To
36. Dy index dat m 104 03 31 02 06 16 29AM E DOK Records LAS D index dat LI 104 03 31 02 06 16 27AM Goo B Hunter XP C 4 O adswrapper is 6266 06 04 02 05 15 23PM oG B c CJ 5 g arrow_yi 1 iF 108 06 04 02 05 19 13PM EO C Internet Explorer Windows LJ 6 JL adsEnd 1 js 33 06 04 02 05 15 26PM FOIS History C 7 D index dat lt 138 OGG Cache C 8 usediets 1 gf 0915 05 14 02 10 00 16AM C 9 uswomenctrI 1 oi 763 05 14 02 10 00 16AM CJ 10 expedia 1 gif 871 05 14 02 10 00 16AM CJ 11 i pan swest on south 1 aiF 89 06 04 02 05 35 39PM CJ 12 O hotmail 7 3 css 493 03 31 02 06 34 15AM CJ 13 G btn_zoomnotch 2 aif 6 06 04 02 05 35 40PM DJ 14 G icon_maps_large 1 gif 170 06 04 02 05 35 05PM CJ 15 i Grey_Rebuild 1 gif 9768 06 04 02 05 41 31PM 1 amp CE Innin mi 11 cif 243 mani in mos Text zz Hex iu Doc i Transcript E Picture Report C Console T Details G Output C Lock MP Codepage RT 3 4 gt EnSeript Q Hits T Filters E conditions Queries A Text Styles 87278 E Sg EnScript 88000 z e6028 Enterprise 88044 Examples 88066 Forensic 88088 Indude 88110 8813 Main 88154 88176 88198 00 00 00 00 00 00 00 00 00 8822000 00 00 00 00 00 00 00 OO 00 OO OO O0 00 00 00 00 00 OO 00 00 00 8824200 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8826400 00 00 00 00 00 00 O0 OO 00 OO OO O0 OO O0 00 OO DO OO 00 00 00 8828600 00 00
37. Edit Condition Make the modifications you want then click OK The modifications are saved to the database Export Selected to File Click Export Selected To File to export a report definition from the database The Export To File dialog opens Export To File Export File 270 EnCase Forensic Version 6 11 User s Guide Click the Browse button LJ to specify where to save the report definition then click OK Import from File Click Import from File to import a report definition to the database The Import from File dialog opens Import From File Import File Click the Browse button LJ to locate the file to import then click OK Time between Queries Minutes Enter or select the number of minutes you want to pause between queries Time Between Queries Minutes WinEn WinEn is a standalone command line utility that captures the physical memory on a live computer running a Windows operating system Win2k or higher The physical memory image captured by WinEn is placed in a standard evidence file along with the user supplied options and information WinEn runs from a command prompt on the computer where you want to capture the memory WinEn has a very small footprint in memory and it is typically run from a removable device such as a thumb drive Although this method makes minor changes to the computer running WinEn this is the most effective way to capture physica
38. Hardware Recommendations Subscribe to public bugs Read more 202 reads the University of Teesside UK The Support Portal s landing page contains a section of useful links including B Guidance Software Home Page m Download Center download software hardware manuals boot disks support articles etc E My Account register your dongle id to receive up to date software by email m NVD National Vulnerability Database Information and Responses E Guidance product Version Matrix check compatibility of different product versions B Hardware Recommendations hardware recommendations for EnCase Forensic and EnCase Enterprise E Subscribe to Public Bugs Guidance Software 543 Customer Service The Guidance Software Customer Services Department is staffed by highly trained friendly staff capable of resolving any problem regarding your order Hours and contact information are listed below Phone 626 229 9191 Fax 626 229 9199 Email customerservice guidancesoftware com Internet http www guidancesoftware com support cs_requestform aspx Hours Monday through Friday 6 00 a m to 5 00 p m Pacific Time Training Guidance Software offers a variety of professional courses for the beginner intermediate and advanced user of all its applications In addition to providing a solid grounding in our software we also provide our students with accepted best practices for investigation report generation and eviden
39. Hex displays the text as hexadecimal digits rather than characters Unicode displays the text in Unicode encoding ROT 13 Encoding decodes ROT 13 encoded text to ASCII text HTML renders HTML coded as it appears in a browser HTML Unicode renders the HTML coded as it appears in a browser using Unicode encoding Picture Picture is a parent object that contains child objects representing various file formats that can be used when displaying bookmarked content as a picture or graphic Picture displays the bookmarked content of the following file formats mg JPG B GIF E EMF m TIFF E BMP B AOL B ART m PSD This is based on the file extension or the file signature of the file that contained the book marked content Base64 Encoded Picture displays the bookmarked content in Base64 Unicode format UUE Encoded Picture displays the bookmarked content in UUE format Bookmarking Items 409 Integers Integers is a parent object that contains child objects representing integer encodings that can be used when displaying bookmarked content 8 bit displays the bookmarked content as 8 bit integers 16 bit displays the bookmarked content as 16 bit Little Endian integers 16 bit Big Endian displays the bookmarked content as 16 bit Big Endian integers 32 bit displays the bookmarked content as 32 bit Little Endian integers 32 bit Big Endian displays the bookmarked content as 32 bit Big Endian integers 64 bit displays the bookmarked
40. Search expression GREP Symbols wFFFF Unicode character xFF Hex character Name Any character Phone Numbers Any number 0 9 Repeat zero or one time Repeat at least once Case Sensitive IV Unicode Az A ae z Repeat zero times IV GREP Unicode Big Endian XYZ Either X Y or Z YZ Neither X nor Y nor Z IV Active Code Page urF amp ju Literal character ab Group ab together for UrFz m n Repeat m to n times Unicode View alb Either a or b 0000 002F 003A FFFF 0028 40 1 0020 0029 0020 0020 002D 40 1 4 0000 002F 003A FFFF iri zi 3 Select the desired options for example Case Sensitive or GREP Analyzing and Searching Files 349 4 Select the Keyword Tester tab Edit Phone Numbers ose D Ve V Tog o Iz Arabic Windows Iz Baltic D05 Ez Baltic 150 Iz Baltic Windows Ez Central European DOS Ez Central European 150 E cbocunerts and sensi of Load d 5 Locate a test file that contains the search string enter the address into the Test Data field and click Load The test file is searched and displays in the lower tab of the Keyword Tester form Note Hits are highlighted in both text view and hex view Edit Phone Numbers Ez Arabic Windows Ez Baltic DOS Ez Baltic 150 Iz Baltic Windows Ez Central European DOS Ez Central European 150 hl EnCase File Report lt hl gt lt table cl
41. The shortcut hot key is Alt S Search opens the Search dialog where you determine which files are searched define keyword searches perform email searches hash computing and O OF 0 0 O0 other search options 78 EnCase Forensic Version 6 11 User s Guide Logon opens the Logon wizard where you can log on to the enterprise LAN Logoff logs you off the enterprise LAN Wipe Drive opens the Wipe Drive wizard where you select media you want to completely erase After using Wipe Drive you must format the media Verify Evidence Files opens the Verify Evidence Files browser where you select files to be verified Verifying checks the Cyclical Redundancy Check CRC values to ensure evidence was not altered Create Boot Disk opens the Create Boot Disk wizard to create a LinEn boot disk Mount as Network Share Client opens the Mount as Network Share dialog where you specify the IP address of the server to be mounted Options opens the Options dialog where you define global settings for EnCase such as default file locations for a new case fonts to use O O ru highlighting colors seen in the table pane O date and time formats Refresh updates the EnCase views based on the content of the folder displayed in the lists or trees Use this command when you use Windows to add files to the folders of an open case EnCase is not aware of these changes until you refresh the lists and trees Help Menu The Help menu provides co
42. The changes made in the Device Attributes dialog appear in the Table pane 4 Ifthe list of devices to be added is correct and complete click Next otherwise click Back as necessary to revise values The devices defined in the Add Device wizard are added to the case Acquiring Once a device is added its contents can be acquired Beyond an acquisition you can add EnCase evidence files and raw evidence files to the case Raw evidence files can be reacquired so that they are translated into EnCase evidence files complete with metadata and hash values Palm Pilots can also be acquired The LinEn utility also lets you do network crossover in collaboration with EnCase Field Intelligence Model and you can use LinEn to perform disk to disk acquisitions EnCase evidence files originating in other cases can be added as well All of these acquisitions are discussed in this section Working with Evidence 197 Types of Acquisitions There are several types of acquisitions that comprise EnCase evidence files E01 and associate these files with the currently opened case There are several additional digital evidence file types that are associated with the currently opened case but do not involve acquisitions except when reacquired There are also logical evidence files LEF usually constructed during a preview The local sources for acquisitions create E01s Local sources include B Local drives using a write blocker B Palm Pilot E Netwo
43. The installer places a startup icon on the desktop In addition a number of folders and files are installed in the target folder during installation Certs Folder m EnCase pcert Config Folder B AppDescriptors ini B FileSignatures ini B FileTypes ini E Filters ini E Keywords ini B Profiles ini B TextStyles ini Storage Folder m CaseReport ini E Compromise Assessment Module ini DifferentialReport ini E SweepEnterpriseWEbReport ini Forensic EnScript Component Folder B Case Processor EnScript E File Mounter EnScript E Index Case EnScript E Scan Local Machine EnScript E Webmail Parser EnScript 26 EnCase Forensic Version 6 11 User s Guide Uninstalling the Examiner The uninstaller works only on identical software versions m Have backups of evidence and case files prior to making any modifications to any software on an examination machine An update of the program is also required B Close any running versions of the EnCase program insert the software s installation media and wait for the installer to come online 1 Open Windows Control Panel and double click Change or Remove Programs 2 Select the EnCase version being removed and click Change Remove The EnCase uninstall wizard runs and the first screen displays 3 Enter or navigate to the software s location in the Install Path field The default is C Program FilesNEncase6 4 Click Next The EnCase uninstall wizard runs EnCase v6 4 SOFTWARE
44. oe Entries 1 ago In File File File p Is Last Boc Name Filter Report Ext Type Category Signature Description Deleted eem BOL C BA 1 L Quota ifl poor File Invalid Cluster Hidd onos HO s Dbx Files BA 2 Quota Q Tim File Stream System iw Gzip Tar Evid P en d d non RA 31D Quota O Copy UnErase File Stream System Loar 8A 4 Ly objId Copy OBSS Copy Folders x Mi S obiid o LL Bookmark Data Ctrl B Source Mi 6 D Reparse Bookmark Folder Structure Irhumbs dbiExtend EAD Reparse R Copy 7 Files 392 bytes Activate Single Files C Program Files EnCase Export al Create Hash Set ake p Create Logical Evidence File Replace first character of FAT deleted files with Analyze EFS Split files above MB Mount as Network Share so a Expand Contract Space TE Copy only selected files inside each Folder Expand Al Iv Show Errors Contract All T Burn to Disc Set Included Folders Num 4 Destination Folder Include Sub Folders Shift Num Lie Archive Files Inglude Single Folder Ctrl Num Status Completed Console Start 10 08 06 07 16 05PM Stop 10 08 06 07 16 05PM T Note Log Record 292 EnCase Forensic Version 6 11 User s Guide 1 In the Tree pane select the folder or folders to copy and unerase 2 If desired in the Table pane clear any individual files that should not be copied and unerased 3 Right click in the Table pane
45. when complying with discovery issues one must perform a physical restore not a logical one Logical restores are less desirable as they cannot be verified as an exact copy of the subject media When a drive is restored for the purposes of booting the subject machine a physical restore is the correct choice Whether restoring a drive physically or logically restore the evidence files to a drive slightly larger in capacity than the original Subject hard drive For example if restoring a 2 gig hard drive image restore the image to a 2 to 4 gig hard drive Restoring media to a drive that is substantially bigger than the subject media can prevent the restored clone from booting at all possibly defeating the purpose of the restore Preparing the Target Media Preparation of the target media where the image is going to be restored is essential for a forensically sound restore m The target media must be wiped B For logical restores the target media must be FDISKed B For logical restores the target media must be partitioned and formatted with the same file type system as the volume to be restored e g FAT32 to FAT32 NTFS to NTFS etc B For physical restores do not FDISK partition or format the hard drive Instead start your EnCase application and restore the image physically to the target media Working with Evidence 255 Physical Restore Restoring a physical drive means that the application will copy everything sector by s
46. 0 exe e exe Eg Table Report E Gallery Timeline ty Code 2 2 Page 1 1 Case 1 D 1 DRIVER drive setup exe 2 Case 1 D 1 DRIVER drive usbest drive 2 0 exe 432 EnCase Forensic Version 6 11 User s Guide To use folders to organize bookmarks 1 Doone of the following To move a bookmark and remove it from the source bookmark object drag the bookmark to the report in the destination folder To copy a bookmark from the source bookmark object right click and drag the bookmark to the destination folder and select Copy Here The bookmark is now in the destination folder so its entry now appears in the Bookmarks table associated with the destination folder 2 Select the destination folder in the Bookmarks tree The bookmarks in the folder appear in the Bookmarks table 3 Inthe Table pane click Report The bookmarks in the folder appear in the report Organizing Bookmarks You can organize bookmarks into folders in the Tree pane These folders appear in the Table pane but a table entry cannot be dragged into other table entries Instead drag the table entry into a folder on the Bookmarks tree see Using a Folder to Organize a Bookmark Report see Using a Folder to Organize a Bookmarks Report on page 431 Organizing bookmarks involve the following tasks Copying a table entry into a folder on page 433 Moving a table entry into a folder see Moving a Ta
47. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8830800 00 00 00 00 00 00 OO OO 00 OO OO O0 00 O0 00 00 DO OO 00 00 00 8833000 00 00 00 00 00 DO 00 OO 00 OO DO OO OO 00 OO 00 00 00 DO 00 00 8835200 00 00 00 00 00 00 OO OO 00 OO OO O0 00 O0 OO OO DO OO 00 00 00 8837400 00 00 00 00 00 00 00 OO 00 OO DO OO OO O0 00 00 00 OO DO 00 00 8839600 00 00 00 00 00 OO OO OO 00 OD OO O0 OO O0 00 OO DO OO 00 00 00 8841800 00 00 00 00 00 DO 00 00 O0 OO DO OO OO 00 00 OO 00 OO DO 00 00 8844000 00 00 00 00 00 OO OO 00 00 OO OO OO OO 00 OO DO OO OO OO OO DO l zi Q VS Test CaselHunter XP C WINDOWS system32 config systemprofile Local SettingslTemporary Internet Files Content IES UFK38B83 wuv3is 1 tgz PS 898387 LS 898324 CL 224581 SO 000 FO 0 LE 88211 354 EnCase Forensic Version 6 11 User s Guide Common columns in the Report pane are Name is the file name and extension Filter shows if a filter was applied In Report is a True or False indicator of files present in a report To change the selection enter CTRL R Search Hits indicates whether the file contains a keyword search word Additional Fields when True indicates that additional fields were found in the record Data contained in the Additional fields varies depending on the type of data in the record Message Size the message size in bytes Creation Time is the date and time the message was created in mm dd yy hh mm ss fo
48. 07 01 12 12 16AM 01 07 01 12 25 06AM 01 28 05 08 05 08AM 01 28 05 08 05 02AM 01 28 05 08 04 58AM 01 28 05 08 05 04AM 01 28 05 08 04 52AM 01 28 05 08 05 24AM 01 28 05 08 04 46AM 01 28 05 08 05 10AM 01 28 05 08 04 48AM 01 28 05 08 04 42AM 01 28 05 08 05 28AM 01 28 05 08 05 14AM 01 28 05 08 04 44AM 01 28 05 08 04 56AM 01 28 05 08 05 18AM 01 28 05 08 05 20AM 01 28 05 08 05 32AM 01 28 05 08 04 50AM Note that the entry in the Is Deleted column is marked True This second figure shows the display that results when two filters Deleted Files and Files Before n are run The names of both filters appear in the Filter column of the Table pane E Tabte amp Report EZ Gallery Timeline Ba Disk 1 Code toro ux Deleted written mm CJ 1 HARDBALL PRC Yes 11 09 00 12 09 14PM 05 14 02 11 34 12AM 3 2 Dy MINEHUNT PRC Yes 11 09 00 12 09 14PM 05 14 02 11 34 12AM CJ 3 O PUZZLE PRC Yes 11 09 00 12 09 14PM 05 14 02 11 34 12AM CJ 4 D Giraffe prc Yes 11 09 00 12 09 14PM 05 14 02 11 34 12AM CJ 8 O SUBHUNT PRC Yes 11 09 00 12 09 16PM 05 14 02 11 34 12AM CJ 6 O HOTSYNC HLP Yes 11 09 00 12 09 16PM 05 14 02 11 34 12AM CJ 7 O HsaPr di Yes 11 09 00 12 09 16PM 05 14 02 11 34 12AM C 8 O HOTSYNC CNT Yes 11 09 00 12 09 16PM 05 14 02 11 34 12AM LJ 9 O hslog20 dll Yes 11 09 00 12 09 16PM 05 14 02 11 34
49. 0j F SERL TT d Y jy PSTest od al KU WpdeAM QW 4C ORAOAQO G exON etvs ZU gYvyo AX IRE Y Ca f8 6C V CED a cC DANY L5 Indexing BEX kijCb oD CM W E 2M0 8 y EVID Cesos y61W7 CEU jvOLeH s HHS 5087 MAD kefe Wh e CEMICEM ORO Y 3p F Mv o My internet serch o00008ftC o6 Ai se OVIDD 0 Us Y Oe Mu SG CH gH AB29OlenZ amp UGL4 QE Su YenEIciN a M JeSt BEa q FIO e yoedfzeiz 25M D ERI GO Hy Kerneres ooo0ce eje E boto amp M SO E O TH ZK y 3C v AE ONS GAZ Ev ADi Si dApoeR Lo DI E tbls OYRYn 6 E BORUP g lota 00000c2 G amp U qT8 0095395 CUD SUN ES faal A_ CIM amp VBOY AERA GEVFYX Ore jfaze30 AguEQGO DIV amp A QAYT vor EWES A z x re Outsdein poog Cic vp amp i a0 f et 1O KO E nd SUcOrtia TOSHGA iA TgEo 600 WAXD OO0an2 O WY SIKS Tte P SUPPE y Sefebeot rryeton ek AC tene volet VARAR aec jy SmokeTest CESUITZUNTCEUESUUYS 1 0 Q 0 0000 FOO t 3 390 EnCase Forensic Version 6 11 User s Guide Supported SafeBoot Encryption Algorithms EnCase s SafeBoot decryption feature supports these encryption algorithms m AES256 FIPS m AES256 m DES B RC5 12 Rounds B RC5 18 Rounds CREDANT Encryption Support File Based Encryption EnCase provides a way for you to access CREDANT encrypted data on Windows devices You can obtain the CREDANT API installer from CREDANT Technical Support http Awww credant com EnCase
50. 11 User s Guide Check the Verify file signatures box in the Additional Options area in the lower right then click Start The signature analysis routine runs in the background On completion a search complete dialog appears The dialog presents search status times and file data sear 03 Status Completed Console Start 06 27 2007 12 35 19 PM Stop 06 27 2007 12 35 36 PM Note Time 0 00 17 Files 13 685 Log Record Cancel You can view these same data in the console B Text Sl Hex Ry Doc Mj Transcript E picture Report a4 Searching Status Completed Start 09 07 07 10 37 078M Stop 09 07 07 10 37 098M Time 0 00 02 Files 65 Records 2 Files scanned 53 Signature mismatches 0 Search Hits 469 Added Search Hits 0 Viewing Signature Analysis Results Part 1 Click Set Include in the Tree pane to display all files in the case t s App Descriptors gt EnScr 4 gt X t3 Home Beokmarks Q4 B eFile Extents Permissio4 gt Boo i At this level Set Include selects everything in the evidence file 1 Organize the columns in the Table pane so that the Name File Ext and Signature columns are next to each other 2 Sort columns with Signature at first level File Ext at second level and Name at third level Analyzing and Searching Files 335 Scroll up or down to see all the signatures
51. 12AM CJ 10 CendMgr dl Yes 11 09 00 12 09 16PM 05 14 02 11 34 12AM CJ 11 O cmos21 0LL Yes 11 09 00 12 09 16PM 05 14 02 11 34 12AM CJ 12 O DATCNZO DLL Yes 11 09 00 12 09 16PM 05 14 02 11 34 12AM CJ 13 D addcn30 dl Yes 11 09 00 12 09 16PM 05 14 02 11 34 12AM CJ 14 O BAKCN20 DLL Yes 11 09 00 12 09 16PM 05 14 02 11 34 12AM 15 3 HOTSYNC EXE Yes 11 09 00 12 09 16PM 05 14 02 11 34 12AM Navigating the EnCase Interface 135 A similar result would occur if you were to combine a filter and a condition AND OR Filter Logic You can toggle between displaying only entries that match all the active filters AND functional logic or entries matching any of the active filters OR functional logic When you run multiple filters a Matches Any option displays in the toolbar edit 7X Delete Sf Query This option employs OR logic to display files To employ AND logic click the Matches Any toolbar option The option changes to Matches All edit X Delete SF Query T matches all Changing Filter Order Filters run in the order in which you selected them To change this order 1 Click Display to show the active filters 2 Left click the filter you want to move 3 While holding the left mouse button down move the selected filter to a new position 136 EnCase Forensic Version 6 11 User s Guide A three filter list with all items selected is shown below The next example shows the same three filters
52. 229 Rebuild a Hash Library 338 Recover Folders on FAT Volumes 244 Recovering a Database 301 Recovering Folders 243 Recovering Folders from a Formatted Drive 246 Recovering NSF Passwords 377 Recovering NTFS Folders 244 Recovering Partitions 246 Recovering UFS and EXT2 3 Partitions 246 Reducing the Number of Images Per Row 316 Redundant Array of Independent Disks RAID 524 Reference Manuals and Release Notes 528 Regular Expression 524 549 EnCase Forensic Version 6 11 User s Guide Reinstalling the Examiner 28 Remote Acquisition 231 Remote Acquisition Monitor 233 481 Repairing a Database 302 Report Multiple Files 439 Report Single Files 438 Reporting 437 Resetting Columns 125 Restoring Evidence 250 Role Page of the New Case Wizard 165 Root 524 Running a 32 bit Application on a 64 bit Platform 43 Running a Filter 132 Running a Package 504 Running Conditions 142 Running WinEn 267 S S MIME Encryption Support 389 SAFE Page of the Logon Wizard 160 SAFE Right Click Menu 160 SafeBoot Encryption Support Disk Encryption 381 SafeBoot Setup 379 380 Saving a Case 174 Saving a Case and the Global Application Files e 174 Saving a Case With a New Name or New Location 174 Scan Local Machine 490 Search Hits Report 444 Search Options 352 Search Page 197 Searching Email 366 368 Searching Entries for Email
53. 2b until all the interface elements are configured 3 Click OK Working with Non English Languages 467 The interface is now configured to display non English content Configuring the Keyboard for a Specific Non English Language Windows lets you configure a keyboard for a specific non English language Once the keyboard is configured you need a keyboard map or familiarity with the keyboard layout of the language These instructions are for Windows XP Configuring Windows 2000 NT and 2008 is similar My Documents LY Control Panel A 3 My Recent Documents gt zm Switch to Classic View e My Pictures L My music See Also a Ws My Computer Windows Update J My Network Places Help and Support 3 o Other Control Panel Set Program Acc Defaults Options Provides optic ve computer ad E 2 Printers and Fax accounts Q9 Help and Support J9 seach I Run Pick a category Fy oS Printers and Other Hardware User Accounts Appearance and Themes Network and Internet Connections Date Time Lanquage and Regional Options Add or Remove Programs Accessibilil Security Center e A Je e e QV tS Regional and Language Options 2x Regional Options Languages Advanc Standards and formats This option affects how some programs format numbers currencies dates and time Select an item to match its preferences or click Customize to choos
54. 3 IM F Quickreacquisition Read ahead Working with Evidence 205 Name contains the name of the EnCase Evidence File that contains the image resulting from the acquisition of the underlying device Evidence Number contains the investigator assigned number for the EnCase evidence file produced by the acquisition in progress Notes contains the investigator s notes regarding this EnCase evidence file File Segment Size specifies file segment size of the evidence files It is useful for controlling the size of evidence files Start Sector specifies the first sector of the content you want to acquire Stop Sector specifies the last sector of the content you want to acquire Password determines if the EnCase evidence file is password protected and what password is used Entering a password enables Confirm Password This password cannot be reset Block size determines the block size of the contents where CRC values are computed Error granularity determines the portion of the block is zeroed out if an error is encountered The error granularity will be at the most the same value as Block size or an even fraction of Block size Quick reacquisition allows you to quickly reacquire in order to change the file segment size or to apply or remove a password Read Ahead reads the acquired content so that errors can be detected before the block is acquired or CRCs are calculated and hashed Output Path determines the path
55. 342 05 31 06 04 LA zj Unallocated Clusters U T5A2048 1 530 tHt LA zj Unallocated Clusters U T5A2048 1 540 tHt 14 Z Unallocated Clusters Class3CA2048 1 430 U 6 LO Bomb disti gt E Text Gitex kaj Doc 2 Transcript ES Picture Report 4 5 Enscript F Fit4 Little Thumb Little Thumb Unallocated Clusters a 53g EnScript 73 Enterprise 48 1 430 Examples 3 Forensic Include Main Yv 4 b E Little ThumbALittle Unallocated Clusters PS 13574 L5 13574 CL 1691 SO 495 FO 5147631 LE 8 2 Select a keyword in the Table pane 3 Click Report 452 EnCase Forensic Version 6 11 User s Guide Results of the selected Table pane keyword appear in the Report pane Dates with 4 digit year Little Thumb Dates with 4 digit year Page 1 1 Little Thumb Little Thumb Unallocated Clusters 05 31 06 2 Little ThumbLittle Thumb Unallocated Clusters 48 1 530 3 Little ThumbLittle Thumb Unallocated Clusters 48 1 540 4 Little ThumbLittle Thumb Unallocated Clusters 48 1 430 4 Selectan item in the Table pane An report containing the file name address and the contents of the Tree pane keyword displays t E Text amp lHex 3 Doc E Picture 4 Little Thumb ittle Thumb Unallocated Clusters a 48 1 540 5 Right click in the Table pane 6 Complete the dialog and click OK Reporting 453 Check the fields to display in the repor
56. 5 21 1861619204 450663806 4267828160 500 SDOIIE SystemCertificates BOOS My BDO Windows pb Themes OLJC3 Cookies Using the Dixon Box The Dixon Box is located in the tab above the Report pane and shows how many files are selected and how many files exist in the case If no files are selected in the open case the box looks like this C 0 191 In this picture three of the same 191 files are selected wan Note To quickly select or deselect all files in a case click the Dixon Box 122 Modifying the Table Pane EnCase Forensic Version 6 11 User s Guide The Table pane displays the contents of selected files and folders File Edit View Tools Help iNew 23 Open ig save Print Add Device Qy search J Logon Refresh E cases Sr EnScript Types x Report EZ Galery Timeline fZ Disk 4 Code Home Entries I Bookmarks Q Search Hits 34 Hac E Ee m3 2 m nd ofeFile Extents Permissions JReferenc4 gt 1 O desktop ini ini 08 22 03 07 55 07AM_ 08 22 03 07 55 07AM 07 09 04 11 29 46PM dat 08 22 03 07 55 07AM 08 22 03 07 55 07AM_ 07 09 04 11 29 46PM y i 45 EnScript T Filters Conditions Queries A Text Styles Local Settings al O 2 3 index dat og Application Data GOOG History Lo Histery IES Lo Ten
57. 6 11 User s Guide O On the main window click View gt File Types or O On the Tree pane click File Types The File Types tree appears Right click on the root of the File Types tree and select New The Viewer File Type dialog appears In the Viewer box click Installed Viewer and select the file viewer to associate with the file type from the File Viewers tree Enter a description and the file extensions of the file types If the file viewer displays pictures check Picture Click OK The files entered are now associated with the selected file viewer View Pane The View pane provides several ways to view file content 8 The Text tab allows you to view files in ASCII or Unicode text E The Hex tab allows you to view files as straight Hexadecimal B The Doc tab provides native views of formats supported by Oracle Outside In technology The Transcript tab displays the same formats as the Doc tab but filters out formatting and noise allowing you to view files that cannot display effectively in the Text tab B The Picture tab allows you to view graphic files Viewing File Content 297 Viewing Compound Files You can view the individual components of compound files within an evidence file Compound files are typically comprised of multiple layers containing other files You can view these times of compound files in the EnCase application E Registry Files B OLE Files E Compressed Files B Lotus Notes B MS E
58. 80 04 08 GO 00 03 00 00 80 05 08 00 00 00 80 06 08 00 00 03 00 00 80 07 08 00 00 00 80 08 08 00 00 O3 00 00 80 09 10 00 00 00 80 Oa 10 00 00 03 00 00 80 Ob 10 00 00 00 80 Oc 10 00 00 03 00 00 80 Od 10 00 00 00 80 Oe 10 00 00 03 00 00 80 Of 10 00 00 00 80 10 10 00 00 03 00 00 80 11 10 00 00 00 80 12 10 00 00 03 00 00 80 13 10 00 00 00 80 14 10 O0 00 03 00 00 80 15 10 00 00 00 80 01 10 00 00 04 00 00 80 02 10 00 00 00 80 03 10 00 00 04 00 00 80 04 10 00 00 00 80 05 10 00 00 04 00 00 80 06 10 00 00 00 80 07 10 00 00 04 00 00 80 08 10 00 00 00 80 05 10 00 00 04 00 00 80 Oa 10 00 00 00 80 Ob 10 00 00 UE 04 00 00 80 Oc 10 00 00 00 80 0d 10 00 00 NH cus o o o oo oo o o o o PEPEPEPE o o o HRP PN o oOooooooooooooooo00o0 OR 4 QOO OO 00dO0d0d0ownr ooooooooooooooo ooo0o0o0o0o0oo0oooo0oo o A o o o o o o A o o Viewing File Content 325 Locally Encrypted NSF Parsing Results A successfully parsed locally encrypted NSF looks like this in Entry view B 6C XE 80c H QPc ANH 3596 Ref x E ASKE ds fL gm eee orte tenet aeE2 3 ordeo lia Me QS SR 128M M ee c e 0NSSysAdmin 1 topics uu iE s GRO Ar Oe Arte tmpid idet 4gGQF 1ea 48GPc r e MemostdNotesLtr Truet 1Fw Backup of newly registered ID file for Circus Teodorovich d Cino7CN Circus Teodorovich Ozdomino7 domino7 circus teodorovich domino7 local Lotus Notes Re 2 SMIE Emall Snge Fles cteodoro Strong
59. 96 08 02 BIG PROBLEM BA B BA 96 0 1 SMELLS BAD B BA 96 08 13 BIG PROBLEMS B BA 96 10 13 95 Y GOOD B BA 96 10 1 B BA 96 10 21 3 MORE MAY BE B BA 96 10 26 B BA 96 10 31 95 GOOD B BA 96 11 B BA 86 11 03 Y GOOD B BA 96 11 23 B BA 96 12 01 B BA 964 243 B BA 9612 15 v GOOD B BA 97 03 01 B BA 97 03 14 SLOW B BA 97 03 27 BBA S 4 24 O BOY 16 000 B BF 97 01 04 B BF 97 01 05 3 GOOD BOY B BF 97 01 11 95396 B BF 97 0 36895 B BF 97 01 17 96895 B BF 97 01 24 96896 B BF 97 01 28 95836 B BF 97 02 03 95836 B BF 97 0 ROM VK PD 6 OZ B BF 97 03 06 96 B BF 97 03 09 B BF 97 03 12 B BF 97 03 13 B BF 3 14 4 OZ ia 190 B BF 97 03 20 B BF 97 03 24 on 3 29 B BF 97 03 25 96 S BJ SE 4 01 S BJ 96 05 31 B DH 96 04 01 amp B DH 96 04 07 amp B DH 96 04 09 amp B DH 96 04 11 amp B DH 96 04 18 amp B DH 96 04 26 amp B DH 96 04 29 amp B DH 95 04 30 amp B DH 96 05 07 amp B DH 96 05 10 amp B DH 96 05 16 amp J B DH 96 05 23 amp B DH 96 05 27 amp B DH 96 05 31 amp B DH 96 05 04 amp B DH 96 06 06 amp B DH 95 06 10 amp B DH 96 0614 amp B DH 96 06 20 amp 340 FOR 2 OZ OF POT B H 96 07 01 amp B DH 96 07 07 8 B DH 96 07 13 8 B DH 96 07 18 amp B DH 96 07 24 amp B DH 96 0 7 29 amp B DH 96 07 30 amp B DH 96 08 04 amp B DH 96 08 13 amp B DH 960814 amp 660 FROM RV B H 96 08 18 amp
60. Accessories gt System Tools gt Character Map The Character Map utility appears Click the desired character then click Select The character is added to the Characters to Copy box Repeat step 2 to add more characters Click Copy Paste the characters where you want to use them Creating and Defining a New Text Style Text styles determine how file contents appear in the Text and Hex tabs of the View pane Fle Edt View Toot Meb UE App Descnptors 4 Archive Files T EnScnpt Types A Elle Signatures Al Fife Types I Fite Viewers X Hash Sets Keywords Y Machine Profiles dw Packages DS Projects d gares coves Suo Tots Table Pane View Pane Biter Pane X Close Tab Bf Show Name 4 Previous Tab Next Tob Chr Ct Shift Tab Cti Tab SA ax Amaan aps Color Demart Lagen Screen Shack Screen Ure Wrap luogka Report xu Sek Report f the trode tem beme se c0 nw Ambue Code Page Code Paga G Unicode es 1 x 06 C Unicode Big Ercan E C other 3 4 4 a SP a OP Er Ee C CL C CITOR XM 9 nw Attrutes Code Page 12 j Contrai European Mac 469 470 EnCase Forensic Version 6 11 User s Guide To create and define a text style 1 Click View Text Styles The New Text Style dialog appears Enter a Name for the new style Enter the desired character in Default Character Click RTL if
61. Allow Prarmissons JFCLBA 951 f 01 yn Bob Hunter 5 1 5 21 1223272121 1580010091 854245790 1004 Preperir ener Name mone Li 551 5 21 122327 2021 1500018831 054245390 513 Property Group 113 114 The Console Tab EnCase Forensic Version 6 11 User s Guide Use the Console tab to view output status messages when running EnScript programs 3 Text amp lHex kaj Doc 3 Transcript E Picture Report Details Gl 4 02 21 07 02 21707 02 21707 02 21707 02 21 07 02 21 07 02 21 07 02 21 07 02 21 07 02 21 07 02 21 07 02 21 07 02 21 07 02 21 07 02 21 07 02 21 07 02 21 07 02 21 07 02 21 07 04 20 08PM 04 20 08PM 04 20 08PM 04 20 08PM 04 20 08PM 04 20 08PM 04 20 08PM 04 20 08PM 04 20 08PM 04 20 08PM 04 20 08PM 04 20 08PM 04 20 08PM 04 20 08PM 04 20 08PM 04 20 08PM 04 20 08PM 04 20 08PM 04 20 08PM 02 21 07 04 20 08PM Info 02 21 07 04 20 08PM Warn mium The Details Tab Info Info Info Warn Info Warn Info Warn Info Info Info Warn Info Info Warn Info Warn Info Warn File File File File File File File File File File File File File File File File File File File File File Mounter Script started a Mounter Mounter Mounter Mounter Mounter Mounter Mounter Mounter Mounter Mounter Mounter Mounter Mounter Mounter Mounter Mounter Mounter Mounter Mounter Mounter Lib Lib Lib Lib Lib Lib Lib Lib Lib Lib Li
62. BMP No BMP Bitmap Image Picture 540 i MoGs00x BMP No BMP Bitmap Image Picture NI 541 I P4G6106 BMP No BMP BitmapImage Picture NI 542 al MOGSDOBX BMP Mo BMP BitmapImage Picture 543 i OkG700 BMP No BMP Bitmap Image Picture M 544 3 Moc9000 BMP No BMP Bitmap Image Picture A 545 8 BBS No BBS Bulletin Board Text Document 546 ad ATG1100 BMP Mo BMP BitmapImage Picture 2 Place the cursor anywhere in the In Report column and right click for a drop down menu Cl In Report Ctrl R In Report Invert Selected Items Ctrl Shift R A3 Copy Ctrl C E Export Copy UnErase rr Bookmark Data Ctrl B Activate Single Files Create Hash Set View File Structure Analyze EFS Show Columns Column Sort gt Select Item Space 3 Go to Parent BkSp 3 Select In Report Invert Selected Items In the Table view In Report column the selected files change to True 4 Click the Report tab to see its contents Reporting 447 Note This menu selection is an XOR switch It changes the status of the In Report column to the opposite of what it was Changing Report Size To change the presentation size right click anywhere in the report display and select Zoom In or Zoom Out BA Copy Ctrl C a Export Zoom Out Num Viewing a Bookmark Report Open a case in the Table pane 1 Click the Bookmarks panel The report appears E Table i Gallery Timelin
63. Bug Tracker tab https support guidancesoftware com forum project php in the Support Portal Home Forum Knowledge Base Y Bug Tracker My Profile Request Form Support Portal Tutorial Log Out Administer Y Buas iN on Features 45 04 30 2008 Public Bugs EnCase Forensic niente ic Uc Knowledge Base You can find answers to Frequently Asked Questions FAQs and other useful product documentation in the Knowledge Base You can also submit your own articles to help other EnCase users To access the Knowledge Base click on the Knowledge Base tab https support guidancesoftware com directory in the Support Portal Home Forum Knowledge Base Bug Tracker My Profile Request Form Support Portal Tutorial Log Out Administer v 542 EnCase Forensic Version 6 11 User s Guide From here you can browse search and write Knowledge Base articles Online Technical Support Request Form Please use the Technical Support Request Form to request assistance from a Technical Services engineer To access the form click on the Technical Support Request Form https support guidancesoftware com node 381 in the Support Portal Home Forum Knowledge Base Y Bug Tracker My Profile Request Form Support Portal Tutorial Log Out Administer v Other useful links sharren redmond Home Forum Knowledge Base Y Bug Tracker MyProfile Request Form Support Portal Tutorial Log Out Administer w
64. CA OF 7C A3 AZ 54 45 8D DO 12 CO AZ B6 BO EE 2D F8 OC 8E 23 6F 90 Fl 6A 13 4D D yDO TEOD Ac T i 5 o0 j Mx 141231420 9A 6B AD 34 8D 8D 04 6D BS DF F8 l6 3A EA AC 71 C7 ES OS SA EO 6B D3 SF BC 28 D2 C4 34 71 ik 4 m Be oqQp Z k M 0 4q 0141231450 40 C4 C8 BD 32 CC CA BS F6 03 CF BF 6D 7F 65 97 D8 75 AO B3 A6 3B 8B 9C ZF 9D 7D AO FB FC AR4ZifpS izme Gu 2 lt e 0 141231480 BC 6D OF lC 65 Al E6 ES 55 34 00 DD 42 14 37 C7 9D 70 ZA 4E 83 lE 9B 85 97 E3 F5 BS 08 9F ha e seU4 YB 7CUp Nf 86 Y 0141231510C2 97 80 83 02 88 49 92 49 OF D9 43 EE ll 7F BS 12 F8 86 68 95 AB 03 41 E 9F 51 9F A3 3A ef I I UCi Du sthe AgYOYE 0141231540 3D 46 4B AS CE 46 B3 20 98 CB SA 3C 92 37 El 14 30 7C 12 A8 C6 FS FC AE FE 48 OF 30 82 8C FReiF Z 7 0 EG ObH 0 0141231570 70 A3 BB 31 19 DO AE 35 D4 B6 SF 99 03 CC 3B D3 DC 65 1E 30 7F 37 83 45 38 F4 DB 7C Bl 55 pin l Deshqo I dte o7 FESS U 141231600 5C 10 AS C2 94 Fl B2 BS FC 40 16 CA 1D F2 84 44 16 B3 92 AC SE 96 OB 3A 6B 19 AS D6 6D D6 Y n g D 3 2 k Gnd 0141231630 2D 2B D6 7E DS lE 66 DF Bl 09 28 95 8E 8E EB 8C F2 E6 2C D6 CF A OS 3B EO 6E 3E F6 F4 87 t f6 228 de Gig an gt adt 141231660D93 AC A 36 54 SF 06 37 93 AZ BE AE F6 56 B3 DS Bl E 24 F5 23 75 BD FA AB SA AA 06 DO 20 U S6T 7 c3556V i OfuM Zi D l0141231690D 90 34 B4 35 FO EZ 08 7A 98 7E 4F EB Ol E6 SD D3 7E DO 28 B3 D9 OO F SF AC 03 DF 08 7D n 58 z 0 aD
65. Case Ctrl cases i ial Webmail Parser The Index Case dialog appears 2x Options Noise file Selected entries only Exclude Name Exclude Extension Include Known Files Include Internal Files If you want only to index selected files select Selected Entries Only If you want to include files with a known file signature select Include Known Files If you want to include internal files that are part of the NTFS file system select Internal Files If you want to exclude any file names a Right click in the Exclude Name list and select New b Enter the name of the file and click OK 368 EnCase Forensic Version 6 11 User s Guide 7 If you want to exclude files by a particular file extension a Right click in the Exclude Extension list and select New b Enter the name of the file extension and click OK 8 To set the noise file click the Noise File tab 2x Options Noise file Language LY Dutch Dutch noise nld LY English UK noise eng LF English US noise enu LY French French noise fra LY German German noise deu LY Italian Italian noise ita LY Neutral noise dat LY Spanish Modern noise esn LY Swedish Default noise sve Path CAWINDOWSYSystem32Ynoise enu ml N 9 Select the Language File and if necessary modify the Path 10 Click OK The Evidence file starts indexing The thread bar indicates the estimated remaining time in the op
66. DLLs and MAC file to the target device as well 394 EnCase Forensic Version 6 11 User s Guide Supply the parameters as follows CEGetBundle L XURL aAdminName AAdminPwd DAdminDomain dDuid sScid uUsername oOutputFile oOutputFile IOutputPwd E Legacy mode for working with pre 5 4 server installs L URL Device Server URL e g https xserver credant com 8081 xapi Administrator user name AdminPwd Administrator password AdminDomain Administrator domain optional required only if the CMG Server is configured to support multiple domains MUID Machine ID for the target device also known as the Unique ID or hostname SCID Shield CREDANT ID also known as DCID or Device ID Name of the forensic administrator OutputFile File to save the key material in OutputPwd Password to encrypt output file Here is a command example cegetbundle L X https CredantServer 8081 xapi a Administrator Achangeit d CredantWorkstation Credant local sCI7M22CU u Administrator o C V CredantUserKeys bin iChangelt 3 Place the bin file downloaded from the CREDANT server in a path accessible from the Examiner machine Open EnCase and create a new case or open an existing one You must have EnCase Decryption Suite installed on the Examiner machine that decrypts the CREDANT encrypted data Note In legacy mode you must execute this utility for each user targeted for investigation on the target device while speci
67. Data File 2 xi Search expression Extensions Search expression GREP Symbols wFFFF Unicode character xFF Hex character Name Any character Rencode Software Data File Any number 0 9 Repeat zero or one time Repeat at least once A z A through Z x Repeat zero times IV Case Sensitive Iv GREP XYZ Either X Y or Z xYZ Neither X nor Y nor Z i Literal character ab Group ab together for m n Repeat m to n times yiew alb Either a or b 57 4F 48 00 52 43 2D 3 Change the Search Expression and other fields as desired and click OK Performing a Signature Analysis To begin a signature analysis click Search RV oo x I Selected entries ont somes t Selectedrecodsor y i Records r Keyword Search Options Email Search Options Search each entry for keywords V Search for email Search each record for keywords Recovered deleted Selected keywords only keywords V Outlook PST Iv Search file slack Outlook Express DBX Use initialized size IV Exchange EDB Undelete files before searching v Lotus NSF Search only slack area of fies in Hash Library Iv aor P Had Options v MBOX IV Compute hash value Additional Options 3 I Recompte hash values v verify file signatures i Identify codepages Search for internet history 334 EnCase Forensic Version 6
68. Device Wizard In the Wizard navigate to the folder containing Virtual PC files vhd and add them as an EnCase evidence file CD DVD Inspector File Support EnCase applications support viewing files created using CD DVD Inspector a third party product Treat these files as single files when adding them as zip files or as composite files when using the file viewer Drag single files into the application Acquiring SlySoft CloneCD Images You can add raw CD ROM images created using SlySoft CloneCD to a case When adding these images you can specify the pre sector bytes post sector bytes and start byte of the image Working with Evidence 231 Acquiring a DriveSpace Volume DriveSpace volumes are only recognized as such after they are acquired and mounted into a case On the storage computer mount the DriveSpace file as a volume and then acquire it again to see the directory structure and files To acquire a DriveSpace volume 1 10 11 12 A FAT16 partition must exist on the forensic PC where you will Copy Unerase the DriveSpace volume A FAT16 partition can only be created with a FAT16 OS such as Windows 95 Run FDISK to create a partition then exit reboot and format the FAT16 partition using format exe Image the DriveSpace volume Add the evidence file to a new case and search for a file named DBLSPACE 000 or DRVSPACE 000 Right click the file and copy unerase it to the FAT16 partition on
69. E Rijndael 256 E Blowfish CREDANT Encryption Support Offline Scenario If the machine to be investigated is not on the network with the CREDANT server you must obtain the CREDANT keys and store them in a location accessible to the Examiner machine Before you begin You must install the CREDANT Library Installer to run the utility with the appropriate DLLs You can obtain the installer from CREDANT technical support You must have EnCase Decryption Suite installed on the Examiner dongle that will decrypt the CREDANT encrypted data You must obtain the URL for the CREDANT Mobile Guardian CMG Device Server You must obtain the Administrator username and password The CREDANT administrator must have Forensic Administrator privileges as specified in the CMG Server Web Interface for CMG v5 4 and later servers The administrator must have Security Administrator privileges for the v5 3 server You must obtain the Administrator s login domain for CMG 6 0 and later servers only the Machine ID for the target device MUID the Shield CREDANT ID SCID the Username that the key material is being downloaded for and the Password to use to encrypt the output bin file 1 At a computer that has communication to the CREDANT Server run the utility CEGetbundle exe from the Windows command prompt CEGetBundle exe is supplied by CREDANT in the CREDANT Library Installer which also installs the DLLs necessary for the decryption Copy the
70. EnCase Forensic Version 6 11 User s Guide App Descriptors At a very basic level app descriptors are the hash files of a computer s EXE and SYS files They work in conjunction with machine profiles and are used to identify forbidden or undesirable software on a computer s hard drive They are particularly useful in detecting viruses and other malware and for ensuring a specified disk image is not changed The EnCase program can identify malicious programs via a hash analysis It compares an application s B unique digital identification B its calculated known and stored hash value with that captured in a snapshot When the hash values match the program returns the process name its hash value and machine profile to which it belongs An app descriptor categorizes executables by hash value to enable positive identification of executables running on a system App descriptors works in concert with machine profiles Profiles are inventories of what should be running on a specific machine Together the machine profile and app descriptor lets an examiner know what should be running and what is running on a specific computer Manually Create App Descriptor To run this feature you must have created a machine profile and you must know the hash value of the file you intend to process 1 Click View gt App Descriptors to see a list of app descriptors File Edit View Tools Help ijNew 2 Open bal Save Print 9 Add Device Q Search 3
71. EnCase Interface 125 Hiding Columns You can hide individual columns Right click the column you want to hide and click Hide A View Search Hits Bookmark Selected Items ES show Columns Column Hide Ctrl H Sort Set Lock Select Item Space Reset T Goto Parent BkSp Fit to Data ELLE Auto Fit All The column in which the cursor was located is hidden Auto Fit All Columns The Auto Fit All feature expands the width of each column so no data are hidden Ae Miew Search Hits Bookmark Selected Items ES Show Columns Column Hide Ckrl H Sort gt Set Lock Select Item Space Reset F Go to Parent BkSp Fit to Data Note The difference between Auto Fit All and Fit to Data is that with Auto Fit All each displayed column is expanded to show its entire contents Fitting Columns to Data At times you may want to adjust the width of only one column To view the entire column select Fit to Data A View Search Hits Bookmark Selected Items ES Show Columns Column Hide Ctrl H Sort gt Set Lock Select Item Space Reset F Go to Parent BkSp Auto Fit All Note If a column contains too much data widen the column by clicking Fit to Data in the Column submenu 126 EnCase Forensic Version 6 11 User s Guide Resetting Columns Restore columns to their default order and width by using reset Manually resize a column by dragging the column separator
72. EnCase Temp RUNSYSP BAT 5 Split files above MB 640 Use initialized Size 0 files lt Back Finish Cancel Copy displays the number of files to be copied and unerased and the total number of bytes that comprise the file or files being created Path contains the path and filename within the file system of the investigator s machine of the file or files created Split files above contains the maximum length not exceeding 2000MB of any file created by the Copy Unerase operation When the total number of bytes comprising an output file exceeds this value the additional output is continued in a new file Use Initialized Size determines if only the initialized size of an entry will be searched as opposed to the logical size which is the default or the physical size This setting is only enabled for NTFS file systems When an NTFS file is written the initialized size can be smaller than the logical size in which case the space after the initialized size is zeroed out 286 EnCase Forensic Version 6 11 User s Guide Copy Folders Dialog Use this dialog when copying entire folders selected in the Tree pane while preserving the folder structure Copy Folders x GWrgemiedtnsenEgat al Copy only selected files inside each Folder lv Viewing File Content 287 Source displays the Entities folder being copied and unerased Copy displays the number of files to be copied and unerased and the to
73. GU DU ER see epe GR Cede st dente 182 Getting Ready to Acquire the Content of a Device sssssssssseeeeneneeereenenerneenen 183 Previewing ssaese 183 Live Device and FastBloc Indicators ccsescssesssesessseessseteesesesesnsnenesessscsceceseeesssseeeceseeeeneneseseseanenenes 184 Previewing the Content of a Device ssssssseeeseeeeeeeeeeneneneneette tenente 184 Add Device Wizard orori toe tme eee tette epe Se We rob Vp i terres cetedus 185 Sources Page of the Add Device Wizard ssssssssessssseeeeeeeeene i 186 Sessions Sources Page of the Add Device Wizard 188 Choose Devices Page of the Add Device Wizard ssssssssssssseeeeeeeeenenenenen 190 Preview Devices Page of the Add Device Wizard 192 Adding a Devices sei Une Ae eene IE AIR ete tete ieri estt 193 Completing the Sources Pages narom seen a E T 194 Completing the Sessions Sources Page ecscssesssesesceeeeseeteesesesesnensesessssscececeeeseenesesesesnsnensnenesseeeees 195 Completing the Choose Devices Page eene 195 Completing the Preview Devices Bageri iNet eiiie odini aneas aaia EE eai aant EEEE 196 AA CQqUITIDB esoo Tiia e aE RITE AFE LEE OaE E S eS EEUU D NE AESA TEE Ei aE 196 Types ot ACGUISH OMS i riets ossoa are REO OIN ENTE UR SEMPER e I EET E EEEE R 197 Doing a Typical Acquisition Moree tiesne oiai e ee en TE e tee ode o epu Piet tertie te ise inet 197 Acquisito Wizard c5 ois ciam tok ons nee
74. Internet browser depending on the output options you chose 490 EnCase Forensic Version 6 11 User s Guide Sweep Enterprise The Sweep Enterprise EnScript program Collects data from some named subset of the network tree B Saves the bookmarked data E Optionally create snapshots E Runs modules to extract data as bookmarks or exported files If you plan to run modules you must log on and open a case if you choose to deploy a servlet both the Windows servlet and Linux servlets must be available on your machine The Linux servlet must be available even if you do not have any Linux machines See the EnCase Enterprise Administrator Manual for the paths to the servlets on your SAFE machine To run the Sweep Enterprise EnScript program 1 Double click on the Sweep Enterprise object in the EnScript tree on the Filters Pane The Case Options page of the Sweep Enterprise wizard appears 2 If you need to change your user or SAFE a Click Change Safe The User page of the Logon wizard appears b Select the user enter a password if required then click Next The SAFEs page of the Logon wizard appears c Select the SAFE then click Finish 3 If you need to change your Role a Click Change Role The Role dialog appears b Select the desired role and click OK The Node to Sweep page of the Sweep Enterprise wizard appears 4 If you need to change the machines swept those that appear in Machines click Network Tree navigate to the ap
75. LinEn Main Screen appears 5 Select Server and press Enter 224 EnCase Forensic Version 6 11 User s Guide The message Waiting to connect appears 1 Connect this computer to the client 2 Run EnCase on the client click Add Devices Waiting to connect 6 On the forensic machine specify an IP address of 10 0 0 1 for the subject machine 7 Launch the EnCase application on the forensic machine 8 Create a new case or open an existing case 9 Right click on the Devices object and click Add Device 10 Select Network Crossover and click Next 11 Select the physical disk or logical partition to acquire or preview and click Next 12 Click Finish The contents of the selected device reached through the network crossover connection are previewed To acquire the content perform an acquisition see Specifying and Running an Acquisition Working with Evidence 225 Acquiring Disk Configurations Guidance Software uses the term disk configuration instead of RAID A software disk configuration is controlled by the operating system software whereas a controller card controls a hardware disk configuration In a software disk configuration information pertinent to the layout of the partitions across the disks is located in the registry or at the end of the disk depending on the operating system in a hardware disk configuration it is stored in the BIOS of the controller card With each of these methods 6 disk co
76. LinEn Utility The Linux EnCase client used for disk to disk or cable acquisitions Logical Evidence File A specialized form of an evidence file filled with user selectable files as opposed to a traditional evidence file which contains the entire contents of the device Logical Evidence files have the extension L01 M Malware Software designed to infiltrate or damage a computer system without the owner s informed consent Mount Mounting The process of making a file system ready for use by the operating system typically by reading certain index data structures from storage into memory ahead of time The term recalls a period in the history of computing when an operator had to mount a magnetic tape or hard disk on a spindle before using it N Network Tree The network tree represents the hierarchical organization of the underlying network and file structure New Technology File System NTFS The standard file system of Windows NT and its descendants m Windows 2000 E Windows XP E Windows Server 2003 m Windows Vista Node A node is the machine where the servlet is installed Notable File Bookmarks Bookmarks used to identify individual files containing important information to a case NTFS See New Technology File System P Pane Panes comprise the four quadrants to the interface E Tree pane E Table pane B View pane B Filter pane Panes contain tabs which alter the display of the data in
77. New Folder Expand Contract Space Set Included Folders Num Include Sub Folders Shift Num Include Single Folder Ctrl Num Note In addition to the menu there is a toolbar button labeled Show Exclude that toggles the hidden view 2 Select Show Excluded 442 EnCase Forensic Version 6 11 User s Guide Previously excluded files appear in Table view while exclude folders appear in the Tree view Excluded data are marked with a red X Se EnCase Enterprise Training File Edit View Tools Help L New 5 Open lal Save lt 3 Print e Add Device Q Search 33 Logon Refresh f Edit 9 Add Note gt Delete PI Show Excluded cases x EE Table Report Ez Gallery Timeline f Disk 4 Code i i4 Bookmark Home Entries L Bookmarks QQ Search Hi ibl k File Group 16 896 Jay s Bookmarks Pip NoName dont Bookmarks E Highlighted Data 16 914 33 Jay s Bookmarks Pip NoName OG Jay s Bookmarks k Highlighted Data 16 961 33 Jay s BookmarkslPip NoName Pipe Bomb Data E Highlighted Data 17 154 33 Jay s Bookmarks Pip NoName C3 Graphics E Highlighted Data 17 592 34 Jay s Bookmarks Pip NoName Lone Additional Graphics ace 4 File Group 92 160 180 Jay s BookmarkslPip NoName JQ seal local 01 07 08 1 File Group 98 816 193 Jay s Bookmarks Pip NoName 1 File Group 98 816 193 Jay s Bookmarks Pip NoName 1 File Group 127 488 249 Jay s Bookmarks Pip NoName k F
78. Non English Characters The EnCase application supports non English language use in the interface as well as for non English language content Fe E vew Tad Heb oo NET Search 3 Lon Case Options Global NAS Colors Fonts EnScript Storage Paths Enterprise Name Wipe Drive Case l Verify Evidence Files Examiner Name J Create Boot Disk fa s Mount as Network Share Client Default Export Folder Write block IDE channel C Program Files EnCaseS Export Write block USB Firewire SCSI drive Temporary Folder c Program Files EnCaseS Temp 1 Pe Options Bl Refres FS Cancel ME Le 00 4 D Font style Case Options Global NAS Colors Fonts EnScript Storage Paths Enterprise enda z Default Fonts Angsana New EET IE Status Bar and Tabs 2 Hp AngsanaUPC Z fitaic p Arabic Transparent Bold E Dialog Boxes O Arial Bold Italic E Trees e O Arial Black Ez Tables xl Ez Report Title Ez Report Fixed gt Sample Ez File viewers Ez Script Editor Script Western x Cancel 1 Click Tools gt Options gt Fonts The Fonts tab of the Options dialog appears 2 For each interface element listed in Default Fonts where you want to display non English a Double click the interface element The Font dialog opens b Change the font to Arial Unicode MS and click OK c Repeat step
79. Non English Language Support 465 458 EnCase Forensic Version 6 11 User s Guide Working with Non English Languages This chapter covers a specialized area of investigations working with languages other than English The Unicode standard attempts to provide a unique encoding number for every character regardless of platform computer program or language Unicode encompasses a number of encodings In this document Unicode refers to UTF 16 Unicode 16 bit Transformation Format Currently more than 100 Unicode code pages are available Because EnCase applications support Unicode investigators can search for and display Unicode characters and thus support more languages Other character codes besides 16 bit Unicode are supported for working with non Unicode non English language text Working with non English languages typically involves performing these tasks E Configuring non English language support B Creating and applying a new text style B Creating non English language search terms E Bookmarking non English language text m Viewing Unicode files m Viewing Non Unicode files B Using Code Pages in the Text and Hex tabs Working with Non English Languages 459 Non English Language Features EnCase Enterprise applications provide non English language support through various features including The Options dialog Fonts tab B Text styles Use text styles to modify the display of content B The text pane B The transcrip
80. PM kJ Share this folder Other Places Y Details Y 240 EnCase Forensic Version 6 11 User s Guide Hashing You can perform hashing before or after an acquisition so an investigator can determine if the device should be acquired or if the contents have changed You must run a preview if working within the Windows version of EnCase this is not necessary when hashing a drive using the LinEn utility Note If you are hashing the device locally using Windows a write blocking device such as the FastBloc write blocker prevents the subject device from changing Hashing via a crossover network cable or locally using the LinEn utility is useful if a write blocking device is not available There are two ways to hash a drive m Hashing the subject drive using LinEn m Hashing the subject drive once previewed or acquired Hashing the Subject Drive Using LinEn This allows the investigator to know the hash value of the drive Before you begin B LinEn is configured as described in the setup topics B autofs is disabled B The investigator has identified the subject drive to be hashed To perform a hash using LinEn 1 Navigate to the folder where LinEn resides and type 1inen in the console to run LinEn The LinEn Main Screen appears 2 Select Hash The Hash dialog appears 3 Select a drive then click OK The Start Sector dialog appears 4 Accept the default or enter the desired Start Sector and then click OK The S
81. RD deste e es RII n a ee RU 198 After Acquisition Page octo e e RE i EH RR dbs SEX T GU Ie n a e ee reri senate 199 Search Page ce env Hein ete P Pre ER EATUR rette Eit en ia 201 OPtLONs P 204 Acquisition Results Dialog sse tenente nenne nennen 206 Opening the Acquisition Wizard seen nennen 207 Specifying and Running an Acquisition ssssssssssseeeeeeeeeennnnn nennen 208 Completing the After Acquisition Page of the Acquisition Wizard 209 Completing the Search Page of the Acquisition Wizard c cccscseseeseeseseeeseteteesesesneneneneseseenenenes 210 Completing the Options Page of the Acquisition Wizard ssssssssssseeeeeeen 212 Canceling an Acquisition iste eie ipo de tete debe ie E aie eed tel ied 213 Acquiring a Local Drives eee er ee Eire per beg ele ERE ES EE E Ee te te ER ERR 214 Acquiring Device Configuration Overlays DCO and Host Protected Areas HPA 214 Using a Write Blocket 5 eee aen nie Pene SE t geriet e n ee RE EE EE EN 215 Windows based Acquisitions with FastBloc Write Blockers s sess 215 Acquiring in Windows Without a FastBloc Write Blocker ssssssseeeeeeeee 217 Windows based Acquisitions with a non FastBloc Write Blocker sss 217 Performing a Drive to Drive Acquisition Using LinEn sees 218 Acquiring a Disk Running in Direct ATA Mod
82. Signature analysis identifies and organizes file signatures with reference to what it finds in E the signature table B the file header and B extension as they appear in the evidence file Match in the Legend column indicates data in the file header extension and File Signature table all match Alias means the header is in the File Signature table but the file extension is incorrect for example a JPG file with a ttf extension This indicates a file with a renamed extension The name in the Legend column below next to the asterisk displays the type of file indentified by the file signature Note An alias is preceded by an asterisk such as AOL ART Unknown means neither the header nor the file extension is in the File Signature table Bad Signature means the file s extension has a header signature listed in the File Signature table but the file header found in the case does not match the File Signature table for that extension The table shows possible results of a signature analysis Signature Analysis Table FileName Signature Table Header Entry Legend ball jpg FF DSFFE1 yaya Match leftshop gif 4A 47 04 0E JG AOL ART Alias flagfileph 5B 77 6D 71 wma Unknown userinfo bag 41 4F 4C 20 AOL IBad Signature Analyzing and Searching Files 337 EnScript Programming Language The EnScript language is a programming language and Application Program Interface APT designed to operate within the EnCase softwar
83. Structure Activate Single Files reate Hash Set Recover Folders Create Logical Evidence File Restore Hash Scan Disk Configuration Scan for LYM Verify File Integrit d Acquire N Modify time zone settings Mount as Network Share Rename F2 Expand Contract Space Expand Al act Al Set Included Folders Num Include Sub Folders Shift Num Include Single Folder Ctrl Num 6 Click Next until you reach the Options dialog xi Name Case Number SEVEN OF NINE 10 0 36 39 0 SEVEN_OF_NINE 10 0 36 39 0 Notes Eile Segment Size MB Compression 640 Burn Disc C None Start Sector Stop Sector Good Slower Smaller 63 488375999 zi C Best Slowest Smallest Password Confirm Password Block size Sectors Error granularity Sectors 64 zd 64 ES IV Generateimage hash Quick reacquisiticn M Read ahead Output Path praxis Acquisition SEVEN_OF_NINE 10 0 36 39 0 E01 E 7 Enter the remote acquisition information including a valid Output Path 8 Click the Remote acquisition check box 9 Click Next Working with Evidence 237 10 Enter a Username and Password for the remote share Remote Acquisition Credentials Pee ooo 12 Click OK Remote Acquisition Monitor Use the Remote Acquisition Monitor to check the progress of the acquisition 1 Double click Remote Acquisition Monitor and enter th
84. Styles Content displayed in these tabs is determined by selections made in the tree of the tab displayed in the Tree pane When the Text Styles tab displays in the Tree pane and you select the root of the Text Styles tree the Table tab of the Table pane displays a table containing the same folders displayed in the tree When a particular folder is selected in the tree the contents of that folder appear in the Table tab of the Table pane Navigating the EnCase Interface 101 Figure 20 Table Pane context where 1 the object selected in the tree on the Text Styles tab of the Tree pane determines 2 the content displayed in the table in the Table tab of the Table pane o o E Report Code i 3 SAFEs A Text Styles 4 gt x IEE Table SOA Text Styles Fite In Loge I50 Latin Report og ISO Latin Colors o0 Low Bit ASCII DIE RTL Unicode LOOB Unicode AY ISO Latin FTP A ISO Latin 120 A ISO Latin amp 100 A ISO Latin amp 80 A ISO Latin 60 A ISO Latin 40 102 EnCase Forensic Version 6 11 User s Guide Table Tab Columns Table tab columns are activated or deactivated by right clicking the table tab selecting Show Columns and selecting desired columns By default all columns are se
85. Support sse ntes 465 Configuring Interface Elements to Display Non English Characters sss 466 Configuring the Keyboard for a Specific Non English Language sss 467 Entering Non English Content without Using Non English Keyboard Mapping 468 Creating and Defining a New Text Style sssssssssssssssseeeeeeeeenenn nenne eene 469 Creating Non English Keywords sse nennen 471 EnCase Forensic Version 6 11 User s Guide Contents Testing a Non English Keyword sse tenentes 473 Querying the Index for Non English Content seen 474 Bookmarking Non English Language Text sse 475 Viewing Unicode Files a eere eame ed ette le are E e te eie ste eiu gre 476 Miewing Non Unicode Files 4 nee eerte ge erede edente rnit rere A EE 477 Associating Code Pages sonet ni ese eed egenis eten eie ritibus ete iti oe dts 477 CHAPTER 13 EnScript Analysis 479 EnSctipE Analysis 5otctedbotn ted fend nutre stetur bus Coe Dru 480 Enterprise EnScript Programs ccccccssscscsssesesescseseseenensnscseseseseseseseseeseeseececessesesesesesesenessseeeceeeeeeeesesees 481 Document Incident dice tt ete hom elem eign on uet e e tetera rp n terns 482 Machine Survey Servlet Deploy sse tenente 484 Q uick Snapshot ned ttm ttem hee i P ne I ne he teo rs e A neni eedem 488
86. The case name is used as the default filename when the case is saved The filename can be changed when the file is saved Examiner Name contains the name of the user acting as the investigator Default Export Folder contains the path and name of the folder where files are exported Temporary Folder contains the path and name of the folder where temporary files are created Installing EnCase Forensic 33 Index Folder contains the index file for any indexed file or collection of files Global Tab The Global tab of the Options dialog contains settings that apply to all cases Te MM ES Global Auto Save Minutes 0 None 10 Use Recycle bin For cases JV Enable Picture Viewer v Enable ART and PNG image display Flag Lost Files Enable Pictures in Doc View Invalid picture timeout seconds 12 Show True Show False Backup files 9 Debug Logging C off Stack C Heap Date Format MMIDDIYY C ppjMM YY Current Day 04 10 07 C Other MMjddlvy M Time Format 12 00 00PM C 24 00 00 Current Time C Other hh i mm sstt D1 55 21PM 34 EnCase Forensic Version 6 11 User s Guide Auto Save Minutes 0 None contains the number of minutes that constitute the interval between automatic saves of case files The automatically saved data is written to CBAK files Use Recycle Bin for Cases determines whether backup files are moved to the recycle bin and not overwritten when a
87. To do a crossover cable acquisition 1 2 3 Boot the subject machine from the LinEn boot disk Connect the forensic machine to the subject machine using a crossover cable In Linux ensure that the subject machine has an IP address assigned and a NIC card loaded appropriately by typing ifconfig eth0 then if no IP address is assigned assign one by typing ifconfig ethO 10 0 0 1 netmask 255 0 0 0 and check the IP address assignment again by typing ifconfig eth0 Navigate to the folder where LinEn resides and type linen in the console to run LinEn The LinEn Main Screen displays Using LinEn 57 5 Select Server and press Enter The message Waiting to connect should display 1 Connect this computer to the client 2 Run EnCase on the client click Add Deuices Maiting to connect 6 Specify an IP address of 10 0 0 1 on the forensic machine for the subject machine 7 Launch the EnCase application on the forensic machine 8 Create a new case or open an existing case 9 Right click on the Devices object and click Add Device 10 Select Network Crossover and click Next 11 Select the physical disk or logical partition to acquire or preview and click Next 12 Click Finish The contents of the selected device reached through the network crossover connection are previewed To acquire the content perform an acquisition as described in Specifying and Running an Acquisition 58 EnCase Fore
88. Types aj L Bookmarks E Text T LE Do not Show L E High ASCII Ej Low ascii LE Hex Unicode E ROT 13 Encoding El HTML CE HTML Unicode Li Picture REX p Case 3 D05 1 DRIVER 4 Comment contains text that describes the book marked content Data Type pane determines the data type of the book marked content Types tree contains objects representing the various formatting that can be used when displaying book marked content Note Details of the content of the tree is described in Bookmark Content Data Types Destination Folder determines the path to the folder where the bookmark is saved Contents displays the content of the bookmark in the format selected Bookmark Content Data Types The Types tree in the Bookmark Data dialog provides a list of supported data types The data types are organized by parent objects representing each class of supported data types Each specific data type is represented by a child object The formats interpret the underlying content The formats change the way that the data is bookmarked 408 EnCase Forensic Version 6 11 User s Guide Text Text is a parent object that contains child objects representing the formatting that can be used when displaying bookmarked content as text Do not Show hides the content of the bookmark This works for all underlying data types High ASCII displays the text in 256 bit ASCII Low ASCII displays the text in 128 bit ASCII
89. United States and other jurisdictions and may not be used without prior written permission All other marks and brands may be claimed as the property of their respective owners Products and corporate names appearing in this manual may or may not be registered trademarks or copyrights of their respective companies and are used only for identification or explanation into the owners benefit without intent to infringe Any use and duplication of this material is subject to the terms of the license agreement between you and Guidance Software Except as stated in the license agreement or as otherwise permitted under Sections 107 or 108 of the 1976 United States Copyright Act no part of this publication may be reproduced stored in a retrieval system or transmitted in any form or by any means electronic mechanical photocopying recording scanning or otherwise Product Manuals and Documentation are specific to the software versions for which they are written For previous or outdated manuals product release information contact Guidance Software at http www guidancesoftware com http www guidancesoftware com Specifications and information contained in this manual are furnished for informational use only and are subject to change at any time without notice Protected by U S Patent Nos 7 168 000 and 6 792 545 Patents Pending in the U S and other countries Guidance Software 537 Support Guidance Software develops solutions that sea
90. Version 6 4 www guidancesoftware com Install Path C Program Files EnCase6 Cancel Installing EnCase Forensic 27 5 Click Next Page 2 of the uninstall wizard displays Installation Folder SOFTWARE Select ReInstall to reinstall EnCase to the selected location or select Uninstall to Remove EnCase from the selected Location C Reinstall Uninstall Reminder Write blocking done through Fastbloc SE will be removed if present during the uninstall process lt Back Cancel 6 Select Uninstall and click Next Progress shows on the dialog 7 When the completion notification displays click Finish 28 EnCase Forensic Version 6 11 User s Guide Software is removed and page 3 of the uninstall wizard displays Installation Folder i x En a MU J SOFTWARE oe E uA q EnCase Version 6 4 www guidancesoftware com To replace some files that are in use the system will need to be rebooted C Reboot Later Reboot Now Gancel 8 Select Reboot Later or Reboot Now and click Finish Reinstalling the Examiner Note Reinstall does not overwrite existing user files Reinstall refreshes certain files and settings and is a variation of the install program Reinstall creates a new log file and reinstalls the following items B Application files E Registry keys B User files that do not exist Installing EnCase Forensic 29 Installing Security Keys NAS provides licensing to the cli
91. a true value in the Additional Fields column in the Table Pane File Edit view Tools Help ijNew 2 Open bal Save Print 9 Add Device Q Search 3 Logon d Refresh E cases x E Table Report f Disk 4S Code Q Search Hits T n mu Tet 283 Home Po Arrival Time Log Additional Fields g Eo To lt Han_Lecter hotmail com gt LJ 3 38 Subject samples J 4 38 Client Submit Time 01 08 01 04 27 09PM CJ 8 G Transport Message J 6 18 Body Type Plain OF 18 Code Page 1252 Os 18 Transport Message Og Creation Time 4 Ifthe In Report column is not shown enable it a Right click in the Table pane and select Show Columns b Select In Report and click OK The In Report column appears in the Table panel 5 Select the fields you want to include in the report See Enabling or Disabling Entries in the Report on page 445 6 Click the Report Panel in the View pane The report is generated containing the enabled fields Exporting a Report Once a report is generated you can save it to a file Place the cursor in the report 1 Right click and click Export The Export Report dialog appears asking for output information Select the appropriate output format Enter or navigate to the desired output path The newly created report document is saved to a file 456 EnCase Forensic Version 6 11 User s Guide Here s a web page generated from th
92. ai 5 Sunse C si 6 Water li Copy UnErase L Bookmark Data Ctrl B8 o aime o la 2bmp Oo CJ i Winter B Export rui eerta Activate Single Files Create Hash Set O i D bmp O ig 2 Z bmp CJ ug 3 3 bmp View File Structure m E Analyze EFS X IP Goto Parent BkSp E Fewer Columns Ctrl Num i More Columns CoN CJ j 4 Blue hills jpg al 5 Sunset jpg CJ al 6 Water lilies jpa Fewer Rows Shift Num More Rows Shift Num Select Item Space CJ ai 7 winter jpg To reduce the number of images displayed in a row in the gallery tab m Right click on any image on the Gallery tab and click Fewer Columns Increasing the Number of Images Per Row You can increase the number of images displayed per row in the Gallery tab C Bb D Lbme O fa C2 2 bme C3 iab 3 bmp O il Blue hi ag 5 Sunse C ail 6 Water li Copy UnErase CJ Lal C Winter LT Bookmark Data Ctrl B As M3 Copy a Export rss n Activate Single Files Create Hash Set View File Structure Analyze EFS T Goto Parent BkSp c d c o wW 2 5 wW 3 0 GE o e Co wW s o we Co d CO E Fewer Columns Ctrl Num yi ES More Columns Ctri Num EC Fewer Rows Shift N
93. amp Entries TT Bookmarks Quo Name re Hed E Home agsFile Extents f Permissions 4 p 012 Jioll Jl isb JI aac yo alll doc doc Word Document BC Entry rS Text I OL e S2MB Thumb drive Jones Case 4 amp Hex ggPicture Report 7 Console g Details Lock 0 0 F Fiters Conditions 4 p JsaeJl J l Sus bs JI zsl oe oJJia Sosbedl suse el perdi e Joed J l Sua bs dl Sasls sobs ol odes gb Su odes Sus bo JI se9s olustlds s e5sadl se bsleJ Jg JessueJI JI i359 op es pd loJ c ep elJbJl owe Jis JI oed e5eo ole Goad eb sJg JJoJI sob Ibl godo yyw Sgdled os b JI sa29 gules 5k a b cvs aoa 5 C9l a vill LEE wae dol E Email Examinations cz C General Filters io Filter by Date Filters by size EHE Hash Filters ai Print Snnnl Files 7 Results appear as in a usual keyword search gt 348 EnCase Forensic Version 6 11 User s Guide Keyword Tester To test a search string against a known file click the Keyword Tester tab Enter an expression in the Search Expression field and be sure to select the proper keyword options 1 Adda new keyword see Adding Keywords on page 344 2 Add an expression and name the keyword In this case a GREP keyword designed to capture telephone numbers is entered Edit Phone Numbers E A34 xl Search expression Code Page Keyword teste
94. by others Encryption is used to protecting information in many kinds of systems including computers networks the Internet mobile telephones and so forth EnCase has the ability to decrypt a variety of encrypted documents including those using symmetric and asymmetric keys The commercial encryption keys that EnCase currently supports includes Lotus NSF PC Guardian Encryption Plus PC Guardian Encryption Plus Utimaco Safe Guard Easy Credant and SafeBoot 382 EnCase Forensic Version 6 11 User s Guide NSF Encryption Support The Lotus Notes email client has security built into the product Notes was the first widely adopted software product to use public key cryptography for client server and server server authentication and for encryption of data and it remains the product with the largest installed base of PKI users The EnCaseQ Suite can decrypt encrypted NSF documents and send them to recipients within the same Domino server Each server user has an ID file that contains a user s B encrypted private key B public key E password information B password recovery information It also has an NSF file that represents the user s mailbox in 8 3 format in the default path domino installation folder data mail lt user gt nsf Analyzing and Searching Files 383 Recovering NSF Passwords To retrieve the recovery password you must have proper administrative rights on the Domino server 1 Open the Domino Server
95. check to open the file viewer in a maximized new window Application Path contains the filename and path to the viewer s executable Command Line contains a reference to the executable and any parameters used to customize the execution of the viewer Viewer File Type Dialog The Viewer File Type dialog associates file types with viewers vever e Description Extensions Picture Viewer EnCase E File Viewers E Ta C Windows File Viewerl Installed Viewer gt gt Cancel 294 EnCase Forensic Version 6 11 User s Guide Description is the file type to be associated with the file viewer Extensions is a list of file types to be associated with the file viewer Picture check to display the file as a picture in the Gallery tab Viewer contains options selecting the type of viewer and in the case of Installed Viewers a specific viewer associated with the file type you define Click EnCase to associate the built in EnCase viewer with the file type you define Click Windows to associate Windows with the file type you define Click Installed Viewer to associate an installed viewer with a file type Use the Installed Viewers Tree to select the specific viewer Installed Viewers Tree lists the File Viewers currently known to your EnCase application Adding a File Viewer to Your EnCase Application Figure 30 File Edit View Tools Help
96. content as 64 bit Little Endian integers 64 bit Big Endian displays the bookmarked content as 64 bit Big Endian integers Dates A date is a parent object that contains the objects representing various file formats that can be used when displaying bookmarked content DOS Date displays a packed 16 bit value that specifies the month day year and time of day an MS DOS file was last written to DOS Date GMT displays a packed 16 bit value that specifies the time portion of the DOS Date as GMT time UNIX Date displays a Unix timestamp in seconds based on the standard Unix epoch of 01 01 1970 at 00 00 00 GMT UNIX Text Date displays a Unix timestamp in seconds as text based on the standard Unix epoch of 01 01 1970 at 00 00 00 GMT HFS Plus Date displays a numeric value on a Power Macintosh that specifies the month day year and time when the file was last written to Windows Date Time displays a numeric value on a Windows system that specifies the month day year and time when the file was last written to Lotus Date displays a date from a Lotus Notes database file 410 EnCase Forensic Version 6 11 User s Guide Windows Windows is a parent object that contains objects representing the various file interpretations that can be used when displaying bookmarked content Partition Entry displays the content of the bookmark as characters that conform to the header format of a Windows partition entry DOS Directory Entry display
97. device or to acquire it to an evidence file you need the target s user name password and domain to parse the disk in EnCase A message box displays asking for the user ID password and domain If this information is unavailable you can still view the volumes in the Tree pane but the contents remain encrypted x Username umm Pestecrd eR Analyzing and Searching Files 385 The Domain can be a DNS name Once a Logical Evidence File or a new Physical Disk is added to a new case the master boot record is checked against known signatures to determine if the disk is encrypted or not If the disk is encrypted you are asked for user credentials which consists of username password and domain When these are entered the disk is decrypted Note Utimaco and PC Guardian need only a user ID and a password The domain name is unnecessary After successful parsing of an encrypted evidence the symmetric encryption key is stored in the case once the case is saved When this case is reopened the user is not asked to provide credentials and the decryption is done using the stored key SafeBoot Setup EnCase provides a way for you to view SafeBoot encrypted hard drives during an investigation Prior to any decryption however the SafeBoot installer available from Guidance Software Technical Support Support Portal https support guidancesoftware com must be installed This section describes that process The following files and folders
98. disk is added to the case and the New Image File value is set to reflect this 2 If the content being acquired is to be searched hashed or analyzed for signatures select Search Hash and Signature Analysis 210 EnCase Forensic Version 6 11 User s Guide 3 Click Next The Search page of the Acquisition Wizard appears 4 In New Image File click on the appropriate disposition of the file containing the acquired image 5 If you want to restart a cancelled acquisition a Select Restart Acquisition b Browse to or enter the filename and path of the EnCase evidence file containing the partial acquisition to be restarted 6 Click Next If you selected Search Hash and Signature Analysis the Search page of the Acquisition wizard appears otherwise the Options page appears Completing the Search Page of the Acquisition Wizard This page defines the searches hashing and additional analysis performed as part of the acquisition after the content is acquired Before you begin Open the Acquisition Wizard to the Search page Search F Search entire case M Keyword Search Options IV Search each entry For keywords Search each record For keywords selected keywords only I Search file slack Use initialized size Undelete files before searching Search only slack area of files in Hash Library 6 keywords Hash Options Compute hash value E Recompute hash values M Email S
99. es sos 00300 Feeeeoeeeeee Ra PPP PL l t S e D0400 t 6e tt LOO sesessesehRori II ERR RR IR ohh I eee ee eee egt Ipse 2002 04 25 01 52 46 2002 04 25 01 52 46 a A Ed D0900 ss sss onn m eee I reet III ESO Meo eC beh ses onn pee hh Hh he hh n nnn ehh hh hhimiiiiiimiimiiimiiim immi 01100 0 33333 Pt IHRER Hn Orn Cn ie HELLE Firmware Version E SLE ELA a e rne BROGe eee ee TT EXEC _ 8 eee s Peg le 4 1 DU OD 01600 8B3796 tsrs EET TEETE 0000000000000000000000000000000000000g x ser g 01700 settee eee e te e emll ssas q2 S B RNS Sbr 8 0456789 CD 1800 EFGHIJSTUVUXYZcdefghijstuvuxyzf ti u mickugy ig Oar pg 2 AL i Az CE RO DDOx pUUAASaRece en5 8So 01900 wide st ttt tte I III nn te eee eee eee eee lle at age 2 B is 3R5 brE 4ath e treat 02000 56789 CDEFCHIJSTUVUXYZcdefghijstuvuxyz f p tH R Sva Ee Enig 223 pT i ARECE RO 000xpUUASaAs ce 02100 amp 56888 sidjg nnn jxYRt if n pads Bn 4 t o YLY 38 F 346i8 D x x c O utd D C 02200 H sDeq0 amp Y8 B o4kC amp E y vhYG8 SLD 1i gGeeus 3 17 RuCg d 7ga8 V S w UMK I z kD m 2300 Y L sg Rn i aD86JC FsL8 D0 DSNhUFx R q t 21 27 2jgttinYA D HeJc oE sVen Me Tu Beq n 02400 Siag C5 jOokRuY A g h cide 4 f lt 3 B X ghSZ n A tivi c leyzt 1k R e8 n pZi
100. file is automatically saved Enable Picture Viewer determines whether the picture viewer is used for graphics of the appropriate formats Enable ART and PNG Image Display determines whether ART and PNG image files are displayed When these files are corrupted they can cause the program to crash so this setting enables you to limit the impact of corrupted ART and PNG files Flag Lost Files determines whether lost clusters are treated as unallocated space Doing so decreases the amount of time required to access the evidence file When selected all lost clusters appear in the disk tab as unallocated clusters Enable Pictures in Doc View determines whether pictures that are natively displayed by EnCase display using Oracle Outside In technology in the Doc tab of the View pane Invalid Picture Timeout seconds contains the amount of time the program attempts to read a corrupt image file before timing out When the read times out the corrupt file is sent to the cache and no attempt is made to read it again Date Format includes these options E MM DD YY for example 06 21 08 E DD MM YY for example 21 06 08 B Other enables you to specify your own date format Current Day contains the current date in the specified date format Time Format includes these options B 12 00 00PM determines whether a twelve hour clock is the basis of the time format B 24 00 00 determines whether a twenty four hour clock is the basis of the time format
101. filename of the evidence file to be added c Click OK 3 If more devices need to be added clear Sessions If all the devices have been added click Next If Sessions was cleared the Choose Devices Page appears otherwise the Sources page appears Completing the Choose Devices Page This page displays the devices defined that can be added to the case by the Add Device wizard At this point in the acquisition the source devices were added to the Add Device wizard To select the subset of devices to add 1 With an entity object selected in the Tree pane in the Table pane select the sources to be added to the case by selecting or clearing the Device Selection Column checkbox for each source 2 Click Next The Preview Devices page of the Add Device wizard appears 196 EnCase Forensic Version 6 11 User s Guide Completing the Preview Devices Page This page displays only the selected devices from those initially defined Select a subset of the defined devices and evidence files so they can be added to the case To verify that the list of devices to be added is correct 1 Review each row in the Table pane and If the device attributes need to be changed do the following a Right click on the row containing the device whose attributes need to be changed and click Edit The Device Attributes dialog appears b Enter the desired changes 2 If the device should be acquired as a flat file clear Read File System 3 Click OK
102. folder Drop the entry or folder on the new parent folder The entry is moved to the folder on the tree and removed from the table Bookmark Reports and Reporting Bookmark reports content can be defined E In the Table pane as described in View a Bookmark on the Table Report Pane see Viewing a Bookmark on the Table Report Tab on page 436 section B In the folder editor as described in the Customizing a Report on page 437 section 436 EnCase Forensic Version 6 11 User s Guide Viewing a Bookmark on the Table Report Tab After you save a bookmark it appears on the Report panel of the Table pane Before you begin Make sure the currently opened case has at least one bookmark associated with it Click the Bookmarks tab and expand the view in the Table pane to display them To view a bookmark report on the Report panel of the Table pane 1 Select the bookmark folders you want to include in the report Q Search Hits Z3 Records E Devices 4 gt EE I Bookmarks GoM Jay s Bookmarks ONE Currency Documents DAC Pipe Bomb Data FEY scal local 01 07 08 The folder contents appear checked in the Table pane The first two data items are selected to be in the report the third is not Bookmark uli m Type Excluded Report I 1 Highlighted Data False True M 2 Highlighted Data False True l4 3 Note False False 2 To include a bookmark make sure that the In Report column v
103. for the highlighted entry or selected items 376 EnCase Forensic Version 6 11 User s Guide Exporting to msg Perform an email search prior to executing Export to msg 1 Select an msg file and display its mail contents amp 3 Home Entries rr Bookmarks Q Search Hits Name Devices Secure Storage M7 1 Guidance Software Detected Potential Junk Mail Keywords MF 2 2 MSN Hotmail test T Additional Fields amp 3 3 test i cse encrypted pst aj M 4 53 Timesheets c M 5 2 Payroll Reminder Timesheets amp Vacation Request Forms Due 12 15 04 BOMO Root folder OMG Top of Personal Folders 6 RE Training HO Inbox mi Logic Test M 4 gt 2 Select email files to export 3 In the Report pane select a file and right click it N 43 Copy Ctrl C Lr Bookmark Data Ctrl B gg Export RI Tag Selected Files Ctrl shift T BT Tag File Ctrl T SS show Columns Export To msg Column gt Sort Select Item Space Go to Parent 4 Click Export to msg The Export Email dialog appears Export Email x Export Email C Export Single Export All Checked IV Preserve Folder Structure Output Path C Program Files EnCase6 Export E Cancel 5 Select dialog options as needed O Export Single exports only the selected message O Export All Checked exports all files checked O Preserve Fol
104. i _PPDES 3 PNG 8 9 2 app descriptor utilit L MP2D6 TMP 10 L app descriptor scan EJIEJ EJ EJ EJ E ED EL 11 7 app descriptor scan Open a case that needs hashing and display its contents 1 Click the Search tab The Search dialog appears 2 Make any search choices and then select the required values in the Hash Options area of the dialog 3 Click Start Hash Options IV Compute hash value IV Recompute hash values 340 EnCase Forensic Version 6 11 User s Guide The Table pane contents changes and shows the newly created hash values for the files Hash Hame Value L FurBall BMP d01b79c3aafe3462297a2ae8b57c87b1 L Table View BMP amp 86c121180451b6b23871eaae88c871c HashSearchScreen eae437730f85f08c8456172b56c891e3 buttonSearch bmp fib2186d8feaco4b9b64d245c987c741 HashFinished Searc 06afb63e5039043f0168e85fb4d25037 i _PPDES 3 PNG 2 app descriptor utilit Hash Sets Hash sets are collections of hash values representing unique files that belong to the same group For example a hash set of all Windows operating system files could be created and named Windows System Files When a hash analysis is run on an evidence file the software identifies all files included in that hash set Those logical files can then be excluded from later searches and examinations This speeds up keyword searches and other analysis function
105. in the folder specified as the new root path Browse for Folder Dialog Use this dialog to change the root path in the Users tree and the SAFE tree to specify the path to folders containing keys for users or SAFEs The default path is C Program Files EnCase6 Keys The Users tree is based on the private keys contained in the folder defined by the root path The SAFE tree is based on SATE files contained in the folder defined by the root path Both types of files are in the C Program Files EnCase6 Keys folder Moving these key files while the trees are displayed requires a refresh to update the trees Change Root Path Cache O Certs Config O EnScript EnScripts Export C3 Hash Sets Help Index B Keys License x Folder Keys Make New Folder Cancel A BRE Path displays a tree to navigate to the folder containing the keys Case Management 161 SAFE Page of the Logon Wizard The SAFE page of the Logon wizard determines if SAFE is associated with and used by the current user x SAFE Erg SAFEs 9 Doc SAFE RD SAFE _ RD1 SAFE cows SAFE contains the SAFEs tree that organizes all the SAFEs that are installed The user selects a SAFE to complete the logon SAFEs Root Object provides additional functionality through a right click menu such as O editing the settings of the SAFE O changing the root d
106. in the picture or gallery view as any other image file Occasionally corrupt art files can cause EnCase to stop responding If this occurs try lowering the invalid picture timeout setting In Global Options or simply disable Enable ART and PNG image display also in Global options Viewing File Content 315 Viewing Office 2007 Documents Microsoft s Office 2007 documents are stored in the Office Open XML file format This is a zip file of various XML documents describing the entire document The EnCaseQ suite supports viewing Office 2007 Word Excel and PowerPoint document files EnCase extracts text from Word Excel and PowerPoint documents It parses Excel worksheet values as well Right click the desired file then click View File Structure 1 Navigate to an XML file containing child nodes 2 The viewer displays text from the document 316 EnCase Forensic Version 6 11 User s Guide Viewing Base64 and UUE Encoded Files EnCase applications automatically display Base64 and UUE encoded attachments when the mail file is mounted For these encoded files you either perform a keyword search for Base64 or UUE or you notice that a file is encoded as such Viewing File Content 317 amp l Hex Lad Doc 3 Transcript E Picture Report PA console 33 Details c Output C Lock A Codepage C 0 8500 s EnScript ff Filters D048825044t Type text plain charset iso 8859 1 Content Transfer Encoding quoted printable pim EnScri
107. information about a directory in selected formats AOL IM Information provides data from AOL Instant Messenger data App Descriptor Utility creates app descriptor sets stored globally in the appdescriptors ini file Compromise Assessment Module examines machines for a compromise such as a hack or virus Consecutive Sectors searches consecutive sectors filled with the same character which characterizes attempts to wipe a drive Credit Card Finder searches an entire case for credit card numbers E Mail Address Finder locates email addresses via a GREP search and bookmarks them EDS Registry Parser parses EDS Registry entries EXIF Viewer searches selected files for the EXIF tag and bookmarks them File Finder searches for and bookmarks selected file types File Report gathers file information on all or selected folders Find Protected Files searches a file system for files that are encrypted or require a password to open them HTML Carver searches all or selected files for keywords in HTML documents and bookmarks them IM Archive Parser searches Instant Messenger log files Kazaa Log Parser searches a case for Kazaa DBB and DAT files Link File Parser parses all or selected LCK files and retrieves selected information Linux Initialize Case locates Linux artifacts and bookmarks them Linux Syslog Parser parses Linux syslog entries and exports the data to a local drive as Excel or HTML EnScript Analysis 495 Mac Initialize Case loc
108. instead apply a single DST offset to the entire device Use this option when the subject machine did not have the proper 2007 DST patch described above Year Selection List is disabled until Use Single DST Offset is checked You can select which DST rules to base the DST adjustment on O Use 2006 for machines using pre 2007 DST rules O Use 2007 only on computers using the new 2007 DST rules Setting Time Zones Settings for Case Files 1 Opena case 2 Click View Cases Sub Tabs Home The open cases appear in the Table pane 6 Case Management 173 Right click the case where for which you want to set the time zone and then select Modify Time Settings The Case Time Settings dialog displays If you want to account for seasonal daylight savings time rules select Account for Seasonal Daylight Saving Time If you want to convert all dates to a particular time zone a Select Convert All Dates to Correspond to One Time Zone b Select a Daylight Setting c Select a Time Zone When you are finished click OK Setting Time Zone Options for Evidence Files 1 2 Open a case to display its contents Select a Device from the Tree pane right click it and choose Modify time zone settings The Time Properties dialog appears Select a Time Zone from the Time Zone list The details of the time zone appear in the Details text box If you want to use a single DST offset select Use Single DST Offset and select the ye
109. is analyzed independent of the other File Edi View Tools Help 1j New 5 Open jg Save lt j Print Se Add Device Q Search a Refresh 4p y Cases x E Table Report t Code A Home te Entries 4p Name Devices Path u Lc A Case 01 case 2 y Case 1 2 Case 1 Case To switch case analysis from one case to another 1 Click View gt Cases Sub Tabs gt Home 2 Select a case for analysis from the Table tab The Devices column of the table indicates how many devices are associated with the case in the Name column Note To look at the devices associated with a particular case highlight the case in the Table pane then click on the Entries sub tab below Cases Indexing a Case Managing the index files associated with evidence files in a case is an important part of case management For detailed information see Indexing on page 365 154 EnCase Forensic Version 6 11 User s Guide Case File Format Version 6 has a new case file format As a result case files created in version 6 do not open in previous versions Version 6 however does support cases created with version 5 If a version 5 case file is opened in version 6 it can be saved as either a version 5 or a version 6 case file You have this option in the File Save As menu For example a case is created in version 5 then opened and worked on in version 6 To select the version in which to save the file 1 Se
110. items of information are required B the stripe size Bi start sector B length per physical disk B whether the striping is right handed or not You can collect this data from the BIOS of the controller card for a hardware set or from the registry for software sets Fic Edt Viw Tode Hop inw Bore el eee Pint Za adinei G ea g Refresh P Tey case X lable Report 2 usk lt Loe P aa Esul Simal Pominje T Ni E E Heme Fy Scaueaten n s 4 F p E rassen c E wsssctt Flan Se mm ou T Creete Mi Ceviz e Tanzel LOD Doves tripo Sec un E 7 Bid Dstt iege T Bigit Hended Spiny Fic Edt View Toos Heb ipee pO mod Sem PHL mu Ali vine Q Sanli gi Pre iyCcoos x 3 si gropen js Galo y Gy reins Usk 4 Code z antris Fle Fle Sytzre fe ints a Sane ne Le a gt 1 E mpss co we 2 f mzsscu x c 123 msez ouge fjas ENTE LL d coe on gt i When a RAID 5 consists of three or more disks and one disk is missing or bad the application can still rebuild the virtual disk using parity information from the other disks in the configuration which is detected automatically during the reconstruction of hardware disk configurations using the Scan Disk Configuration command When rebuilding a RAID from the first two disks results from validating parity are meaningless because you create the parity to build the missing disk To acquire a disk configuration set as one disk
111. lets you provide a more meaningful name Comment contains text describing the bookmarked content No text was supplied when the bookmark was originally created Edit Datamarks Dialog Use this dialog to edit datamarks as they appear as table entries Datamarks can be used as bookmarks when they are created in the Bookmark folder x Name Ji Comment a E Cancel Bookmarking Items 429 Name is the name of the snapshot bookmark The EnScript program that created the datamark supplied this name when the datamark was originally created Editing lets you provide a more meaningful name Comment contains text describing the bookmarked content The EnScript program that created the datamark supplied this name value when the datamark was originally created Editing lets you provide more meaningful comments Edit Bookmark Folder Dialogs Folders appear in the Bookmarks tree and the Bookmarks table These folders contain metadata and formatting for the Report panels that appear in both the Table pane and the View pane Note The root of the Bookmarks tree is a folder The same dialog see Edit Folder Dialog is used to edit the root bookmark folder and other folders in the Bookmarks tree and Bookmarks table The root bookmark folder contains default report formatting while the other folders do not 430 EnCase Forensic Version 6 11 User s Guide Edit Folder Dialog Use this dialog to modify B folder metadata B report conten
112. no directory structure the hard drive has probably been formatted If this is a FAT based system EnCase applications can recover the original directory structure Right click on each logical volume and choose Recover Folders This searches through the drive and recovers folders subfolders and files from within those folders if the information is still available You may occasionally encounter a device containing a file system unsupported by EnCase When this occurs the Entries tree displays the device icon but the Entries table only lists Unallocated Clusters Although there is no way to view file structure it may be possible to run text searches through the Unallocated Clusters Recovering Partitions Occasionally a device is formatted or even FDISKed in an attempt to destroy evidence Formatting and FDISKing a hard drive does not actually delete data Formatting deletes the structure indicating where the folders and files are on the disk FDISKing a drive deletes a drive s partition information EnCase applications can rebuild both partition information and directory and folder structure Working with Evidence 251 Adding Partitions A formatted hard drive or FDISK hard drive should be acquired using normal procedures When these evidence files are added to a case B A formatted drive displays logical volumes within EnCase but each volume has only an Unallocated Clusters entry in the table E An FDISK hard drive will not show logical
113. of Viewing File Structure The file structure of the email edb file displays and component files or layers in the compound volume folder can be opened and displayed in the view of your choice Notice that the icon for the compound email file looks like a disk drive and no compound volume indicator is added to the icon after it is parsed Exchange Server Synchronization The MS Exchange Server stores email messages in an EDB file on a server with a corresponding log file named E log The log file is where Exchange stores data to be committed to the EDB file In older Server versions there is also a corresponding stm file When the log file contains data that has not been committed to the EDB file the EDB file is in an inconsistent or dirty state EnCase is unable to parse inconsistent EDB files To synchronize the structure do the following 1 2 3 Stop the Exchange Server service if running Turn Exchange Server file shadowing on Copy the following folders from the Exchange Server to an EnCase working folder O The bin directory to get the eseutil exe program O The mdbdata directory which contains both the private and public EDB files 304 EnCase Forensic Version 6 11 User s Guide 4 Start eseutil exe using the Windows Start Run location Veseutil command 5 Use the eseutil exe command line tool to check the consistency of the state field as follows O file location Veseutil mh filepath privl edb
114. of these tabs B The Attributes tab B The Code Page tab New Text Styles Dialog Attributes Tab The Attributes tab captures the text style definition New Text Style Logical Screen Wrap Length Working with Non English Languages 463 Name is the name of the text style Line Wrap contains controls that determine how content appears in the Text and Hex tabs of the View pane Fit to page eliminates line breaks in displayed content and displays all text in the window Line Breaks displays line breaks in the content Max Size ignores line breaks in the content and wraps lines at the value set in Wrap Length Wrap Length specifies the length where a line break occurs When you select Max Size line breaks occur only at the value of this setting Default Char contains the character to use to indicate the encoding or code page could not interpret the underlying value RTL Reading sets the text display to read right to left RTL Color Element contains a list of text elements that can have a color assigned to them Double click a list element to edit color attributes 464 EnCase Forensic Version 6 11 User s Guide New Text Styles Dialog Code Page Tab The Code Page tab lets you select the code page for the text style you define aix Allibues Code Page Code Page Code Page e gt Name Code 1 E Arabic 664 4 C Unicode Big Endian 2g st M sr 3184 dint 35 wa 6
115. package Business Phone is the phone number of the company associated with the package Web Page is the URL of the company Web page associated with the package Create License Dialog Use the Create License dialog to create a license associated with a package The association is made by entering the filename contained in License File without its extension x License File C Program Files EnCase6 License License EnLicense js Dongle List Major Version 000000000 7 Expires 01 01 20 define Cancel EnScript Analysis 509 License File contains the path to and the filename of the license file Dongle List contains the dongle numbers that enable the license If the license is not restricted leave this setting blank Major Version contains the major version number of the software release Expires contains the date when the license will expire f define contains names used in the code defined using the define directive which associate the license with specific functionality A subset of functionality is associated with a given license Using a Package A package is B Created E Edited B Built E Run In addition one or more licenses are created and associated with a package Creating a Package To create a package 1 Doone of the following O Click the Packages tab adjacent to the Cases tab on the root toolbar of the Tree pane O Click View gt Packages 2 Right click on the Packages tree in the Tree pane
116. panel to view the report in the table pane Machine Survey Servlet Deploy Use Machine Survey Servlet Deploy to deploy servlets to machines on the network To use this method of deployment you will need the following E IP addresses or a range of all nodes where you want to deploy E A common username and password for all nodes where you want to deploy To deploy servlets using Machine Survey Servlet Deploy 1 Open the EnCase Program 2 Click the EnScript tab in the filter pane 3 Expand the Enterprise folder by clicking the next to it EnScript Analysis 485 4 Double click Machine Survey Servlet Deploy Machines Management settings IPs enter one ipjrange per line Add New Machine Add Select Machine Machine Username Password Exclude IPs enter one ip per line Exclude Machine Exclude Machine cms 5 There are different ways to add to the list of machines that will receive the new servlet Choose one or both of them below O Click Select Machine then log on to your SAFE select a role and select machines using the Network Tree O Enter an IP address or IP Range Username and Password and Click Add If you prefer to specify an IP range using Classless Inter Domain Routing CIDR you can enter it Note If you enter an IP range all machines must use the same username and password 6 If you entered an IP Range and want to exclude specific addresses
117. program read the Microsoft article at http support microsoft com kb 272570 en us http support microsoft com kb 272570 en us 306 EnCase Forensic Version 6 11 User s Guide Recovering a Database These instructions describe how to recover from a dirty EDB database Enter these commands C Exchange BIN Eseutil exe r E44 options Options include 1 lt path gt location of log files s lt path gt location of system files i lt path gt ignore mismatched missing database attachments d path location of database files Oo OF 0 0 O0 o suppress logo Repairing a Database These instructions describe how to repair an EDB database Enter these commands C Exchange BIN Eseutil exe p database name gt options Options include s lt file gt set streaming file name i bypass the database and streaming file mismatch error o suppress logo createstm create empty streaming file if missing g run integrity check before repairing t database settemporary database name Oo O 0 O 0 0 O0 lt name gt set prefix to use for name of report files Viewing File Content 307 Viewing Outlook Express Email EnCase applications can read Outlook Express dbx files After the file structure is parsed the Entries and Records tables in the Table pane lists individual emails by their subject line The records table pane lists the attachments The
118. records for keywords Selected items only 40 Entries 2 Records Keyword Search Options Search entries and records for keywords 9 keywords Search entry slack C use initialized size C Undelete entries before searching Search only slack area of entries in Hash Library 3 Click Start 374 EnCase Forensic Version 6 11 User s Guide Viewing Attachments An email attachment is a file that is sent along with an email message An attachment can be encoded or not Complete a successful email search See Searching Email on page 371 Email attachments clearly can have important evidentiary value This section covers viewing attachments in their native format 1 Click Records Discovered email appears in the Tree pane Bon ogg Records Bou f Internet and Email s One dbx s Outbox dbx s Sent Items dbx Os Six dbx s gt Three dbx Gs encrypted pst s gt Five dbx s Four dbx s Inbox dbx SO OOOO OOO 2 Expand the high level item to view its contents Analyzing and Searching Files 375 A list of attachments appears in the Table pane and the contents of the attachment appear in the Report pane Additional Fields Hog Records FS dou Z Internet and Email gt see One dbx D0 A RE Searching For Multiple Keywords at One Time using V4 12a o0 Message D0 Testing D0 A nightly report ee es 2i File Edit View Tools
119. restore to the designated drive type Yes in Continue and then click Yes to start the physical restore When the restore is finished a verification message displays information such as any read or write errors and the hash values for both the evidence file and the restored drive The hash values should match If the hash values from the restore do not match restore the evidence file again It might be necessary to swap the target media for correct results When the drive is restored physically pull the power cord from the computer Attach the restored drive as near to the original configuration as possible e g if the drive was originally on IDE channel 0 on the original computer install it there This will help the computer to allocate the original drive letters providing the proper mapping for nk files etc On older drives less than 8 4 GB you may need to reboot using an EnCase Barebones Boot Diskette and during the boot sequence set the CHS settings of the restoration drive in the CMOS to the physical drive geometry of the original drive which you noted earlier Setting the physical drive geometry will probably require overriding the auto detected drive geometry Use LinEn to calculate the hash value of the restored drive and compare it to the acquisition hash value to ensure its integrity If you want to boot the drive use an EnCase Barebones Boot Disk with FDISK copied to it Run FDISK MBR The restored disk should now be
120. right click the restored drive and select Make Active Shut down the computer and attach the restored drive as near to the original configuration as possible This helps the computer to allocate the original drive letters making lnk files etc work better Reboot and set the CHS settings of the restoration drive in the CMOS to the physical geometry of the original drive overriding the auto detected geometry if necessary The restored disk should now be bootable If the Restored Disk Does Not Boot The Cylinders Heads Sectors information CHS in the Master Boot Record MBR from the image may not match the CHS information of the actual hard drive Reset the CHS information for the MBR Boot with a DOS boot disk and at the A gt prompt type FDISK MBR to reset the Master Boot Record Verify that the MBR has the correct io sys file Re SYS the boot drive with the correct sys version For example if the subject had Windows 95B then the hard drive should have a sys command performed on it from a Windows 95B created boot disk At the A gt prompt type SYS C 260 EnCase Forensic Version 6 11 User s Guide Snapshot to DB Module Set This script takes snapshots of nodes across a network and stores the snapshots in a SOL database It also reads from the database to create reports on the snapshots taken It allows for minimal maintenance on the database so you can control the amount of data stored as well Three EnScripts wo
121. software They are stored by default in C Program Files EnCase EnCase EnScript Include They can however be stored in another folder within EnScript An EnScript developer creating new include files to work with new EnScript component can create a new folder and place the new include programs there Once the new folder is created EnCase applications must know of its location 1 Click Tools Options EnScript to see the Options dialog Ce o4 Case Options Global NAS Colors Fonts EnScript storage Paths Enterprise Include Path include 2 Change the Include Path field entry to reflect the new include folder location Note Add only the folder name not the complete path EnScript Analysis 505 EnScript Help There are currently two sources of information about EnScript programs Help gt EnScript Help B View gt EnScript Types EnScript Types EnScript types reference resources containing the EnScript language classes Perusing these types provides information about EnCase classes and functions Click View gt EnScript Types The Tree pane contains a list of the classes Selecting the Report panel of the Table pane displays a read only description of the selected class Packages Packages are a way to distribute EnScript programs without allowing others to view or modify the code This allows for centralized source control and avoids unwanted code sharing Packages are built
122. tenente nennen E tenent 395 EFS Fil s and Logical Evidence 1 O1 Files iet et teen tetti onte tete engen 399 CHAPTER 10 Bookmarking Items 401 Bookmarks OVERVIEW 2o enmep nid esetativep eee bed eret gane esee anota eps 402 Highlighted Data Bookmarks cccccccesesssesseeseseseeceeeseesesesesesesnensesessscscececeeesensnesesesesssnenenenensaeses 403 Notes Bookmarks ette EEE E orate oteiaid ere etit EERE 403 Folder Information Structure Bookmarks eese ener enne tenr eene tn eren ne nee 404 Notable File Bookmarks reete e eee ma ie rtr etr ipee tes 404 File Group Bookmarks inte tede tem een de et d E iter catendee 404 Snapshot Bookmarks eie ttt be ei tete ete ep aefutidute in tte ener tetas 405 Log Record Bookmarks sssssssseeeeeee RE nennen nennen 405 rini cp 406 Bookmark Fe t res u rere he ote Ae rn RR d esie e egi a ke i er Reid pan 406 Bookmark Data Dialog for Highlighted Data Bookmarks sess 407 Bookmark Content Data Types ee tete ter A tort eee io eoe used e exe d ERROR 407 M m 408 lu eibi ER 408 ucl ET 409 Dates ris ntm netiis sen dicet Hr c ALME Ue iiti Duvet De adig 409 MUndows2ns aea ente epe EE TD d EDD T 410 bau pM D C EN 410 Add Note Bookmark Dialog sse tenente 411 Bookmark Folder Information Structure Dialog sse eee eene 412 Bookmark Data Dialog for Files
123. the Copy and UnErase wizard appears 4 Complete the File Selection page of the Copy UnErase wizard For detailed instructions see Completing the File Selection Page 5 Click Next The Options page of the Copy UnErase wizard appears 6 Complete the Options page of the Copy UnErase wizard For detailed instructions see Completing the Options Page 7 Click Next The Destination page of the Copy UnErase wizard appears 8 Complete the Destination page of the Copy UnErase wizard For detailed instructions see Completing the Destination Page 9 Click Finish The copy and unerase operation executes The resulting files are saved in the directory specified on the Destination page Completing the File Selection Page The File Selection page is the first page of the Copy UnErase wizard 1 Ifseveral files were selected on the Table pane before you opened the wizard a Determine if the highlighted file or the selected files should be copied and unerased b Click either Highlighted File or All selected files as appropriate 2 Ifseveral files were selected on the Table pane before you opened the wizard a Determine if you want a collection of files or a single file as the result of the copy and unerase operation b Click either Separate Files or Merge into one file as appropriate 3 If you want to use a character other than the underline character as the replacement for the FAT file system deleted file indicator typ
124. the same capacity If possible drives from the same batch should be used so that both will be read with the same capacity check the date on the drive s label Older hard drives may have 2 platters while the newer version may only have one with the single platter drive having a few less bytes available 258 EnCase Forensic Version 6 11 User s Guide Logical Restore Media have different types depending on the CHS cylinders heads sectors information The same type might have different cylinders settings but their heads and sectors information the HS in CHS will be the same If the heads sectors information is different then the media type differs and you should us another target restore hard drive A logical volume must be restored to a volume of the same size or larger and of the same type To prepare for a logical restore the target media should be B wiped m FDISKed B partitioned B formatted prior to restore Format the target drive with the same file type system as the volume to be restored e g FAT32 to FAT32 NTFS to NTFS etc The procedure for restoring a logical volume is identical to that of restoring a physical device For a logical volume 1 In Case view right click on the volume 2 Select Restore When you finish the logical restore a confirmation message displays You must restart the computer to allow the restored volume to be recognized Note that the restored volume contains only the information
125. tosca ico Continue Type the wrd Vox t eer ee Hash EQ2022C7A9001917F7190A99270220A0 ee hs 7198A59278250AB eror ex Caneel 256 EnCase Forensic Version 6 11 User s Guide To restore a physical hard drive 1 SU OIN CBE uem 10 11 12 Install a sterile unpartitioned unformatted restoration drive to your forensic machine using a connection other than IDE 0 EnCase applications cannot restore a physical drive to IDE 0 Ensure that the intended restoration drive is at least as large as but preferably larger than the original from which the image was taken so that the restored data will never overwrite all sectors on the target hard drive EnCase applications can wipe the remaining sectors of the target hard drive after the actual data from the evidence file is restored Wiping remaining sectors is recommended Look at the acquired drive in the Report pane and note the precise physical drive geometry of the forensic image you are restoring from including Cylinders Heads and Sectors Note the acquisition hash for later comparison on the restored drive On the Entries tree on the Tree pane right click on the physical disk you wish to use as the source and select Restore Select the destination drive from the list of possible destination devices and click Next Select the drive to restore the image to and click Next If itis displayed select Convert Drive Geometry and then click Finish To confirm the
126. used to define an email search performed while acquiring the content of the device Search for email performs an email search This option also enables controls that determine the type of email sought Recovered deleted determines whether deleted email that remains in the PST file since the last compact operation is recovered Working with Evidence 203 Outlook PST includes pst files in the search Outlook Express DBX includes dbx files in the search Exchange EDB includes edb files in the search Lotus NSF includes nsf files in the search AOL includes AOL email files in the search MBOX includes MBOX email files in the search Additional Options contains controls that determine additional analysis to perform on the content being acquired Verify file signatures authenticates file signatures during the acquisition Identify codepage If you check this option the software attempts to determine the codepage of each file then saves those codepages for later use in the view pane when the file contents are displayed Search for internet history finds Internet history files during the acquisition 204 EnCase Forensic Version 6 11 User s Guide Options Page The Options page of the Acquisition wizard defines the metadata and various aspects of the image generated by the acquisition which constitutes the EnCase evidence 8 0 f 3 05 o eo AT 9 s LJ Confirm Password a s e
127. volume information The entire drive is displayed as Unused Disk Area in the table 252 EnCase Forensic Version 6 11 User s Guide wa 2d xd x Ecc Working with Evidence 253 To restructure these portions of the disk 1 2 3 4 5 6 7 8 10 11 12 13 In the filter pane expand EnScripts Examples Double click Case Processor Check the case you are working on and click Next Enter a Bookmark Folder name and optionally a Folder Comment Check the Partition Finder Module in the Modules list Click Finish The EnScript program runs When the EnScript program finishes click Bookmarks in the Tree pane In the tree click Set Included to show all the bookmarks the EnScript program has found Note the partition type and size in the comment Highlight the entry in the Table pane and then select Disk In the Disk tab the cursor appears on the bookmarked sector Right click and select Add Partition The Add Partition screen detects the sectors and partition type automatically populating the fields Click OK to restore the partition To see the contents of the partition you just added click Entries in the Tree pane The new partition appears below the device the Sweep Case EnScript program was run against If the drive had multiple partitions click Bookmarks in the Tree pane then repeat the process from step 9 Deleting Partitions If a partition was created at the wrong sector you must delete th
128. were selected to be copied and unerased Separate Files outputs each file being copied and unerased to its own file Merge into one file merges the output of all the selected files into one file Replace first character of FAT deleted files with determines which character is used to replace the first character in the filename of deleted files in the FAT file system Status This line indicates if one file or several files will be copied and unerased Viewing File Content 283 Options Page of the Copy UnErase Wizard The Options page of the Copy UnErase wizard determines B The extent of the evidence file copied Whether non ASCII characters encountered will appear in the outputted file or files E Whether dots will replace non ASCII characters in the outputted file or files E Whether errors in the files will pause the operation and wait for user input Settings on this page involve RAM slack which is the buffer between the logical area and the start of the file slack RAM slack is sometimes referred to as sector slack Options e Copy M Character Mask Logical File Only None Entire Physical File C Do not Write Non ASCII Characters C RAM and Disk Slack C Replace Non ASCII Characters With DOT C RAM Slack Only P SE iow Errors lt Back Cancel 284 EnCase Forensic Version 6 11 User s Guide Copy contains the settings that determine the extent of the content of the evidence file to be copied
129. will hold the acquired evidence file 1 If the FAT32 storage partition to be acquired has not been mounted mount it 2 Navigate to the folder where LinEn resides and type 1inen in the console to run LinEn The LinEn Main Screen appears Code Type Sectors Systen DiskO dev hda Linux 78165360 Sectors Size 37 3GB devvhdal Linux 82 Linux Swap 1020096 498 1MB 7devvhdaZ Linux 83 Linux EXTZ 20972448 10 0GB deu hda3 Linux 83 Linux EXT2 9766512 4 7GB Zdevvhdat Linux oc FAT32X 46406304 22 16B devvhddi Linux deu hdd2 Linux Disk5 devvhdd Linux 234375120 Sectors devshdd3 Linux Size 111 8GB dev sdal Linux 00 0C FAT32X 40965750 19 5GB 00 0C FAT32X 61432560 29 3GB oc FAT32X 65529135 31 2GB Disk9 dev sda Linux 64000 Sectors FAT16 64448 31 5MB 3 Choose Acquire The Acquire screen appears 4 Choose the physical drive or logical partition you wish to acquire The Acquire Device lt drive gt dialog appears Working with Evidence 219 Path and file name eg Folden Name For the data elements requested by the Acquire dialog either accept the default when provided or enter a value or choose one of the alternatives see Specifying and Running an Acquisition section and then press Enter The Acquire Device dialog requests additional data values until all data elements are entered or selected Then the Creating File dialog appears When the acquisition is complete click OK The LinEn main window appears The sub
130. william Schimmel Concep jpg JPEG Picture O 6 gj Catalog 7 D matt Zips william Schimmel COTER jpg JPEG Picture E Text Hex Lad Doc j Transcript E Report G Console 53 Details G Output C Lock Codepage fi 20 1311 314 EnCase Forensic Version 6 11 User s Guide To view or mount a Windows thumbs db file Navigate to the desired file in the thumbs db Right click the file then click View File Structure As needed select Calculate unallocated space p oc m B Continue with step 2 of Viewing File Structure The file structure of the email PST file displays and component files or layers in the compound volume folder can be opened and displayed in the view of your choice The compound volume indicator is added to the thumbs db folder after it is parsed America Online art Files EnCase applications support America Online art format images in the Picture and Gallery tabs art support requires installation of the Internet Explorer AOL Support module on the examiner machine The installer is available to download from http www microsoft com technet prodtechnol windows2000serv downloads aolsupp mspx http www microsoft com technet prodtechnol windows2000serv downloads aolsupp mspx This installs the files 8 Jgaw400 dll 8 Jgdw400 dll B Jgmd4 dll 8 Jgpl400 dll B Jgsd400 dll E Jgsh400 dll This update is only required for Windows 2000 Newer operating systems do not need this patch View the file
131. with the enpack file extension and function to end users exactly as EnScript programs In addition to blocking the code from end users you can also create license files specific to license keys protecting you from unwanted duplication The license files extension is EnLicense Package Features Features that support the packages include E New Package dialog E Create License dialog Use the New Package dialog to create build and edit packages When building or editing packages the name of this dialog changes but the panels and setting remain the same Use the Create License dialog to create licenses for a package The license is assigned the License Name value on B The Package panel of the New Package dialog B Edit package name gt dialog B The Build dialog 506 EnCase Forensic Version 6 11 User s Guide New Package Dialog The New Package dialog contains B A package panel B A properties panel Use the New Package dialog to create build edit and run packages Package Panel The Package panel of the New Package dialog captures attributes related to the package Use this panel to create build and edit the package New Package Packagel C Program Files EnCase6 EnScript EnScript C Program Files EnCase6 EnScript EnPack v EnScript Analysis 507 Name is the file name of the package as seen in the interface Source Path contains the path to and filename of the EnScript source cod
132. your collection 1 Right click in the Conditions pane 2 Select Export 3 Select Export Tree Note Selecting XML Formatted exports the file in XML format 4 Navigate to or enter the path where the filter is located and click OK Note By default the Output File text field contains a file named export txt You can change this name You can also enter or browse to a complete export path Navigating the EnCase Interface 145 Queries Queries allow changing what is visible by combining filters and conditions into one item There are two parts to a query the display portion and the logic portion The display portion affects the text and its color and is used to denote matches using user selected filters and conditions The logic portion actually controls which rows are hidden from the Table pane Construct a query using the same filters and conditions for the display and logic sections or use different filters and conditions One caveat the logic portion takes precedence so if a row is not a filters and conditions match used in the logic section it is hidden even if it may have been a match in the display logic The logic portion actually controls which rows are hidden from the Table pane To create a query 1 Entera name in the field 2 In the Display settings for shown items pane right click in the right pane and select new O Choose Filter or Condition O Select the filter or condition from the list O Enter text into t
133. 06 01 11 49 58PM 01 28 05 08 05 10AM CJ 9 al Fedreserveandtrea Yes 01 06 01 11 49 58PM 01 28 05 08 04 48AM C 10 _ORDER JPG Yes 01 06 01 11 50 04PM 01 28 05 08 04 42AM C 11 aij seriainumbers ipg Yes 01 06 01 11 50 04PM 01 28 05 08 05 28AM C 12 sl raisednoteten jpg Yes 01 07 01 12 01 00AM 01 28 05 08 05 14AM 13 3 Counterfeit finepri Yes 01 07 01 12 06 08AM 01 28 05 08 04 44AM C 14 E Mellon GIF Yes 01 07 01 12 11 58AM O1 28 05 08 04 56AM C3 15 i EAL 1 GIF Yes 01 07 01 12 12 00AM 01 28 05 08 05 18AM C 16 i EAL 2 GIF Yes 01 07 01 12 12 10AM 01 28 05 08 05 20AM CJ 17 i TRONG GIF Yes 01 07 01 12 12 16AM 01 28 05 08 05 32AM O 18 GA RANK2 JPG Yes 01 07 01 12 25 06AM 01 28 05 08 04 50AM The Query icon in the top menu bar appears with the filter results When the icon shows a green filtered lists appear If more than one filter has been run its name appears with ORed logic in the table s Filter column When clicked the Query icon changes its appearance and its associated list contents As you can see below the icon now has a sign In this state the list show selected evidence files and filtered files Ee Navigating the EnCase Interface 95 Here is a table display with the query in the state hate Fiker EF ud 8 mm LAB WINK GIF No 04 30 00 03 18 06PM 01 28 05 08 04 36AM o2 ud OLDBACK JPG No 04 30 00 03 22 34PM 01 28 05 08 04 32AM L3 3 i NEw
134. 1027 C AR45667 txt __ Load 34 E French Canadian DOS 863 v Text amp lHex p gt gt 5 CB gt El Text sc Hex OOMMNFE 14 04 3E 04 31 04 40 04 3E 04 35 04 20 00 43 04 42 ip gt l gt t 5t CCB a 1904 40 04 3E 04 20 00 0A 00 e gt o uu E Keyword Code Page Dobpoe yrpo Name Code Expression imi Arabic 864 864 Wrong codepage for this expression 2 E Arabic ASMO 708 708 8 E Arabic DOS 720 A 4 E Arabic 50 28596 Test data Hits 0 8 Arabic Mac 10004 CARA5867 txt f teas 8 E Arabic Windows 1256 x To test a non English language keyword do the following 1 Enter the search expression in Keyword 2 Enter or browse to the file containing the non English language content used to test the keyword 3 Click Load Text appears in the Text pane 4 If text is incorrectly rendered select other code sheets until the text is rendered correctly When a selected encoding is not one that was selected when the keyword was defined the Expression field contains this message Wrong codepage for this expression 5 Click Hex to view content in hexadecimal The values x FFx EE in the file header indicates that Unicode is the correct encoding You may want to redefine the encoding used for this keyword The hex representation of the underlying text appears 6 Testthe keyword and click OK 474 EnCase Forensic Version 6
135. 11 User s Guide Querying the Index for Non English Content After you create an index files that might contain non English content can be queried using conditions To query for non English language content Rg EnScript T Filters conditions z Queries A Text Styles E Conditions Files File Extents c Index Conditions HIKE Files Containing Index Terms Recommended f Files Containing Index Terms Case Sensitive f Files Containing Index Terms GREP slower f Files Containing Index Terms Within 5 Words tx Files Containing Index Terms Ordered within 5 Words t Files Containing Index Terms Stemming f Files Containing Index Terms Diacritic Match Z Files Containing Index Terms Umlaut Files Containing Index Terms Exact Match t Files Containing Index Terms Any distance HE Email Examinations Filter by Date Filter by size General Conditions In the Entries tree and Entries table select files to search Click Tools Index Case In the Filters pane click the Conditions tab Open the Index Conditions folder in the Conditions tree oU YN Select the non English content for example Index Terms Umlaut Working with Non English Languages Bookmarking Non English Language Text Once you find search results bookmark them Bookmarks associate text styles with bookmarked content amp lHex hoc Transcript Picture 5 Report CJ Console 3 D
136. 2003 and Vista operating systems If not installed as a service you must Run as Administrator 20 EnCase Forensic Version 6 11 User s Guide Send to HBGary Responder EnScript This EnScript passes a memory object gathered by EnCase to HBGary s Responder software EnScript drops the physical evidence device information byte for byte into a flat file and sends it to Responder CHAPTERS Installing EnCase Forensic The EnCase Installer 21 Installing Security Keys 29 Troubleshooting Security Keys 29 Obtaining Updates 30 Configuring Your EnCase Application 30 Sharing Configuration Files 40 Vista Examiner Support 40 Running a 32 bit Application on a 64 bit Platform 43 22 EnCase Forensic Version 6 11 User s Guide The EnCase Installer The EnCase installer copies the program and its drivers to the end user s computer or client and initializes drivers and services with the operating system The investigator can select where to install the EnCase Examiner The default is the Program Files folder If a selected directory exists the installer overwrites any existing program files logs and drivers Minimum Requirements For best performance examination computers should be configured with at least the following hardware and software E An EnCase security key also known as a dongle E Certificates for all purchased modules known as certs B A current version of EnCase Examiner B Pentium IV 1 4 GHz or faster process
137. 28 05 08 04 46AM CJ 8 Ll portraits ipg LL DeltedFies Yes 01 06 01 11 49 58PM 01 28 05 08 05 10AM gifedreserveandtrea Deleted Files Yes 01 06 01 11 49 58PM_ 01 28 05 08 04 48AM m LJ e G G E C 10 _ORDER JPG Clete Files Yes Oi 06j0111 50 04PM 01 28 05 08 04 42AM Lang ad serialnumbers jpg Deleted Files Yes 01 06 01 11 50 04PM 01 28 05 08 05 28AM LJ 12 a raisednoteten jpa Deleted Files Yes 01 07 01 12 01 00AM 01 28 05 08 05 14AM LJ 13 E Counterfeit _finepri Deleted Files Yes 01 07 01 12 06 08AM 01 28 05 08 04 44AM C 14 Mellon GIF LL DeletedFies_ Yes 01 07 01 12 11 58AM 01 28 05 08 04 56AM CJ 15 j _EAL 1 GIF Deleted Files Yes 01 07 01 12 12 00AM_ 01 28 05 08 05 18AM C3 16 A _EAL 2 GIF LL DebtedFies Yes 01 07 01 12 12 10AM_ 01 28 05 08 05 20AM CJ 17 gl TRONG GIF LL DeletedFies Yes 01 07 01 12 12 16AM_ 01 28 05 08 05 32AM L3 18 lz RANK2 JPG Deleted Files Yes 01 07 01 12 25 06AM 01 28 05 08 04 50AM 3 Notice that a Query icon below appears in the top menu bar This icon appears when a filtered list is displayed Clicking the icon changes the display from showing the filtered list to showing all file entries Foxy The Query icon changes when clicked It has a red sign on it to show the filter is off
138. 3 Creating a Logical Evidence File 242 Creating a Notable File Bookmark 411 Creating a Notes Bookmark 409 415 Creating a Package 502 Creating a Report Using Case Processor 449 Creating a Report Using the Report Tab 437 Creating a Snapshot Bookmark 414 Creating a Webmail Report 442 Creating an Additional Fields Report 447 Creating and Defining a New Text Style 463 Creating Conditions 139 Creating Global Keywords 339 Creating International Keywords 342 Creating Non English Keywords 465 CREDANT Encryption Support File Based Encryption 384 CREDANT Encryption Support Offline Scenario 387 Customer Service 534 Customizing a Report 415 428 430 Cyclical Redundancy Check CRC 520 D Datamarks 399 Dates 402 Decrypted Block 320 Deleting a Filter 137 Deleting Items 128 357 Deleting Partitions 249 Destination Page of the Copy UnErase Wizard 281 Determining Local Mailbox Encryption 318 Device Configuration Overlay DCO 520 Disabling Microsoft Windows Vista User Account Control 41 Disk Configuration Set Acquired as One Drive 224 Disk Configurations Acquired as Separate Drives 225 Disk Encryption Support 378 Disk Slack 520 Displaying Expanded Tree Entry Information 119 546 Displaying Tree Entry Information for One Branch 118 Document Incident 476 Doing a Crossover Cable Preview or Acquisition 55 Doing a Drive to Dr
139. 30 Open a Case 173 Opening and Closing Folders with Expand Contract 116 Opening the Acquisition Wizard 203 Options 514 Options Page 200 Options Page of the Copy UnErase Wizard 279 Organizing Bookmarks 425 Overview 177 Overview of Case Structure 151 P Package Features 498 Package Panel 499 Packages 498 Pane 523 Pane Features 86 Pane Tab Bar and Pane Tab Bar Menu 87 Panes 82 Panes and their Specific Tabs 98 Panes as Separate Windows 84 Panes in the Analysis Cycle 83 Guidance Software Parsing a Locally Encrypted Mailbox 318 Performing a Crossover Cable Preview or Acquisition 219 Performing a Drive to Drive Acquisition Using LinEn 213 Performing a Search 352 366 Performing a Signature Analysis 329 Performing Acquisitions with LinEn 49 Physical Disk Emulator PDE 523 Physical Restore 251 Physical vs Logical Restoration 250 Picture 401 Port 523 Preparing the Target Media 250 Preview Devices Page of the Add Device Wizard 189 Previewing 181 Previewing the Content of a Device 182 Professional Services 535 Prompt for Value 270 Properties Panel 500 Q Queries 145 Querying an Index Using a Condition 361 Querying the Index for Non English Content 468 Quick Entry Report 446 Quick Snapshot 481 R RAID 10 226 Raw Image Files 179 Reacquiring an Evidence File 229 Reacquiring Evidence
140. 502 sing a Write Blocker 210 4 4 Gye CECI C G cic Guidance Software Using Bookmarks 415 Using EnCase Tools 507 Using LinEn 45 Using Snapshots 180 Using the Dixon Box 121 Using the Snapshot DB Reports Dialog 264 V Validating Parity on a RAID 5 226 Verifying Evidence Files 513 View Menu 66 View Pane 96 292 525 View Pane Menu 74 View Pane Tabs 106 Viewer File Type Dialog 289 Viewing a Bookmark on the Table Report Tab e 415 428 429 Viewing a Bookmark Report 440 Viewing Attachments 367 368 Viewing Base64 and UUE Encoded Files 312 Viewing Compound Files 293 Viewing Compressed Files 298 Viewing Fewer Columns 146 Viewing Fewer Rows 147 Viewing File Content 273 Viewing File Structure 293 Viewing Files 274 Viewing Hash Search Results 338 Viewing Lotus Notes Files 299 Viewing Macintosh pax Files 307 Viewing More Columns 146 Viewing More Rows 147 Viewing MS Exchange Files 299 Viewing MS Outlook Email 306 Viewing Non Unicode Files 471 Viewing Office 2007 Documents 310 Viewing OLE Files 297 Viewing Outlook Express Email 303 Viewing Record Search Hits 354 Viewing Registry Files 295 Viewing Search Hits 355 Viewing Signature Analysis Results Part 1 330 Viewing Signature Analysis Results Part 2 331 Viewing the File Signature Directory 325 Viewing the License for LinEn 46 Viewing Unicode
141. 60 FD 01 3B CD 63 F4 55 7A SE Fl 35 A8 88 OE E6 55 B3 92 C8 l2 BS 64 3B 99 21 07 CB 77 ES SA M c UzZhs aU1 E nd t Ev z 141231090589 15 F8 E3 94 BC 2F 1B 58 96 95 6F AD 04 DC B3 81 A 7B OO 33 4F 81 B 9D BO ZF DA ES 9D e Q X o 8 300 D n 14123112028 27 D3 D9 El 28 37 14 65 22 AC D9 40 6D 50 17 CO BE 4F 51 30 9E 88 67 EZ 2A 24 06 B4 EA UA 7 e GnP WOQOZ g 014123115064 BZ 8B lC 23 1B E9 7D DA 95 ES B3 63 AC 1D SF CD OB F9 OS DE C8 C7 67 1F 80 46 78 11 74 fice ep Btn PEG EF xt 141231180 8F 62 C6 99 1D CC FE 90 Al 2B 66 SD 98 86 OF 45 91 F8 SA FC 28 EE 8A 1A 52 97 FD ES 14 98 IbET IpD 4f t E sZ iSR 141231210 EF 63 FZ AA 7C 28 AB Cl 4C A4 59 2B AC C3 AO ll 2B D9 C8 EE 6F EF B4 AF DA 6D 9D 89 SE D ic LmY4 Rioi nDuZx 0141231240 45 0l E5 A Cl 68 04 BA 89 42 70 75 AS 67 43 CO DS AS BS CO 87 Bl OD 48 1C E9 44 7A 91 C7 E ih tBpu gCAg Att H Dz 0141231270 A4 B6 D OB 6A 38 81 ZE A4 Cl SA OB D6 41 CF DO BB Cl l 4E 18 95 41 43 AS 9A OF 4C 24 4E wTU j8 n z A D N ACYi L N 0141231300 89 50 EO 80 3C B9 4C 56 B6 SE B2 62 sc B FD 94 6E 10 EA AZ 17 11 45 06 DA BE AE P LVT bole EN n c dz 0141231330 A2 61 78 lE 68 EE CS 6A 55 4D BZ DF D9 60 BE 84 AF E4 SC EF 05 F3 FO 92 Dl DC BS 6E 94 33 ax hil3UM B X 0141231360 A3 CD 76 66 2F 50 63 F9 66 4D 91 22 C6 03 53 DF 10 87 E4 38 EB 6B 2B 02 D6 7E DC 3E 6F C ivt Pc flD E SB t 8 k gt o 14123139079 7F 3B
142. 64 53 4a cl d2 ca e9 cd Oa 0 Ga 15 7d ae 1c 21 d3 c8 c4 63 75 5 16 04 de 1b e0 7 26 bc 14 b6 c3 5 b2 07 ca bb 96 0 d2 3 2b 09 d4 b7 aa 7a 68 fa 86 2b Sd 6 d Oe 3 Oe 7a 88 2d 49 fd 6c 59 66 b2 Oc 9c ef 12 df 82 ba 79 7f fd 48 aS 87 99 ca 9a 26 Oa 7b 87 05 c7 7f bl e9 77 e8 a2 3f bc 1d c9 c2 dl 1c Be 5 4e 72 e6 df w cY f N Z8Nra5 2 Cc 99 92 62 bb a2 65 ed bb d3 68 a7 e2 50 7f da b cei hs P 84 12 73 f6 72 f2 61 23 5c be e6 54 47 07 B5 s r a X sTG 78 61 d4 42 92 02 be d0 c3 01 60 04 6 22 04 xa B r B 8 3a 14 d3 22 al 6 dO cd 48 85 84 c4 ec 15 32 b H e7 7c 58 3e a3 9c cl Oe 61 b6 04 48 05 Ze 63 bd 85 c9 B8 e8 a3 dz a7 97 8b 25 ab a8 bO Se c0 d8 39 75 e2 Oe 09 4 cS e0 Sb e2 2f b4 d3 68 b2 07 69 8 8b 99 07 68 b2 83 20 be 79 cb 8d 05 1a be fe b3 9d 46 4b ae Sc 37 7a 8b 8f 33 57 be 7d 96 72 92 FK a7z 3W r f 72 37 0 d2 e3 a4 d8 7a 8d a2 bO d2 d1 16 3d yjr786 xu2z 13 6c Bb 79 93 af 96 20 34 ca 50 fe 2 d9 6 3e Cb 5b ae 75 9b 41 07 ac 34 cf 9a 52 82 5 05 d4 7 04 92 25 32 36 91 cl 54 ba 60 e2 Gc Be 8c ab amp T amp 18G 90 97 6b bc 88 35 32 ac 07 13 64 dd 2c b2 Bd 8c k 52 df G 6 7b 38 39 82 dd 42 20 53 04 b4 9c f9 b6 f2 b9 89 B S c g5 6b 2 84 cl 8d 16 dc 39 3a 87 41 56 a7 al 01 Ek 09 AVS 23 ab Se 7e 2 02 b6 8a 5a 25 41 d d7 4d 51 a8 5 4152 amp A0xMQ 15 51 a2 dd 24 31 2e fe 30 b9 Se 74 50 3 07 ee Qe 1 p0 t
143. 78 69 66 00 00 49 49 ZA 00 08 00 OO OO 09 OO OF 01 00024 02 00 O6 OO OO OO 7A OO OO OO 10 Ol O2 OO 13 00 OO OO 80 00 OO OO 12 0l 00048 03 00 Ol OO OO OO Ol OO OO OO 1A Ol OS OO O1 OO OO OO AO OO OO OO 1B Ol 0007205 00 Ol OO OO OO AS OO OO OO 28 Ol 03 OO 01 OO OO OO O2 OO OO 00 32 01 00096 o2 00 14 OO 00 OO BO 00 OO OO 13 O2 03 00 Ol 00 OO OO Ol OO 00 O0 69 87 iid 0012004 00 Ol OO O0 00 C4 OO OO OO SE 05 00 DO 43 61 6E 6F 6E 00 43 61 6E 6F e Canon Cano 00144 6E 20 SO 6F 77 65 72 53 68 6F 74 20 47 32 00 00 00 00 OO OO OO OO 00 00 00168 00 00 OO OO B4 00 OO OO 01 OO OO OO B4 OO OO OO 01 OO OO OO 32 30 30 32 00192 3A 30 34 3A 32 35 20 30 31 3A 35 32 3A 34 36 00 1B 00 9A 82 05 00 Ol OO 04 25 01 52 46 5 00216 00 00 56 03 00 00 9D 82 OS 00 Ol OO OO OO SE 03 00 OO 00 90 OF 00 04 OO VereD iiit Ies 0024000 00 30 32 31 30 03 90 02 00 14 00 00 OO OE OZ 00 00 04 90 O2 00 14 OO 0210 D 55t Dei 0026400 00 22 O2 OO OO Ol 91 OF OO 04 OO OO OO Ol OZ 03 OO OZ 91 OS OO Ol OO jeemeeeeteeeeeet enn jooZ8800 OO SE 03 OO OO Ol 92 OA OO Ol OO OO OO 46 03 00 OO OZ 92 OS OO OL OO t ses PILLE eres 0031200 00 4E 03 00 OO O4 92 OA 00 Ol OO OO OO 66 03 00 OO OS 92 OF 00 O1 OO N s 00336 00 00 6E 03 OO 00 06 92 05 00 01 OO OO OO 76 03 00 OO OF 92 03 00 01 OO n 00360 00 00 OS OO 00 OO 09 92 03 00 O1 OO OO OO OO OO OO OO OA 92 OS OO 01 OO esses 00384 00 00 7E 03 00 OO 7C 92 07 OO C2 Ol OO OO 86 03 00 00 86 92 07 00 08 01 00408 00 00 36 O2 OO OO OO
144. 7973B060D9FED48C026 Cancel 242 EnCase Forensic Version 6 11 User s Guide 5 Select one of the following output formats O Console writes the results in the console tab O Note writes the results as a note bookmark O Log Record writes the results as a log record bookmark 6 Click OK Logical Evidence Files A Logical Evidence File LEF contains a collection of individual files typically copied from a subject computer when previewing As you examine digital evidence some of the evidence is more significant to the intent of the investigation During the analysis of the EnCase evidence file various searches are performed to find these significant files By copying these significant files into a logical evidence file you can access them without dealing with the large volume contained in an EnCase evidence file Dragging and dropping a LEF anywhere on the EnCase interface adds the LEF to the currently opened case Working with Evidence 243 Create Logical Evidence File Wizard Use the Create Logical Evidence File Wizard to create logical evidence files associated with the currently opened case Before a logical evidence file can be created open the case associated with it and select the associated files you want to acquire The Create Logical Evidence File wizard contains the following pages B Sources page B Outputs page Create Logical Evidence File Create Logical Evidence File 244 E
145. 8826290AYARAARAAAE4QklN A gAAAAAAHAAAP A LL 4 L 4 4 14 SSEL SLES BDC BBBBAD SSIES ISELSIELLE Gn TOL 048826379 h ghhhAA LL LLL E ELLE E LEE E LEE ELE EEEPIPOBAARAPE FL EL E LE E LL E E LL B ILL SILLS z O4882646BAAADEJJTQIAAAAAAAQAAAAAQAAAKAAAAJAAAAAADhCSUOECQAAAAAMIWAAAAEAAACAAAAA dAAAAYAAAK Select All 048826557 ewAYAAH ZP gABBKRk1GAAECAQBIARGAAP ACdGaWxlIHdyaXROZW4gYnkg QURvYnUgUGhvdC9zaG9wq gh Find 0488266464 4aDEFEbZ2I1LACSAAAAAAL bAIQADAgGICAKIDAKIDBELCgsR FOSMDASVCGBMTFRMTGBEMDAwMDAwRDAw 048826735wMD AMD AwMD AuMDAwMDAwMDAwMDAENCwsNDgOQ Dg4QFA40DhQUDqg4O0DhQRDAwMDAwREQuHMD AwMDBEMD AwMDAWMD 048826824 AwMDAwMDAwMDAwMDAwMDAwMDAwM SAAEQgAdACAAVEiAAIRAQMRAf dAAQACP EATSAAAEFAQEBAQEBAAAAAAAA 048826913AAMAAQIEBQYHCAkK CwEAAQUBAQEBAQEAAAAAAAAAAQACAwQFBgcICQoLEARBBAEDAgQCBQcGCAUDDDMBAAIRAwQ 048827002nEjEF QVFhEyJxgTIGFJGhsUIjJBVSwWIzNHKCOUMHJZITSOHxY3MlFqKygyZEklRkRcKjdDYXOlXiZfKz hMPT 048827091dePzRieUpIWOlcTUSPSltcXV5fVWZnaGlqaZxtbn9jdHVZ2d3h5ent8fX5 cRAAICAQIEBAME BQYHBwYFNQEAAhE 048827180DITESBEFRYXEiEwUygZEUObFCISFSOfAzJGLhcoKSQlMVY3MOSSUGFqRygwcm NcLSRINUoxdkRVUZdGXi8r Ew9 048827269N14 NGlKSFCJXEl0TOpbXFleXlUmZZhpamtsbW5vYnNOdXZ3eH 16e3x ahAvDAQACEQMRADSA4FOmTuYWuNGov 048827358KUqKrvtcbNJDWanPBLLnGMAmzZqgqMDJtKYZIlQ qabBLfgfih3Xuqt2ASOaOKUSOYxEidDtXigRJNDdJtSO0Kfok 048827447 CURlROd460jS6YhPj3WkoAOqWuqy 2sEowobCsCS22gWpiFdfUOIDnAnERJTVcoFWbawAgQnlcCxgpwp7dE0JUq3 048827536 00CAKeTEIZwQo0rK 2zFoidsHAdlANqaXu
146. 8f John Doe 8 keymaster Cancel Password captures the user password User contains the User tree listing users private keys and any subfolders in the current root path A valid user has a matching public key in the SAFE they log on to Root User Object provides additional functionality through a right click menu including O updating the list of users displayed O changing the root path O commands that expand or collapse the User tree User Objects provides additional functionality through a right click menu including updating the list of users displayed and changing the root path Users Right Click Menu The Users right click menu provides additional functionality The menu displays from the Users tree in the User s Page Update Ctrl U Change Root Path Expand Contract Space Expand All Contract All 160 EnCase Forensic Version 6 11 User s Guide The Update command updates the Users tree display When a user s private key is added to the default C Program Files EnCase6 Keys folder or any other folder specified by the current root path the tree does not immediately display the new user The new user appears when the wizard is opened again or when the User tree is updated Use the Change Root Path command to specify a folder that contains the private keys of users other than the default folder Specify the root path in the Browse for Folder dialog The Users tree contains only those users
147. AO OF OO 04 OO OO OO 30 31 30 30 01 AO 03 00 Ol 00 0043200 OO Ol OO OO OO OZ AO O3 OO O1 OO OO OO 80 OZ 00 OO 03 AO 03 00 O1 00 00456 00 00 EO Ol OO OO OS AO 04 OO Ol OO OO OO 58 O5 00 OO OE AZ OS OO O1 00 i LC 00480 00 00 48 O5 OO OO OF A2 OS OO 01 OO OO OO 50 OS OO OO 10 AZ 03 OO O1 OO Heeeegeeeeee peseseqises 0050400 00 OZ 00 OO OO 17 A2 03 00 Ol OO OO OO OZ OO 00 OO 00 AS OF OO Ol OO jette Im Kem E ee 00S28 00 oO 03 00 OO OO OO OO OO OO 32 30 30 32 3A 30 34 3A 32 35 20 30 31 3A 2002 04 25 01 0055235 32 3A 34 36 00 32 30 30 32 3A 30 34 3A 32 35 20 30 31 3A 35 32 3A 34 52 46 2002 04 25 01 52 4 00576 36 00 oO 00 OO OO OO OO OO OO OO OO 00 OO 00 OO 00 OO OO OO OO OO OO OO j6eeeeeeeeeeeeettmmmn 0060000 00 oO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO jeeeeeeeeeeecieeemm e n 0062400 00 00 00 OO 00 00 OO OO OO OO OO OO 00 OO OO OO OO OO OO OO 00 00 00 0064800 00 00 OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO 00 OO 00 OO 00 00672 00 00 00 00 OO OO OO OO OO OO 00 00 OO OO 00 OO OO OO OO OO OO OO 00 00 00696 00 00 00 00 00 00 OO OO OO OO OO OO OO 00 OO 00 OO 00 OO OO OO 00 OO 00 00720 00 00 oO 00 OO OO OO OO OO OO OO 00 OO OO OO OO OO OO OO OO OO OO 00 00 00744 00 00 OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO 00 00768 00 OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO 00 00792 00 00 00 OO OO OO OO OO OO OO 00 OO OO 00 OO OO OO OO OO OO OO OO OO 00 Navigat
148. Acquisition in LinEn 1 To acquire or preview a local drive a Select the Local object in the Sources tree b Click the checkbox for Local Drives in the Table pane 2 To acquire or preview a Palm Pilot a Select the Local object in the Sources tree b Connect the Palm Pilot and set it to console mode c Click the Palm Pilot checkbox in the Table pane 3 To acquire or preview a network crossover a Select the Local object in the Sources tree b Start the LinEn crossover connection acquisition c If appropriate connect the crossover connection d Click the Network Crossover checkbox in the Table pane 4 To add evidence files to the case file select Sessions The Sessions Sources page appears after clicking Next 5 Click Next If Sessions was selected the Sessions Sources page appears otherwise the Choose Devices page appears Working with Evidence 195 Completing the Sessions Sources Page After the Sources page of the Add Device wizard is complete the Sessions Sources page appears Before you begin E Open the case E Complete the Sources page in the Add Device wizard B Select Sessions Drag and drop an evidence file from Windows File Explorer to this page 1 Toadda list of evidence files a Click Add Text List b Enter the path and filename for each evidence file to be added using the list c Click OK 2 To adda single evidence file using a file browser a Click Add Evidence File b Browse to or enter the path and
149. BACK JPG No 04 30 00 03 22 36PM 01 28 05 08 04 30AM LJ 4 _ORTRAIT JPG Deleted Files Yes 04 30 00 04 19 38PM 01 28 05 08 05 08AM LABS a KSHIFT JPG Deleted Files Yes 04 30 00 04 19 46PM 01 28 05 08 05 02AM LJ 6 dl microprinting jpg Deleted Files Yes 04 30 00 04 19 48PM 01 28 05 08 04 58AM BJ I _UMBERS JPG Deleted Files Yes 04 30 00 04 19 54PM 01 28 05 08 05 04AM io a a linesmoire jpg Deleted Files Yes 04 30 00 04 19 56PM 01 28 05 08 04 52AM o s al EAL JPG Deleted Files Yes 04 30 00 04 20 00PM 01 28 05 08 05 24AM AA 10 i new100back JPG Miu bogusbill jpg M 12 bogusbill1 jpg LJ 13 j bogusbillstamped jpg C 14 j BINION GIF LJ 15 1 28 50 GIF No 01 05 01 11 27 22PM 01 28 05 08 04 26AM No 01 06 01 10 51 48PM 01 28 05 08 04 18AM No 01 06 01 10 52 22PM 01 28 05 08 04 22AM No 01 06 01 10 53 08PM 01 28 05 08 04 24AM No 01 06 01 11 11 52PM 01 28 05 08 04 16AM No 01 06 01 11 13 36PM 01 28 05 08 04 12AM LJ 16 a Fedreserveandtrea Deleted Files Yes O1 06 01 11 49 58PM 01 28 05 08 04 46AM LJ 17 dl Fedreserveandtrea Deleted Files Yes 01 06 01 11 49 58PM 01 28 05 08 04 48AM LJ 18 a portrait1 jpg Deleted Files Yes 01 06 01 11 49 58PM 01 28 05 08 05 10AM LJ 19 ORDER JPG Deleted Files Yes 01 06 01 11 50 04PM 01 28 05 08 04 42AM LJ 20 dl serialnumbers jpg Deleted Files Yes 01 06 01 11 50 04PM 01 28 05 08 05 28AM I LAE Il
150. Case Forensic Version 6 11 User s Guide Contents viii Exchange Server Synchronization sse nnne eene 303 Cleaning an EDB Database sese tenete nennen nennen 304 Testing an EDB FIE i2 stante ier Uere bon HOO sedie itbe tudo 305 Recovering a Database ni stetibaotere tq besorgt bete edili etui tracer a 306 Repairing aiDatabase uui tete getthidebeseretidegenmetide eser tunt E S 306 Viewing Outlook Express Emails iteraties ioaea e nee E eaa tenete enne 307 Viewing MS Outlook Emil ettet eei e ete tee ertet E E EERE 310 Viewing Macintosh pax Files onoaiia ia E E RE EERE Ra 311 Viewing Windows Thumbs db 2 sese nn en EEEE ERa 313 America Online art Files ee eee os emen e ee e eerte n e p ba ense 314 Viewing Office 2007 Documents scossone AE Erie ea aE nennen tenent 315 Viewing Base64 and UUE Encoded Files sse tenen 316 INTES Compressed Files m Rer ee ee ete iR We E e tnde tn eed 318 cs MP M 318 Bookmarking anlage isnan eto nere E ete ihe Gor Die ee e e tra Orte egt Fede 319 Reducing the Number of Images Per Row ctiirte diiin aiii 320 Increasing the Number of Images Per Row nnne 320 Clearing the Invalid Image Caches iniinis enen a aana Eea S Era EEE Ea eaan 321 Lotus Notes Local Encryption Support ccccccccsescsssessstesesesesesnensnessscececeseeesenssesesesesnsnensnesssssseceseeenenenes 321 Determining Local Mailbox Encryption
151. DOMINO Do IBM Domino Administrator Server Hee DELE Lr Wi j NT52 Use Directory on arent Server E z Tools gt B Messaging gt BG Replication Directory gt Policies b S Web b amp Monitoring Configuration gt amp Health Monitoring Efl Cluster gt Ofline Services b L amp Cettificates b CJ Miscellaneous ract Recovery Password gt cy Registration gt B Policies gt amp Hosted org gt a Server gt DB2Sev 3 Click OK 384 EnCase Forensic Version 6 11 User s Guide The password ID list appears Choose ID File to Recover Look in E people emer S3 cstrong id 21x z E cteodore id fj clast id f cteodoro id igwashing id E crsaabs id ff gwashing id E cstrengt id SB qwashing__ id Repme emend OO Files of type ib Fies j Cancel 04 18 2007 05 08 14 PM 5594 bytes 4 Click OK The recovery password appears IBM Domino Administrator x Recovery information created on 02 08 2006 10 29 09 AM Recovery information accepted on 04 18 2007 05 08 14 PM Your recovery password is 0f42d127d0aa2e4c 5 Click OK and define users authorized to generate recovery passwords Disk Encryption Support This feature provides the ability to view and parse encrypted disks and files protected by PC Guardian Edge Encryption Anywhere PC Guardian Edge Encryption Plus or Utimaco SafeGuard Easy in both 32 and 64 bit systems After previewing the encrypted
152. DriveSpace Volume 227 Acquiring a Local Drive 209 Acquiring a Palm Pilot 215 Acquiring Device Configuration Overlays DCO and Host Protected Areas HPA 53 210 Acquiring Disk Configurations 221 Acquiring Firefox Cache in Records 228 Acquiring in Windows Without a FastBloc Write Blocker 213 Acquiring Non local Drives 219 Acquiring SlySoft CloneCD Images 226 Acquiring Virtual PC Images 226 Acquisition Results Dialog 202 Acquisition Times 219 Acquisition Wizard 194 366 Add Device 166 Add Device Wizard 182 Add Note Bookmark Dialog 404 Adding a Device 188 189 Adding a File Viewer to Your EnCase Application 288 290 Adding a New File Signature 327 Adding Keywords 340 343 Adding Partitions 247 Adding Raw Evidence Files 230 Additional WinEn Information 270 After Acquisition Page 195 Alternative Report Method 443 America Online art Files 310 Analyzing and Searching Files 323 490 AND OR Filter Logic 135 App Descriptors 372 ASCII 519 Associating Code Pages 471 Associating the File Viewer s File Types with the Viewer 288 291 Authentication 381 Auto Fit 76 Auto Fit All Columns 125 B Bookmark 519 Bookmark Content Data Types 400 Bookmark Data Dialog for Files 406 Bookmark Data Dialog for Highlighted Data Bookmarks 400 Bookmark Editing Dialogs 417 Bookmark Features 399 Bookmark Folder Information Structure Dial
153. E EA EE ERE reS RERE ESEE aeiia 290 Completing the Destination Page c cccesescssessseseeseeesensteesesesesnenenesesesesnenenessssseeseceseeeseneneneseseananenes 290 Copying and Unerasing Bookmarks cccccccssssessssseeseseteesesesesnenenesessseececeseeeseneneseseseeneneneneseseanenenes 290 Copying Folders eee a RR HR RE RETE IHR UR FH GR ERIT ada eria 291 AC ioe cdas cules cs tars dats oa ckieetoasaonevh cd Cetaed AARNE ots E eonsn Shah Pestebab dbs nsbatos edabage sh sadeoee 292 Pile Viewer Features eiie te du eod bre irt tb vbi EIE ope tien 292 New File Viewer Dialog ied tbe etie be retulisse nt eee iea EST 293 Viewer File Ty pe Dialog oii iiien oret nete mene vie t Pi bestes 293 Adding a File Viewer to Your EnCase Application seen 294 Associating the File Viewer s File Types with the Viewer sse 295 BAI a S tals Suen EE EEEE OTE EETA T RESE EE E E E 296 Viewing Compound Files eere ne EEEE RERE AEE E RAEE TE EE EE R too 297 Viewing File Str ctute xiis eei redeem ee ni E EREE EAEE E EEE 297 Viewing Registry Files ceti ette et etti etae nid atucatietel eee ed uie 299 Viewing OBE TFIess nnreneeteniitubenmalitiiseeodnrntaticbete terio uli eie R REE 301 Viewing Compressed Fles serien Minties ihinrere inn ettet aree eg a ti edite 302 Viewing Lotus Notes Fesses iieii detnr Ge Detur en EE TE E e tei oem va itr 303 Viewing MS Exchange Tiles eet iso teen Dg ett tre aute nO eret e ita E eene 303 En
154. EF that includes the contents of all mounted files E Creating a keyword search of the targeted files All files having at least one keyword hit will be mounted persistently and their corresponding search hits display in the Search Hits tab Certain Microsoft Office documents are considered compound files You can parse their metadata and search it For example you can locate and bookmark Microsoft Word document metadata edit times page numbers word counts etc File Mounter bookmarks Authors as text and Edit Times as dates File Mounter Keyword Search on Mounted Files Search files using keywords Keyword Options Run over selected files only Mount Persistant S Eile Types EC Keywords Search Case ANSI Find Files By By ace ip ero expression SREP sensitive Latin 1 Mf amp Gzip FOG credit cards E O Signature M amp pst 3 OE Internet CO Both gt TAR OG IP Addresses Kf Thumbs db LAGS Other M9 zip Kf 2K xP Reg Mi 9x ME Reg y Extension Create LEF Make LEF LEF Path Output Options Bookmark Folder Name Log Folder name 504 EnCase Forensic Version 6 11 User s Guide Include EnScript The Include folder contains common program code shared by other higher level EnScript components These scripts are not executed independently They are meant to be used or included in other scripts Right now there are nearly 100 include files in this
155. EnCase Forensic Version 6 11 User s Guide Guidance SOFTWARE Copyright 2008 Guidance Software Inc All rights reserved EnCase EnScript FastBloc Guidance Software and EnCE are registered trademarks or trademarks owned by Guidance Software in the United States and other jurisdictions and may not be used without prior written permission All other marks and brands may be claimed as the property of their respective owners No part of this document may be copied or reproduced without the written permission of Guidance Software Inc Products and corporate names appearing in this manual may or may not be registered trademarks or copyrights of their respective companies and are used only for identification or explanation into the owners benefit without intent to infringe Any use and duplication of this material is subject to the terms of the license agreement between you and Guidance Software Inc Except as stated in the license agreement or as otherwise permitted under Sections 107 or 108 of the 1976 United States Copyright Act no part of this publication may be reproduced stored in a retrieval system or transmitted in any form or by any means electronic mechanical photocopying recording scanning or otherwise Product manuals and documentation are specific to the software versions for which they are written For previous or outdated manuals product release information contact Guidance Software Inc at http www guidance
156. EnCase Forensic Version 6 11 User s Guide To remove the association clear the check box Code In File File File Name Page Filter iine Ext Type Categoty Signatu P 37 3 byl iul yo alil 1200 txt Text Document o 38 D RES fH doc 1262 doc Word Document Document LJ 39 byl amp ul yo alii 1282 doc Word Document Document 40 Role Effects attach 1262 xls MS Excel Spreads Document Spreads HN C 41 O sarbanes MZ1 doc 1262 doc Word Document Document 42 D Der optimistische A 1262 doc Word Document Document C 43 O Der optimistische A 12524 doc Word Document Document C 44 D REME doc 1262 doc Word Document Document CJ 48 D Lb JI est yo alil 1262 doc Word Document Document CJ 48 G UpCase 1252 LJ 47 S Boot 1262 Lj 48 D Dg82 txt 20127 txt Text Document xi 4 C Console Details dl Output Lock ff Codepage KG Click Console 33 Details ul Output C Lock Codepage C 4 ims Code In File File File Signa Page Report Ext Type Category P 37 D byl ixl yo Vala 1200 txt Text Document o 38 IS SEV doc 1252 doc Word Document Document LJ 39 byl dat yo Lala 1282 doc Word Document Document CJ 40 Q Role Effects attach 1252 xls MS Excel Spreads Document Spreads LJ 41 sarbanest MZ1 doc 1252 doc Wo
157. Encryption Keys ay EnScript File Signatures Keywords J Home A Entries T Bookmarks a Search Hits E Devices ep Secure Storage Keywords Additional Fields There are two ways to implement Auto Fit B Click View gt Auto Fit E Right click in the pane and select Auto Fit Navigating the EnCase Interface 77 Tools Menu The Tools menu provides commands to perform analytical operations z gt Qo Index Case Ctrl I Webmail Parser Search Logon Wipe Drive Verify Evidence Files Create Boot Disk Mount as Network Share Client Write block IDE channel Write block LISB Firewire SCSI drive Options Mext Location Ctrl Down Prev Location Ctrl Up Refrest FS Index Case opens the Index Case dialog where you include or exclude files in the indexing process You can select a noise file which is a list of stop words words that will not be indexed Webmail Parser opens the Webmail Parser dialog where you select the webmail vendors whose account files are to be parsed Case Processor starts the EnScript Case Processor script You can also start it by opening the Forensic and Enterprise trees in the Filter pane and double clicking The shortcut hot key to start it is Alt P Sweep Enterprise starts the EnScript Sweep Enterprise EnScript script You can also start it by opening the Forensic and Enterprise trees in the Filter pane and double clicking
158. File Path contains the path and filename of the logical evidence file where the selected files will be added The Outputs Page of the Create Logical Evidence File Use the Outputs page of the Create Logical Evidence File wizard to specify the metadata and output attributes of the logical evidence file to be created Create Logical Evidence File 246 EnCase Forensic Version 6 11 User s Guide Name contains the name of the logical evidence file to be created Evidence Number contains the investigator s evidence number for the logical evidence file to be created File Segment Size contains the file segment size of the logical evidence file to be created Compression contains controls that determine the compression used when creating the logical evidence file None means no compression is used when creating the logical evidence file Good good compression is used to create a logical evidence file that is smaller than when no compression is used but larger than when best compression is used Best best compression is used to create a logical evidence file that is smaller than one created with good compression Output Path contains the path and filename of the logical evidence file to be created Creating a Logical Evidence File Before you begin Open the case associated with the logical evidence file to be created in EnCase E L ee eia cals f eun CJowaes terse Borage tems cfe Ctt jme Am
159. File signatures Identify codepages IV Search for internet history IV Comprehensive Search These fields are added to the Browser Cache Type field B Audio B Video EB XML E Text Internet Searching The search engine can search evidence files for various Web artifact types The Internet search feature can search Internet Explorer Mozilla Firefox Opera and Safari Use the search dialog for Internet searching Results are viewed on the Records tab For information on that procedure see Searching Entries For Email and Internet Artifacts and Viewing Record Search Hits Analyzing and Searching Files 357 Performing a Search You can search an entire case an entire device or an individual file or folder For example when searching information in unallocated space such as a file header select the Unallocated Clusters to avoid having to search the entire case 1 Click the Search button on the tool bar The Search form appears 2 Complete the dialog and click Start See Search Options on page 357 for help completing the search dialog Search Options You can use a number of options to customize a search Search Selected items only 829 Entries 0 Records Keyword Search Options Email Search Options C Search entries and records for keywords C Search for email 10 keywords Hash Options C Compute hash value Additional Options C verify file signatures Cl Identify codepages Search for internet
160. Files 470 Viewing Windows Thumbs db 309 Virtual File System VFS 525 Virtual Machine 526 551 EnCase Forensic Version 6 11 User s Guide Vista Examiner Support 40 VMWare 526 W Web Mail Parser 365 Webmail Parser 491 When to use a Crossover Cable 219 Windows 403 Windows NT Software Disk Configurations 222 Windows based Acquisitions with a non FastBloc Write Blocker 213 Windows based Acquisitions with FastBloc Write Blockers 211 WinEn 18 266 Wipe Drive 510 Working with Evidence 177 Working with Non English Languages 403 451 452 Write Blocker 526 Guidance Software 552
161. Files Any number 0 9 if Repeat zero or one time Repeat at least once 4 2 A through Z x Repeat zero times vz Either x or Z xYz Neither X nor Y nor Z M Literal character ab Group ab together for IV Case Sensitive GREP m n Repeat m to n times View alb Either a or b 4D 50 33 3 Select the Search Expression tab the default display and enter the search expression in the Search Expression field 4 Give the file signature a descriptive name 5 Select Case Sensitive if appropriate 332 EnCase Forensic Version 6 11 User s Guide Click the Extensions tab and enter the file s three letter extension You can enter more than one file extension by separating them with a semicolon New File Signature 24 xl Search expression Extensions Extensions delimiter mp3 n Add the suffix _ to the file extension to include it in Vista Shadow Directories It looks like this extension Click OK The file signature is added to the table Editing a Signature Use this procedure to edit an existing file signature 1 Click View gt File Signatures The file signature category list appears in the Tree pane When you select a category its signature contents appear in the Table pane Right click a signature from the Table pane and select Edit Analyzing and Searching Files 333 An Edit selected signature name dialog appears Edit Rencode Software
162. Help iNew 23 Open gl save Gj Print e Add Device Q Search 3 Logon 3 Ref E Cases x able Report E Gallery Disk iy Code SHome T entries I Bookmarks Q Search Hits 44 Records Name lt potion mm zm Subject Gestion To a Devices Zf secure Storage Keywords C 1 RE search resultsr True False False RE search results r 05 15 2003 03 30 05 15 2003 03 30 Sharren Redmond 3 Home T Additional Fields 2 RE Tony Balzanto True False False RE Tony Balzanto 05 15 2003 01 20 05 15 2003 01 20 Dave Morris dave Gon One dbx 3 fyi physical location True False False fyiphysicallocation 05 13 2003 09 05 13 2003 09 QA Team QATe DC 1 j RE Searching for Multiple Keywords at One Time using LJ 4 Q RE Guidance Softw True False False RE Guidance Softw 05 12 2003 11 05 12 2003 11 33 Brian Kettering bri OL1 Message LJ 5 i RE Nicolas Fausett True False False RE Nicolas Fausett 05 12 2003 10 12 05 12 2003 10 12 Dave Morris dave Oo Testing 6 Builds True False False Builds 05 09 2003 09 05 09 2003 09 29 QA Team QATea DQ nightly report 7 Q RE r
163. Iittp knoppix com http knoppix com website Using LinEn 49 LinEn Set Up Under SUSE You must already have SUSE installed on your Linux machine 1 6 7 Copy the LinEn executable from C Program Files EnCase6 on your Windows machine to the desired directory usr local encase on your Linux machine Open a command shell on your Linux machine Enter chmod 777 usr local encase linen This changes the permissions on the LinEn executable so that it can be executed by everyone Close the command shell Click Main Menu System Configuration YaST Yet Another Setup Tool YaST is used to configure various settings for your Linux operating system Open the Runlevel Editor Ensure that autofs is disabled LinEn Set Up Under Red Hat You must have Red Hat installed on your Linux machine 1 Copy the LinEn executable from C Program Files EnCase6 on your Windows machine to the desired directory usr local encase on your Linux machine Open a command shell on your Linux machine Enter chmod 777 usr local encase linen This changes the permissions on the LinEn executable so that it can be executed by anyone Close the command shell Click Main Menu System Settings Server Settings Ensure that the autofs is disabled 50 EnCase Forensic Version 6 11 User s Guide Performing Acquisitions with LinEn The EnCase LinEn utility provides the following methods of acquiring evidence from a subject
164. Index Case Management 167 Role Page of the New Case Wizard The Roles page of the Login wizard associates the case being created with a role Roles are established by the administrator Note Care should be taken here because once a role is selected for a case it cannot be changed E S Roles SS All Access fs IkjhgFds Lex amp No search L amp Access Subnet A Roles contains the Roles tree which organizes the roles available to the user Select the role associated with the case being created from the Roles tree 168 EnCase Forensic Version 6 11 User s Guide Case Options Page of the New Case Wizard The Cases Options page of the New Case Wizard is where you enter the name of the case the examiner s name and paths to folders associated with the case Case Options x Name x Examiner Name Temp Default Export Folder C Program Files EnCase6 Export ml Temporary Folder C Program Files EnCase6 Temp E Index Folder C Program Files EnCase 6 Index B lt Back Cancel Name contains the name of the case associated with the case options set on this tab The case name is used as the default filename when the case is saved You can change this filename when you save the case Examiner Name is the name of the investigator Default Export Folder contains the path to and name of the folder where files are exported Temporary Folder contains the path to a
165. Logical File Only Copy Unerase is performed on the logical file only which does not include the file slack Entire Physical File Copy Unerase is performed on the entire physical file which includes the logical file and file slack RAM and Disk Slack Copy Unerase is performed on both the RAM and disk slack RAM Slack Only Copy Unerase is performed on the RAM slack only Character Mask contains settings that determine what characters are written into the file or files created by the Copy UnErase operation None No characters are masked or omitted from the filenames of the resulting files Do not Write Non ASCII Characters Non ASCII characters are masked or omitted from the filenames of the resulting files All characters except non ASCII characters are used Replace NON ASCII Characters with DOT Non ASCII characters are replaced with periods in the filenames of the resulting files Show Errors The application queries the user when errors occur This prevents unattended execution of the copy and unerase operation Viewing File Content 285 Destination Page of the Copy UnErase Wizard The Destination page of the Copy UnErase wizard determines where the output of the copy and unerase operation is saved how many files will be created when a file to be output grows too large whether the initialized size is used and the destination folder containing the output of the copy and unerase operation x Copy 1 Files 76 bytes C
166. Logon E Refresh 5 App Descriptors C3 case 4 XI Report 8 Code Lf Hash Properties Name Filter UM EJ oe sj App Descriptors 1 Gar me JE AIX 2988 e 5 3 idi 3 ELF Files L Mac os x 4 l aixmibd s E NetWare LJ 5 E aixmibd HCE Solaris 6 biod FHL Windows 7 E biod 8 cron Ad gt 2 Right click a folder in the Tree pane or a file in the Table pane and click New Analyzing and Searching Files 379 A New App Descriptor dialog appears New App Descriptor x Name iTunes Comment Shipping with OS X 10 4 8 Hash Value k435jk45j64h56g4567gjkh56g7jk567 Machine Profiles Name Comment M aixs 3 j MacOSX 10 4 8 j Netware 5 1 SP8 j NetWare 6 SP5 j Netware 6 5 SPS j RedHat ws 3 0 L calavieo 29 bit Cancel URA ON oe BIBI om 3 Complete these fields O Name is mandatory and is typically the name of the working file O Comment is an optional field for investigator comments O Hash Value is mandatory and must be entered manually It contains the hash value of the selected file 4 Select the machine profile in which to place the new app descriptor and click OK This method requires manual entry of the hash value for each and every new app descriptor A far better and more efficient method is to use an EnScript progra
167. Mware File VMDK E Logical Evidence File L01 m Virtual PC File VHD Sources Tree organizes the folders used to contain the evidence files added either as batch file lists or individual files You can organize the folders in this tree hierarchically as desired Sources Root Object contains the default folders and folders added by the user that organize the evidence files either added or to be added to the Sources tree Right click menu commands for this object lets you Working with Evidence 189 E Adda new folder as a child B Expand or collapse the subordinate tree Any child objects of this object on the tree appear in as entries on the Table pane The children of this object can be organized hierarchically by dragging and dropping folders into each other Current Selection is a default child of the Sources root object It contains any evidence files added to the Sources tree during the current session or invocation of the Add Device Wizard The next time the Add Device Wizard is opened the evidence files listed here are moved to the Last Selection folder and this folder is emptied The right click menu on this object lets you E Delete this object Em Rename this object E Adda new folder as a child B Expand or collapse the subordinate tree Any child objects of this object appear as entries on the Table pane You can organize the children of this object hierarchically by dragging and dropping folders into each other Last S
168. Name 3 Right Click or press CTRL E then select Exclude from the menu The display reappears but the selected file is not displayed Bookmarking Items 439 Exclude Folder In Bookmarks view the Tree pane displays the bookmark folders you have created for an open case You can prevent bookmarked folders from being displayed in the Table pane using the Exclude Bookmarks feature Before running this option bookmarks must have been created in the open case Exclude an entire folder of bookmarks as follows 1 Select blue check or highlight a folder Contents of the folder scal local 01 07 08 inthe illustration appear checked in the Table pane E3 cases Keywords x Q Search Hits i Records f Devices 4 cog Bookmarks E OIc3 Jay s Bookmarks DE Currency Documents og Pipe Bomb Data I scal local 01 07 08 If you blue check the folder as shown in the illustration above then open that folder you ll see that the entire contents are selected as below E Tabte Report E2 Gallery 2 Timeline tZ Code Bookmark Excluded In Notable Comment Type Report EF File Report Mi 2 HTML Carver HTML Files with Keywords EE 3 Snapshots Snapshot 2 Right click the folder you selected in the Tree pane 440 EnCase Forensic Version 6 11 User s Guide A menu appears d Copy Ctrl C ff Show Excluded BA Show Deleted X Del
169. ODE minem Lc SSeS Oates ea Eres tex Lose SD transcrot Else Tmeoet E console GB Deisis QA output ite BZ Codenoge C0 EESE Cures Writers UE Consens Posno ooto Tis is an email wan attacments Regards Richard B 2g EnScript C GED reens C Evdence qo FieTest GHEE PheneDataTests BED Should Coole D O Should Mave Error BED Shad Not Carole T Teneoata jg Compete Diagnostic 1 Credantfrerypton Jy Decoding Test Ag DesiEreryption H g EDS Erat jog FleTest jg FSTest Mg Indexing LA Internet search jg Keywords jag Lena jig Outsideln g SafeSoot ncrypton L Le smokaTest O emai thlSngle Flez Encrypted Signed with Att th txtiVBOX Encrypted Signed with Att emime p2m Alternate Body Encrypted Signed with Att th txti PS 2 LS 2 CL 2 SO 317 FOO LE 1 EFS Files and Logical Evidence LO1 Files To decrypt an encrypted EFS file you need the following p c m n The EnCase EDS module The EFS stream This is essential since it contains the decryption key A matching unencrypted private key This can be the recovery agent s key or a user s key File slack might be needed if the file size is not a multiple of 16 This is because files are decrypted in 16 byte chunks 400 EnCase Forensic Version 6 11 User s Guide For example a 17 byte file needs 15 bytes of slack in order to decrypt the last chunk Otherwise only multiples of 16 are decrypted In EnCase version 6 11 there are different scenarios from prior versio
170. OSSOIONINSTALLED A later version of s is already installed on the this machine The setup cannot 0475 continue OK 0K Cancel Cancel Password Password 1100 Setup Initialization Error 1101 s 0570 llO02 s Setup is preparing the s which will quide you through the program setup process Pl O66Sease wait 1103 Checking Operating System ion 1104 Checking Windows R Installer Version 0760 1105 Configuring Windows Installer 1106 C guring s 1107 Setup has completed configuring 0855the Windows Installer on your system The system needs to be restarted in order to continue wit 0950h the installation Please click Restart to reboot the system 1108 s 1150 Setup has detecte l045d an incompatible version of Windows Please click OK and verify that the target system is runn ll40ing either Windows 95 or later version or Windows NT 4 0 Service Pack 6 or later version l235before relaunching the installation ll5l Error writing to the temporary location ll52 Error e l330xtracting s to the temporary location 1153 Error reading setup initialization file 1154 Inst Examples Forensic Include Cj Information Assurance You can separate each pane from the main window and display them as individual windows Navigating the EnCase Interface 83 Panes in the Analysis Cycle Panes drive and organize the evidence analysis cycle The evidence cycle is where you define your investigation of acquired evidence Analysis of evidence is cyclical because
171. Open C Program Files CREDANT CMG Enterprise Edition Server Web Interface 5 4 conf context properties b Enable the Forensic Administrator type admin type forensic true c From the Start menu stop and restart the server Web interface The new role shows in the place where you configure administrator accounts S MIME Encryption Support The EnCase S MIME Encryption Support provides the ability to decrypt S MIME encrypted emails found in PST files Email sent or received with the file extensions pst mbox and edb support the S MIME PKCS 7 standard The mail attachment must meet the PKCS 12 standard and you must have PFX certificates installed PST EDB and MBOX mail containers are supported 396 EnCase Forensic Version 6 11 User s Guide To decrypt S MIME data 1 Open or create a case and enter Secure Storage 2 Right click on a folder in the left pane A drop down menu displays File Edit View Tools Help New OF Open lal save Print Add Device Q Search 3 Logon Refresh cases x E3Home Te Entries L Bookmarks Q Search Hits Records f Devices F Secure Storage gt Lom beare Storage Dictionary Attack Analyze EFS User List Enter Items Set Induded Folders Num Indude Sub Folders Shift Num Indude Single Folder Ctri Num 3 Select Enter Items The Enter Items dialog displays 2x User password Enter Syskey Password Recovery Disk l Pr
172. Or you can select the file in the Entries table then select the View Cases Sub Tabs Entries Sub Tabs Permissions menu to display the Permissions in the Table pane References is the number of times the file has been referenced in the case For example if you bookmark a file three times the references column shows that Physical Location the number of bytes into the device at which that unallocated cluster begins The program organizes device unallocated clusters into one virtual file It reads the file system s File Allocation Table FAT or the NTFS Bitmap to create this virtual file This allows the examiner to efficiently examine unallocated clusters Physical Sector clusters Physical lists the starting sector where the item resides in unallocated space Evidence File is the name of the root evidence file where the entry in the table resides File Identifier is a file table index number stored in the master file table It is a unique number allocated to files and folders in an NTFS file system Code Page is the character encoding table upon which the file is based Hash Value displays the hash value of every file in the case You must run the Compute Hash Value command to generate this information Hash Set displays the hash set to which a file belongs If no hash sets are created or imported the column is unpopulated Hash Category displays the hash category to which a file belongs If no hash sets are created or import
173. P Tz ROCK Be Bade 47 pf2U OO X1 xXJ6 PI Ah 3 966 c00 2Y 6Yv903 2 J C o00004042 Oi J H 9 VV O 2y S amp Ar 0S Au L ER C1 SCp Ae nj OJO 38An C S RS CCOGeS aZ ka web U xQ e Ore Cj pE Shed fiot Compie o00004aim2P 404 TcE ANE2IY MGabad D4 lO iFV SROEEIC HAZ ZPA MIE FOS MG HGy B IA pOGPPeh gV HD z4 ss Po iar 9 LE Temedate 000005 x x C SQ naY 6 486 4f SYpe4p tH Y P eG Auf PAN MOE Yi 2600 4G 0 co055 oy ta u av Ee YAx Et elo YY sek SNPOUPF Blak E Jogo D A Aia feb d wort OAA YS g b nt C JMSpe wutv i IC Cx HC lt 6 SCALE CEG P PO x Ne ox Ay Credaetfnar ypton 2 Alpi Geel nach aU 72b O T BLES 6 D GbDsfiepYz CE OuanU 09M q o ACOG CAO UPE H xyaAdOREANAIYYMAAL Ay Decoding Test ooo006ttuO oxf O Ox H YCY 840 0Spz RN p i D zx z 1 Iv eNSIOH EB Ci AD t D gBtis jAh pa uENO dso O nKCOXO738 FzaYvl ee Lag DekEnaryeton B EIDV Zr i r IE CPPP tao 201 xQA SAW vr AIL Og tica Sea VeoOWP 6Y cm SE Jo Z QS en d la Ava EE s EDS e b i H d a Lage F ist GANE gp 90 AV AE w D n 1 2 dr BUZKO 6BEKLIMSRAIDAAL iq x oO ASS YaenpdwrsHSWoBIKoersjaBO lt 3 Ero Esser des Q J 85 SCeUC NOZA B OO MH C ODIANCreo ces EQ Octa YO Je2 0E54 5 GO L2mE Erg TqS Mit 10 g FieTeit ORAL 10700023 Onlz Al Un xvorty w aV Zitr DAYU87 e6 6 cea Z fni R Ce 56d d S e
174. Pd i 99 1d 02 24 d3 05 be 7d 95 1d 38 97 d9 6f ad b9 56 8 d e7 01 fe b5 17 Ga bc 73 Sc 80 82 4b 31 bO dd 88 pp j see K1 38 2f Sc 86 cb ce e3 Oc 80 34 8d b4 4b d2 99 e2 8 X 18 4 KOv 3f e3 b7 38 6d b2 10 el ac d de 98 9a 11 4 Ge 8m b B n 8 72 23 2 dO ce 2 7a 1 3d fb 60 d5 6f 26 ed 82 Od 85 fb B z osi 33 a e7 The decryption algorithm uses a seed that is based on the basic seed from the header and the block offset 324 EnCase Forensic Version 6 11 User s Guide Decrypted Block Here is an example of a decrypted object map at offset 0x22000 Address 0x02C8CB44 e Columns 16 06 20 00 00 00 00 06 01 00 00 OO OO 00 00 00 00 00 01 89 a6 f f 00 00 00 00 OO OO 00 00 00 00 4c 05 00 O0 00 00 00 00 ec 04 00 00 00 00 00 00 4d 02 00 00 00 00 00 00 18 02 00 00 00 00 00 00 01 00 00 80 01 08 00 00 17 02 00 00 OO 00 00 00 1d 02 00 00 00 00 00 00 01 00 OO 80 02 00 00 00 le 02 00 00 00 00 00 00 O1 OO OO 80 OS 00 00 00 02 00 00 80 02 O8 00 00 O2 00 00 BO OS OB 00 00 00 00 80 04 OB 00 00 00 00 80 05 OB 00 00 00 00 80 06 08 00 00 00 00 80 07 08 00 00 00 00 80 08 08 00 00 00 80 Oa OB 00 00 00 00 80 Oc 08 00 00 00 00 80 Od 08 00 00 00 00 80 Oe 08 00 00 00 00 80 O 08 00 00 00 00 80 10 08 00 00 00 00 80 11 08 00 00 00 00 80 12 08 00 00 00 00 80 13 08 00 00 01 00 00 80 Ob 08 00 00 00 BO Oc 08 00 00 03 00 00 80 01 08 00 00 00 80 02 08 00 00 03 00 00 80 O3 08 00 00 00
175. RE E E eb E E 339 Hash a New GCaSe cu diee deve d tbe eo E EE EREE E p re RE 339 HaslhiSetSsanto radit serbe etr t cates told attt di A d tutum d AR our icd oet 340 Greate a Hash Seti condis asralilegeteniitubeniatiibgee darte tuii Di eie HRK 340 Reb ild a Hash Library enn basta entend eret nba acti eret d re e ts 342 Viewing Hash Search Results tee Eesti beim tet eimi gebe 342 Keyword Searches q estare ihid etnies uti patet E aE Drei iU eias 343 Contents Creating Global Keywords essent nennen 344 Adding Keywords ee etie me iiie te a ia ER gere eo eset E EAE 344 Creating International Keywords sse 347 Keyword Testere Cecair aieeaa a ae putat atum aE EE a n atomi e ces 348 Local Keywords esetelitbetacen sat ntti tate Desete iste teris eit A E 350 Import KGyWOZdS tenet aser aote tuti Gasp reitibg eiatulii deseris tertie attin ubera 350 EXDOEIUGVWOFGS gereit e ertene e ea EE E atari bibas E tears ditus rnit si 350 Searching Entries for Email and Internet Artifacts sss 352 Internet History Searching 4e trae teer die n e e enr e ER ere teer ete 355 Comprehensive Internet History Search cccccsesesseseseseseeseseeensteesesesesnsneesessssseeeeseeenenenesesesesnenenes 355 Internet Searching ie aet tee diete e e eelenm pr oe tr tete di eiii e 356 Performing a Search c d Rie et eter n et tor a desti rait ie 357 Search Optionsz eee eet sakes E onde vty hele epa ero eee sod sted RU SUNT
176. Remote Acquisition Monitor ccccccccsccsecsesesenenenstsnseseseseseseseeeesececsescscseecscsesesesenanssssseseseseseneneeeees 488 Snapshot Differential Repoft een eite ge io ten E E E E 489 Sweep Emter prisen E X 490 Forensic EnScript COGS sese een teet n epe a ea T D SSH ERU P RU Re RU IRSE 491 Case ProcessoOE osea eR xor a rie n POP Deere ro EE Qr Doe rre UNE ERE Deed 492 Case Processor Modules x i pen iet eg e een eese tie otio ten a doing 494 FileMOuntet si am e eoe REB eH epe ene iati Aet iniri rta 495 Compound Files 2 esee equ eee dedita Aetius 497 Mounting Compound Files sse tenente 497 Index Case 5 eie teu eei ede tienes une tim edita 497 Scan Eocal Machine 55 aa me E RR RR eT RENE UR IET TO EH etae 498 Webmail Parseiru soe ee Re eU DOOR RHODE UU EE EIU dett ct d 498 EnSetipt Example Cod6 zn ee eu REDE er GS REED denter oe ECRIRE AIRE REIR dS RA 499 COM Folder EnScript Code ee nete eeD nen uite tee ti tente ru rit 499 EnScript Debugset eitis drei NOI RT eee s Fen a e RENI TEE Reni eerte ette 500 Help for EnScript Modules sse tente nennen 502 EnScript File Monter in doeet n re acon RAIN He ee E o on E Eee Eee 503 Include EnScript aceite dette i e tron on p e ee Ee Fe P RS ED fata tastes 504 j rasisda l MEM X M st deers 505 EnScript Types aner E Enea 505 hec D P 505 Package Feat tes i ceci beieetiitei ie Bo i od tria d
177. Run us New Insert X Delete Delete Adjust Rows gf Export Import Rename F2 i New Folder Expand Contract Space Expand All Contract All 1 Select the filter 2 Right click it and select Edit The edit wizard opens in the Table pane Edit MySelectedFiles Conditions Filters Source Code Name MySelectedFiles ECT jo Main Loy it Selected Gen 3 Right click the property and select Edit to see the Edit Term wizard 142 EnCase Forensic Version 6 11 User s Guide 4 Make the selected changes and click OK Edit Term j BodyContains S Name b InReport S FullPath b IsFolder b IsSelected S Extension S FileType S Category S Signature S Description Ej e IsSelected Ep Running Conditions To run conditions double click them select an item and run the script against it or right click and select Run The example below shows the Table pane before a filter is run O drwtsn32 log Q user dmp Cy HTML Help O hhcolreg dat Cz Media Index O wmplbrary v 0 12 Navigating the EnCase Interface 143 Three rows are selected 7 10 and 17 Note the blank Filter column Running a condition changes the display several ways First the top tab menu displays the condition name and display tabs Notice the sign on both icons in the figure below mySelectedFiles OF Display The second change is that files to which the filt
178. S Sector A subdivision of a track of a magnetic hard disk or optical disc A sector stores a fixed amount of data A typical sector contains 512 bytes Secure Authentication For EnCase SAFE The SAFE Secure Authentication For EnCase is a physically and logically secured server that authenticates all users and controls all access to the network devices Security Key A uniquely programmed hardware key sometimes referred to as a dongle that identifies a user to EnCase software and enables access to its features Servlet Servlets are EnCase services running on network workstations and servers that provide bit level access to the machine where they reside Signature See File Signature Slack See Disk Slack and File Slack Snapshot A representation of a live running machine including volatile computer data such as currently logged on users registry settings and open files Spyware Refers to a broad category of malicious software designed to intercept or take partial control of a computer without the informed consent of that machine s owner or legitimate user While the term taken literally suggests software that surreptitiously monitors the user it has come to refer more broadly to software that subverts the computer s operation for the benefit of a third party Steganography The art and science of writing hidden messages in a way that no one except the intended recipient knows of the existence
179. S Desktop T App Descriptor C Documents and Settings jay reidy TS Desktop SF Project C Documents and Settings jay reidy TS Desktop Ey Machine Profile C Program Files EnCase6 Config Profiles ini The picture shows storage path default settings You can change the index cache and backup folders by entering a new path or by navigating to and selecting the desired folder In the ini files box you can change an ini folder s location and select whether it is writable 40 EnCase Forensic Version 6 11 User s Guide Sharing Configuration Files Customization can be shared among investigators assigned to an investigation Each of these INI files is populated by customizations the investigator makes while searching for evidence The keyword and file signature files may be of particular interest These case elements are distributed by sharing INI files The application must be installed on the recipient machines To share startup files 1 Click Tools Options Storage Path The Storage Path tab of the Options dialog displays 2 Double click on the row containing the desired INI file The Edit ini file name dialog opens containing the path to the ini file 3 To navigate to the INI file copy the path to the INI file and paste it into Windows Explorer 4 Copy the file and distribute it as desired Vista Examiner Support EnCase must run as an administrator in order to access the local Vista computer
180. Saving Time Yes No Convert all dates to correspond to one time zone 1 V5 Test Case Hunter XP C AOL Instant MessengervAIM exe 2 v5 Test Case Hunter XPXCWiberfil sys 3 V5 Test Case Hunter XP C boot ini The report displays in the Report panel of the Table Pane Creating an Additional Fields Report The Additional Fields panel is available when you select the Records panel Data in the additional fields varies depending on the type of data contained in the record Your EnCase application is open and you have a case created with evidence in it Open a case containing evidence 1 Click the Records panel to make the Additional Fields panel available File Edit Yiew Tools Help iNew E3 Open bel save Gy print e Add Device Q Search 3 Logon Refresh S cases x E rabie Report L Gallery isk Code Search Hits Z3Records f 4 gt T In Search Additional a E ad fe Nane citer Report Hits Fields T Additional Fields 1 amp samples z Bou ofa Records L1 2 i plan attached n HOC Jeff s 1 2g gt see Famished4u S Inbox dbx gt se Outbox dbx HD see Famished4u gt BAD_fake id foste gt see Sent Items dbx 4 4 gt 2 In the Table pane select the entry where you want to view additional fields 3 Click the Additional Fields panel in the Tree pane Reporting 455 Note Additional fields are only available on entries showing
181. Script e EnScript Types d File Signatures 1A File Types El File Viewers Hash Sets Keywords Machine Profiles Packages Projects SAFEs A Text Styles wg eee s Cases Sub Tabs gt Table Pane gt View Pane id Filter Pane id X Close Tab Ctrl F4 EVI Show Name 4 Previous Tab Ctrl Shift Tab gt Next Tab Ctrl Tab Ll Auto Fit 86 EnCase Forensic Version 6 11 User s Guide Pane Features Use pane features while working with panes and their tabs Each pane can display these features E Tabs and tab bar E Scrollbar in the tab bar for a resized pane B Controls in the tab bar B Grab handle Figure 10 Pane Features where 1 is a View pane 2 is the current tab 3 is the tab bar 4 is the scroll icon for navigating the tab bar so that the tab you want to use can be displayed 5 is the drag handle used to drag the pane out of the main window so it appears in a secondary window and 6 care commands controlling the tab bar 3l output J Lock Each pane contains one or more tabs As the main window is resized the tab toolbar resizes correspondingly When a pane is resized to a size not as wide as its toolbar the tabs are hidden and a scroll icon appears The scroll icon lets you scroll to the right or left so you can view the hidden tabs You can wrap the tabs rather than having them hidden by using AutoFit on the right click menu of the tab toolbar The tab toolbar may c
182. Sources Name Comment X3 c3 Local 1 a Local Drives N DOG Evidence Files G Palm Pilot OB C Program Filesteng io 3 Sr Network Crossover D3 c3 C Documents and Working with Evidence 187 B Floppy drive B Palm Pilot E Removable media m Hard drive B Another computer The device types appear as entries in the Table pane when the object is selected Right click menu commands for this object determine how to B Expand or collapse objects in the Sources tree E Select various objects in the Sources tree Evidence Files Folder Object contains folders added as source folders containing evidence files The Table pane displays the same folders as the tree The right click menu commands for this object let you B Add folders E Determine which objects appear in the Sources Tree E Determine which entries are shown in the Table pane when the object is selected Evidence Folder Objects represents each folder added as a container of evidence files As leaf nodes of the tree the evidence files do not show in the tree but they do appear in the Table pane The right click menu commands for this object let you m Delete the folder where you opened the right click menu E Delete folders selected in the Sources tree 8 Determine which objects appear in the Sources tree E Determine which entries are shown in the Table pane when the object is selected Table Pane displays the children of the curr
183. The Windows registry contains valuable data that provides a great deal of information about the setup of the subject computer Registry files of Windows 95 98 ME NT 4 0 2000 and XP computers can be mounted Windows 95 98 and ME computers have two registry files They are located in the system root folder which is normally C Wind ows The filenames are system dat and user dat Windows NT 4 0 2000 and XP divide the registry into four separate files They are B Security B Software E SAM E System These files are stored in C N SYSTI EMROOTS system32 config 300 EnCase Forensic Version 6 11 User s Guide B Home Bookmarks Q Search Hits of3 Records pm Devices sp Secure Storage Keywords f Report E5 Gallery Timeline f Disk ig Code ere Entries Dm Documents and Settings BOO Cy Administrator HDL all Users Logical Filter TOOG Mesias NTUSER DAT oD OG Application Data E ntuser dat LOG a Conv ure O ldentities seri p C Microsoft ntuser ini a Export Cookies ae o0 Desktop Copy UnErase DL Favorites I Bookmark Data Ctrl B This file has a NTRegistery signature Continue parsing View File Structure Send To Calculate unallocated space 7 Analyze EFS e ES show Columns SHUSTER Cancel Column Dp se NTRegistry Sort SDD PROTO HIV Select Item Space ES Appevent
184. This does not delete the filter it only turns its display effects off rawr 134 Combining Filters EnCase Forensic Version 6 11 User s Guide You can run multiple filters and combine filters with Conditions and Queries To do this run more than one filter Running multiple filters uses OR logic to select files thus the shows both deleted and selected files Any entry that responds to any active filter condition or query appears The first figure shows a filtered list with one filter run against it Name Filter Is Deleted Last Written PN File Created la ORTRAIT JPG d KSHIFT JPG aid microprinting jpg al UMBERS JPG ai linesmoire jpg xd EAL JPG d portraiti jpg d Fedreserveandtrea ORDER JPG ail serialnumbers jpa d raisednoteten jpg Deleted Files ail fedreserveandtrea Deleted Files E Counterfeit finepri Deleted Files ad Mellon GIF d EAL 1 GIF d EAL 2 GIF ll TRONG GIF lal RANK2 JPG Deleted Files Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes 04 30 00 04 19 38PM 04 30 00 04 19 46PM 04 30 00 04 19 48PM 04 30 00 04 19 54PM 04 30 00 04 19 56PM 04 30 00 04 20 00PM 01 06 01 11 49 58PM 01 06 01 11 49 58PM 01 06 01 11 49 58PM 01 06 01 11 50 04PM 01 06 01 11 50 04PM 01 07 01 12 01 00AM 01 07 01 12 06 08AM 01 07 01 12 11 58AM 01 07 01 12 12 00AM 01 07 01 12 12 10AM 01
185. Tree pane d Report E Gallery Timeline ig Code Bookmark m m Page Show Entry Type aey EIL Break Picture Selected c 1 Q Search Summary 2 Q Case Time Settings EPI LI NN 4 C3 snap 4 Copy Snapshot bookmarks BE J Note Acquire Status Co A specific J Add Note Insert bookmark edit X Delete Delete Delete All Selected Ctrl Delete dialo g Adjust Rows Ef Export BT Tag File Ctrl T Summary Bookmark Rename F2 ES show Columns Column Sort gt Select Item To edit a bookmark 1 In the Bookmark panel in the Table pane right click the desired bookmark and click Edit The appropriate edit dialog appears 2 Editthe content in the edit dialog 3 Click OK 424 EnCase Forensic Version 6 11 User s Guide Bookmark Editing Dialogs These dialogs let you edit existing information entered when the bookmarks were created However for bookmarks that were created automatically you can only enter or modify information once Note File group bookmarks cannot be edited These editors are not necessarily the ones used to modify the data in the columns of the Bookmarks table on the Bookmarks panel of the Table pane The bookmark edit dialogs include E Edit Highlighted Data B Edit Note B Edit Folder Information Structure B Edit Notable File E Edit Snapshot B Edit Log Record E Edit Datamark Folders contain
186. View pane displays the contents of the selected email or attachment Deleted emails and attachments can be retrieved from unallocated clusters 308 EnCase Forensic Version 6 11 User s Guide M Bookmarks Cl Search Hits c dRecords f Devices A Secure Storage Keywords E Report L Galery Timeline Z Disk iy Code Name Copy UnErase Bookmark Data CtB 2 Q RE Timeline Problem Q RE Schwab Issues 4 Q RE 5 RE The vote is in 6 jj Read Crossover searches are still not c 7 Q reiser fs 8 3 question gp Transcript EE Picture Report C Console 33 deta se Five db a OL iQ Read Crossover searches a O1 public key again P DEB Message Dj Public key ring again ge Gzip Tar Evidence d Thumbs db Report E Gallery Disk Code G confirmed bug fixes Attachments RE Timeline Problem Q RE Schwab Issues 2j RE i Tet glHex Si Transcrip E Picture E Report C console Details GP Output Lock E Codepage fH 20 169 Attachment Confirmed and 20 Closed Contents ii 1157 1092 1134 1 Navigate to the dbx file you want to view or mount 2 As needed select Calculate unallocated space then select Find deleted content 3 Continue with step 2 of Viewing File Structure Viewing File Content 309 The file structure of t
187. WinEn driver to be renamed similarly CHAPTER 8 Viewing File Content Viewing Files 278 File Viewers 292 View Pane 296 Viewing Compound Files 297 Viewing Base64 and UUE Encoded Files 316 NTFS Compressed Files 318 Gallery Tab 318 Lotus Notes Local Encryption Support 321 278 EnCase Forensic Version 6 11 User s Guide Viewing Files Files parsed from device previews and acquisitions can be viewed in various formats EnCase Enterprise supports viewing the following files B Text ASCII and Unicode E Hexadecimal E Doc native formats for Oracle Outside In technology supported formats B Transcript extracted content with formatting and noise suppressed E Various image file formats The Doc pane and the Transcript pane use Oracle Outside In technology to display hundreds of different documents This allows investigators to view documents without owning a copy of the application in order to view the contents It also allows the investigator to bookmark an image of the contents inside a particular application such as a database or it allows bookmarking exact text inside the document using a sweeping bookmark Beyond those formats supported by the EnCase applications investigators can use third party viewers to extend the range of files they can view Once the investigator adds the viewer to their environment and associates file extensions with the viewer the files of that type can be viewed Compound files contain o
188. Window Begin using the EnCase application in the main window The main window organizes the application s features Features accessible from the main window are run from the system menu the toolbar and various right click menus As the application runs a status message displays in the status line at the bottom of the window The main window consists of a E System menu E Toolbar E Window containing panes B Status line Panes divide and organize the window and contain trees tables and data in various representations Figure 4 The Main Window as it appears in EnCase Enterprise with an open case 1 indicates the system menu 2 the toolbar 3 a window pane and 4 the status line File Edit view Tools Help iNew 2 Open lal Save cj Print Add Device Cl Search 3 Logon F Logoff 3 Refresh JE Table amp Report EZ Gallery 3 Timeline fois a gt In a Name Filter 1 070306_1450 ne ca 33 e ODDoccDppccDPDODU Navigating the EnCase Interface 61 The menus commands and icons displayed in the toolbar change depending on the context configuration of the application The Logon and Logoff icons for example appear in enterprise capable applications only The Edit menu does not appear when the application is opened in acquisition
189. Z Report C Console 33 Details J Output C Lock C Codepage C 0 0 i E Ensio 43 EnScript Q Hits T Filters Conditions aiet 0 tHt S 00 KOA tHt 0 0 tHt 10 70 tHt 0 0 0e 02 D i cM6 Es U quCICgx tAc o U603 gene EnScript 099 0 sSQrCi nXiQ0 f qt Yu amp los p2 L1ys kY p O1RAR GN 1 tn C N A4 1x X9 m J96 e S 06 7 OlT 02 68 j yObO6 u0 1 XDI E ALL CurrentResults 182 C d 4 2 s Q N AvS bF WR Uoe jK UiP of i4 1 D D _ gt 7 a 0 0 k ElIR odi Dy6 SO s i9Ex KDb s d ee Gs 7 0 Evidence 1cb 3 Ri4OvOE 0SY 6 p z RF Y 8f A amp o x 3B O t YSeUft6 1 06 m ruiszYv6 UP Paz L R fr dP fi d j6 G 80 P gD3 FieTest 264wS75v34 m O 4E4 CI f L14 gq A8 htj 96 z ICw pfjo9S C n amp ee S7TA Z c T s 6 j8 E o h ijIOUG mep jW sCEd3 fOy tpG sccuP b PhoneDataTests 2d p0 x C 4180 tHt 1 0 HHT 1N L 2 A 5 AC B B 7 6 E 0 D 44 AB AE 7 1 8 9 E E 7 0 E A 1 D 5 10k 4 7 1 VMH cr Should Compile 396 0 s o f t E n h a n c e d Cryptographic P rovider v 1 00 Y tHt O0 0 tHt 0 tHt 0 Should Have Error 42f D X BoOTA G hae 19 s 4bY 4E1 fie 08O SI L1Z xt 8oel f CE amp ck 6 L187 Nae R F 9 3isyL1 UY N q zu amp i Shou
190. a License You can create a license can be created independently of its associated package The association with a package is made when you define the package To create a license for a package 1 Inthe Package Table in the Table pane right click the package and click Create License The Create License dialog appears In License File enter or browse to the path and filename In the Dongle List enter the license keys In Major Version select the appropriate version number cov ome x UN In Expires enter the expiration date of the package 6 EnScript Analysis 511 If you want to control the feature set used via this license in define enter the defined names associated with the feature set 7 Click OK and then click OK again in the status message box Running a Package Create and build a package A license may be associated with the package as well To run a package 1 Copy the created license file to C Program Files EnCase6 Licenses 2 Doone of the following O Change root folder of your EnScript folder to reflect the location of the package created O Copy the created package to a folder in your current EnScript root folder normally C Program Files EnCase6 EnScript 3 Ifa license is associated with the package ensure that the installed security key matches the key s entered when creating the license The EnScript program is now ready to run 4 In the EnScript tree in the EnScript panel of the Filter pan
191. a Po b e CE PE D e Lee EXE Heu Rud 77 Help Meni s ime HORRORE E EASON EE Tek o BEIDE Ee ENS ERIS RATS 78 JTOOIDaEo S et an n LEER ERES EEUU SEE AEE SEENI AE EET 80 Panes ee cette nhe tetenndcet tne len eism n eie aM ios 82 Panes in the Analysis Cycle cccccscesessssssescssseececeeensesesesesesnensnesessscecsceeeeensnesesesesnsnensnesssssseseseeseenenes 83 Panes as Separate Windows sse tenente tenente 84 Pane Fe at reszz e eren cnet RR IR EVE EEH TRAE REEF RETE UXER ETHER REED XR Lye Flap oto 86 Pane Tab Bar and Pane Tab Bar Menu seen nne entente ette tene eene tenn enn 87 Tab Right Click MENU niunt deo nci ignei epi bre b Yir HERD ri UE He 88 Individual Pares ente ito tlie bi n eed be bna vb etie Patios ege 88 Tree Pane unen ei min ile tei Hp iv Hei PEG ries 89 Table PaE IER e t eitis ee beet diee e deba eb boi b e i te eo o ai db d 91 Sorina Table eee eret tees sus ORE ER E EGRE D ERR Eee FOYER REESE 92 Filters Io PERRA RR c E 93 Filtering Effects in Table Pansier orrori rinine EEEE AE EEEE AEE EE E a 94 View Panen EE E EEA eot eee hr eure ede dede EE 96 Status nez ep a nee tise dts optatis aeree p rH OR 96 Panes and their Specific Tabssa2i5 abere mto hien te teli etu tree e dieto Grates 98 Tree Pane Tabs eati emanibautaiibanmteigoetathibutunmndiiitedog 99 Table Patie Tabsz i eorr etta bete reidit beati netta initia bebes ere edes 99 TableTab Golimmmngxssss sette DR eget alivibi a
192. ab Keywords associated with the currently opened cases appear in the Cases Keywords tab The elements found in these trees have unique right click menus The Edit menu matches the right click menu of the currently selected element or object App Descriptors Home EnScript Types App Descriptors Hash Properties File Signatures Archive Files File Types Cases Home File Viewers Cases Entries Home Hash Sets Home Cases Entries File Extents Hash Sets Hash Items Cases Entries Permissions Keywords Cases Entries References Machine Profiles Home Cases Entries Hash Properties Machine Profiles Allowed Cases Bookmarks Home Packages Cases Search Hits Home Projects Cases Search Hits Hash Properties SAFEs Home Cases Records Home SAFEs Network Cases Records Additional Fields SAFEs Roles Cases Devices Home SAFEs Users Cases Devices Acquisition Info SAFEs Events Cases Devices Sources Text Styles Cases Devices Subjects Cases Devices Read Errors Cases Devices Missing Sectors Cases Devices Disk Elements Cases Devices CRC Errors Cases Secure Storage Cases Keywords Encryption Keys EnScript Table Pane Tabs The Table pane displays tabs that provide different views of the entries selected in the Tree pane The context established by the entries in the Tree pane determine w
193. age sia o Ore To create a folder structure bookmark 1 Right click the device or folder to bookmark and click Bookmark Data The Bookmark Folder Structure dialog appears 2 Accept the default settings or enter appropriate values 3 Click OK You can now view the folder structure bookmarks in the Bookmarks table of the Table pane 418 EnCase Forensic Version 6 11 User s Guide Creating a Notable File Bookmark When you bookmark a single file a notable file bookmark is created Before you can create a notable file bookmark one of the following is required The Entries tree must display in the Entries panel of the Tree pane E The Records tree must display in the Records panel of the Tree pane I Oman tm bnt or To create a notable file bookmark 1 For the file to be bookmarked select the device containing the file 2 Ineither the Entries table on the Entries panel of the Table pane or the Records table on the Records panel of the Table pane select the row describing the file 3 Right click on the row describing the file 4 Click Bookmark Data The Bookmark Data dialog for files appears 5 Accept the defaults or modify the values displayed on the Bookmark Data dialog 6 Click OK The notable file bookmark is placed in the Bookmarks table of the Table pane Bookmarking Items 419 Creating a File Group Bookmark A file group bookmark is created if more than one file is selected in the Entries table B
194. al Standards Organization ISO and the International Telecommunications Union Telecommunication Standardization Sector ITU T are working to standardize different types of electronic data Typical graphic file formats such as JPEG Joint Photographic Experts Group have been standardized by both organizations When a file type is standardized a signature or recognizable header usually precedes the data File headers are associated with specific file extensions Signature analysis compares file headers with file extensions File Signatures File extensions are the characters usually three following the dot in a filename e g signature doc They reveal the file s data type For example a txt extension denotes a text file while doc connotes a document file The file headers of each unique file type contain identifying information called a signature All matching file types have the same header For example BMP graphic files have BM8 as a signature A technique often used to hide data is to attempt to disguise the true nature of the file by renaming it and changing its extension Because a jpg image file assigned a dll extension is not usually recognized as a picture comparing a file s signature which doesn t change with its extension identifies files that were deliberately changed For example a file with a dll extension and a jpg signature should pique an investigator s interest Note The software performs the signature analysi
195. alue for that bookmark is TRUE Bookmarking Items 437 3 On the Table pane toolbar click Report The report appears in the Report panel of the Table pane E Table Gallery 3 Timeline fZ Disk ig Code Pipe Bomb Data Jay s Bookmarks Pipe Bomb Data Page 1 1 Bonnie and Clyde Bonnie and ClydeXPIPEBOMB TXT Extremely dangerous Nea nt AT 1zXO zDn c m ny qi T Ly ES 2 Bonnie and Clyde Bonnie and ClydeXPIPEBOMB TXT This is Jay s bookmark from Bonnie and Clyde case HOW TO MAKE A POWERFUL PIPE BOMB This pipe bomb is extremely powerful and should b e used with extreme caution This bomb is very nice and EXTREMELY powerful though It packs quite a punch especially nestled on someone s engine block Ingredients 4 AP VC pipe The longer the more powerful I recommend about 5 inches 2 Two ends preferably brass These are the things that screw on to the end of the pipe 3 Black powder qun powder 4 drill 5 Cannon F use 6t inches long 6 Iron bits and pieces denotes optional Instructions Use the drill to make a hole in the middle of the PVC pipe a hole as big as the width o f the fuse Put one end on one end of the pipe tighten it nicely and then pour as much black powder in there as will fit Now securely fasten the other end on the other side and insert the fuse Place light and run Options Bury the bomb about six inches underground and light I once did th
196. ame and use the default path in My Documents click Save 3 You can also navigate to or enter a different filename and path and click Save Case Management 177 Saving a Case and the Global Application Files You can save the global application files containing preferences conditions and filters in the locations specified in the Storage Paths tab of the Options dialog 1 Click File gt Save All The Save dialog appears 2 If you want to use the current file name and the default path in My Documents click Save 3 You can also navigate to or enter the desired filename and path and click Save Close Case Protect the integrity of cases by closing them when they are not being worked on 1 Save the open case 2 In Tree view place the cursor on an open case 3 Click Close Click Yes to close the case Note Close is also available from the right click menu CHAPTER 7 Working with Evidence Overview 179 Supported File Systems and Operating Systems 182 Using Snapshots 182 Getting Ready to Acquire the Content of a Device 183 Acquiring 196 Remote Acquisition 235 Hashing 240 Logical Evidence Files 242 Recovering Folders 247 Recovering Partitions 250 Restoring Evidence 254 Snapshot to DB Module Set 260 WinEn 270 180 EnCase Forensic Version 6 11 User s Guide Overview The EnCase application organizes digital evidence into an associated case Digital evidence is previewed then possibly acq
197. and Internet Artifacts 347 Searching for Email 364 366 Searching Selected Items 368 Sector 524 Secure Authentication For EnCase SAFE 524 Security Key 524 Selecting Tree Entries for Operations 120 Send to HBGary Responder EnScript 19 Send To HBGary Responder EnScript 504 Servlet 524 Sessions Sources Page of the Add Device Wizard 185 Setting a Lock on Columns 126 Guidance Software Setting Time Zone Options for Evidence Files 171 Setting Time Zones Settings for Case Files 170 Setting Up the Storage Machine 234 Setup for a Drive to Drive Acquisition 50 Sharing Configuration Files 40 Show Deleted Files 358 Show Excluded 434 Show Excluded Files 356 Showing Columns 123 Signature 524 Signature Analysis 146 314 324 Signature Analysis Legend 332 Single Files 179 Slack 524 Snapshot 524 Snapshot Bookmarks 398 Snapshot Differential Report 482 Snapshot to DB Module Set 18 255 Software RAID 221 Sorting a Table 92 Sources Page 240 Sources Page of the Add Device Wizard 183 Specifying and Running an Acquisition 204 Specifying Database Content 261 Spyware 524 Status Line 96 Steganography 525 Storage Paths Tab 39 Styles 403 Subject 525 Support 528 Supported Encryption Algorithms 387 Supported File Systems and Operating Systems 179 Supported SafeBoot Encryption Algorithms 384 Swap File 525 Swe
198. and filename where the EnCase evidence file resulting from the acquisition is written Alternate Path contains the path and filename of an alternative destination volume where the EnCase evidence file is stored if the first location runs out of disk space 206 EnCase Forensic Version 6 11 User s Guide Acquisition Results Dialog This dialog displays while an acquisition is performed xi Status Completed Console Start 09 15 06 05 49 30PM Stop 09 15 06 05 49 32PM Note Time 0 00 02 Name D Log Record Path C Program Files EnCase6 D17 E01 GUID C679CD1A6FAC4F41B52F944914187922 Acquisition Hash 6E46EFEDO2CSED635B9C59A94F40B9CA Cancel Console sends the status messages displayed in the dialog to the Console tab of the view Note writes the contents of the status message into a bookmark note containing the device and EnCase evidence file being acquired Log Record adds the status messages displayed to a bookmark log record Working with Evidence 207 Opening the Acquisition Wizard Before you begin Open the case associated with the EnCase evidence file before you acquire an EnCase evidence file The device from which the content is acquired must already be added to the case Prerequisite Open Case it3Home Entries L Bookmarks Q Search Hits dRecords Devices SA secure Storage Keywords Dos E Table E Report Ez Gallery 5 Timeline g Disk 4g Code n miis
199. and the entries and objects it contains appear in the Table pane where the entries can be selected for further analysis or exploration Checkbox enables you to select the entry or object without selecting the entries of objects it contains Category indicates the type of entry Name contains and displays the name of the entry or object The name can be highlighted which indicates that the entries or objects contained in the entry or object associated with the name appear in the Table pane Clicking on any part of a entry or object highlights it Navigating the EnCase Interface 91 Table Pane The Table pane contains tabs that show you different aspects of the objects selected in the Tree pane Selecting a tab determines the representation used The Table tab of the Table pane displays information about these entries in a numbered table Except for the Gallery tab this information is descriptive rather than the actual content of the entries You can view and further explore the content you select in the Table pane Figure 14 The Table pane lists the data from the object selected in the Tree pane where 1 the tab toolbar contains tabs appropriate for the type of data you selected in the Tree pane and 2 the column headers show you the values you can use in the analysis for example a column header for files is File Type 3 the numbered selection column where you select the table entries to use in operations and 4 a highlighted entr
200. and then click New The New Package dialog appears displaying the Package panel 3 On the Package panel complete the settings and then click Properties The Properties panel appears 4 On the Properties panel complete the settings and then click OK 510 EnCase Forensic Version 6 11 User s Guide Once created the package appears in the Packages Table in the Table pane The columns in this table contain the details entered in the New Package dialog EH Table Report Code In Major Minor Sub Source Output License Secret n Report Version Version Version Path Path Name Key C 1 9 Package 7 7 7 C Pr Cir License P Name Note Creating a package does not produce the package file To produce the package file see Building a Package Editing a Package 1 Inthe Package table on the Table pane double click on the desired package The Edit package name gt dialog appears 2 Modify the settings as desired and click OK Note If you want to change the code you will need to first modify the EnScript code source file and then generate a new package file You may want to alter the version numbers to reflect this Building a Package 1 Inthe Package table on the Table pane double click on the desired package The Edit package name gt dialog appears 2 Modify the settings as desired and then click OK The package is now created in the output path specified Creating
201. ane 1 Inthe View pane select the desired content 2 Onthe highlighted content right click Bookmark Data The Bookmark Data dialog for highlighted data appears 3 Select the appropriate data type in the Types tree 4 Enter the desired comment 5 Click OK The comment appears in the Comment column of the Bookmarks table 416 EnCase Forensic Version 6 11 User s Guide Creating a Notes Bookmark A note can contain up to 1000 characters You can use a note to annotate a bookmark Before you begin B Create the desired bookmark E Verify the bookmark it appears in the Bookmarks table in the Table pane usd Preview Comment Eo B E s price Length Name Filter 11 u Dems i ESOT deesse E e oce Add Note one O 5 2j Logs Show Excluded r L3 7 4 Q Case Time Settings o setup exe C3 drive g 2 File Group Show Deleted C1 7 File Group Delete Delete Delete All Selected Ctri Delete Exclude Ctrl E Exclude All Selected Ctrl shift E Adjust Rows Export Tag File Ctrl T Summary Bookmark Rename F2 Show Columns Column Sort Select Item Space Bookmark Preview Comment Type ma Io 2 2 CO 3 Q Search summary 4 Q Case Time settings 5 2j Logs go File Group File Group 8 Note T487 Search To create a notes bookmark Add Not
202. anel Microsoft Windows v Details Continue User Account Control helps stop unauthorized changes to your computer 5 Click Continue 6 In the Turn User Account Control On or Off window clear the option for Use User Account Control UAC to help protect your computer then click OK GO v 43 Search 0 0 0 EJ User Accounts Turn User Account Control On or Off Turn on User Account Control UAC to make your computer more secure User Account Control UAC can help prevent unauthorized changes to your computer We recommend that you leave UAC turned on to help protect your computer Use User Account Control UAC to help protect your computer e J eme Installing EnCase Forensic 43 7 A message displays prompting you to restart your computer to apply these changes Click Restart Now or Restart Later to close the User Accounts Task window Microsoft Windows You must restart your computer to apply these changes Before restarting save any open files and close all programs Rene Running a 32 bit Application on a 64 bit Platform There are limitations in running a 32 bit application for example EnCase SAFE or Servlet on a 64 bit platform You will only get basic snapshot information such as ports or processes For full results you must run the application on the correct platform Introduction 45 Viewing the License for LinEn 46 Creating a LinEn Boot Disc 47 Configu
203. anize a Bookmarks Report Bookmarking Items 431 When several bookmarks are created they appear in the bookmark report as selected by In Report in the Bookmarks table Using folders is a way of selecting subsets of bookmarks to appear in the bookmarks report Before you begin B The Bookmarks tree displays in the Tree pane B the destination folder is in the Bookmarks tree Bras Cases lome ries ear a Records evices 2 cure Storage eywords H Entri Bookmarks Q Search Hits Records D S Secure St Keyword T Tabie Regort St Galery QiTmeine D Disk 4 Code Bookmark Type Preview Comment Page Break Show Entry Picture Selected File Offset Length Name Filter In Report 1 2 D 3 Q Search Summary q Case Time Settings Bj Logs File Group SOC Bookmarks am Oe D Ts ra Re rag O kg Drag 4 File Group 4 File Group eo o o nm o m File Group LIO ID D OOO s af at aq qt at setup exe drive setup exe el ee 551 7 5255 ooooc usbest drive 2 0 exe Show Entry File TLI PPROEEE Bookmark z Page So Bookmarks ES Preview Comment Break coe 1 1 18 File Group e g File Group In ile Picture Selected Offset Length Name Fiker Report 4 Ext 0 setup exe exe 2 0 usbest drive 2
204. ar of the DST rules you want applied When you are finished click OK 174 EnCase Forensic Version 6 11 User s Guide General Time Zone Notes B FAT HFS and CDFS times are not associated with any time zone when stored on a target machine The investigator assigns a time zone to the evidence at the device level This assignment does not change displayed dates unless a case time is set and it is different from the device time E NTFS and HFS times are associated to Greenwich Mean Time GMT when stored on a target machine B Set device time zones associates a time zone with the stored FAT times and for NTFS displays the correct offset from GMT Note By default all time zones are set to the examiner machine time zone Modifying the case time zone to convert all times to one time zone changes the FAT HFS and CDFS times if the device time zone is different from that of the case time zone All NTFS and HFS times are adjusted to the case GMT offset if convert all times is applied m At the case level the daylight settings respond this way O Ifstandard is selected no change is made to any times O If daylight is selected one hour is added to all display times regardless of the time of year O The investigator s system clock date in standard or daylight time should have no effect on displayed times FAT HFS and CDFS Time Zone Specifics FAT HFS CDFS All times are stored initially as the system time of the acquired mac
205. ardless of whether the set consists of two or more drives Therefore if the investigator acquires the set in its native environment the disk configuration can be acquired as one drive which is the easiest option The best method for performing such an acquisition is to conduct a crossover network cable acquisition Note The LinEn boot disc for the subject computer needs to have Linux drivers for that particular RAID controller card To acquire the set 1 Keep the disk configuration intact in its native environment 2 Bootthe subject computer with an EnCase Network Boot Disk 3 Launch the LinEn utility Note The BIOS interprets the disk configuration as one drive so EnCase applications will as well The investigator sees the disk configuration as one drive 4 Acquire the disk configuration as you would normally acquire a single hard drive depending on the means of acquisition Parallel port crossover network cable or drive to drive acquisition is straightforward as long as the set is acquired as one drive If the physical drives were acquired separately or could not be acquired in the native environment EnCase applications can edit the hardware set manually Working with Evidence 229 Disk Configurations Acquired as Separate Drives Sometimes acquiring the hardware disk configuration as one drive is not possible or the method of assembling a software disk configuration seems incorrect To edit a disk configuration several
206. are included in the SafeBoot installer file 1 Unzip the file s content s to C Program Files EnCase6 Lib SafeBoot Technology SafeBoot directory of the EnCase install directory This is the default path and directory You may change it if necessary File Folder Name SHA 1 Hash pAlgs folder blank PT EE n 1 eee err 2 eee eee SbAdmDILdll 78659b65f2lactebcb280d1 5209542274 ceab3b1b66484b84d51e6583a6b7c224db109379 700991691016593cb609604343b720f5 26012501533a80d9d4a3 162064260544c59ad06 SbDbMer dll Sef700de3942a1 16b42977938220927 4be9524es2760e9814e86679e0221513821a7950 xml af495a2020da74234063080724b996ce 712 97381235210dae61 110672 88220 474311 ba065677 862107026a88623dfcl 147725420822 c143265024f6ac592ca4dbcb82505202b563561b 41b604432d48bb9429217734e50ec9bd 3250382c222fd385bb4920ces6687b8b72667c08 0 07cec042008320627252020767802 2 69189524991573ac7d 300dc4dc6d7f61fc9da SbUserObj dll 4643 5 3ca9323995b0d9b38520be092 c e41b68f98c676bbal7c718bb8b8b0c2afba3d7 SbXferDb dll 8 95dd835c581 5c54e 234d41e2c8934 1 c45d17317a3 25d7b18970e2b93ed1a872 34 62b533c9084280cbf28c7123351cb786 626f63013af6f2d2593820d711a642f350f426fb Qi 09059cb56947364d32675b4901a89093 3e1797a1272c91991a94 00641 c4452bc544025 Q ToolSafeBootToolexe 40dd4495f25003478feb33af73c6446a 9c7flas sdc4blcclf32a6229d97706274427119 sbTokens SbTokenPwd dll Of60b78d7cfcb825a318ca6741903161 40130899b6c0d0314c68489b30d67cd4b863db8e
207. are is please to announce our new collaboration forensic solution for government users called EnCase Guidance Product Version Matrix New forensic lab opened at Lab Edition e Hardware Recommendations the University of Teesside Subscribe to public bugs UK Read more 202 reads Registration Registration requires you to choose a unique username and password Please provide all requested information including dongle ID phone e mail address organization etc This helps us identify you as a registered owner of EnCase You will receive an email within 24 hours You must follow the link in that email before you can post on the forums Until you do that you will not have permission to post Once you have verified your email address you will be added to the Registration List Please allow 24 business hours for your account to be approved Once your registration is approved you can access the Support Portal https support guidancesoftware com You can use the Support Portal Tutorial for a brief overview of the site Home Forum Knowledge Base Y Bug Tracker My Profile Request Form Support Portal Tutorial Log Out Administer v 540 EnCase Forensic Version 6 11 User s Guide User product and foreign language forums To access the forums click on the Forum Tab https support guidancesoftware com forum in the Support Portal Home Knowledge Base Y Bug Tracker My Profile Request Form Support Portal Tutorial Log Out Ad
208. arks search results sorts hash analysis results and signature analysis 527 Checksum A form of redundancy check for protecting the integrity of data by detecting errors It works by adding the basic components of a message typically the asserted bits and storing the resulting value Later anyone can perform the same operation on the data compare the result to the authentic checksum and if the sums match conclude that the data was not corrupted A major drawback to checksum is that 1234 generates the same check as 4321 Cluster A cluster is the smallest amount of disk space that can be allocated to hold a file Code Page A code page interprets a series of bits as a character Compound File A file containing other file types within it For example a Microsoft Word file can contain text graphics and spreadsheet files Computer Forensics The application of scientific method to digital media to establish factual information for judicial review This process often involves investigating computer systems to determine whether they were used for illegal or unauthorized activities Connection The communications between the servlet and the client occur across a connection This connection may involve communicating through the SAFE 528 EnCase Forensic Version 6 11 User s Guide Cyclical Redundancy Check CRC The CRC is a variation of the checksum Its advantage is that it is order sensitive The stri
209. ash set to be created Create Logical Evidence File displays for a selected file or collection of selected files the Create Logical Evidence wizard so you can create a new logical evidence file to contain those files Mount as Network Share displays the Mount as Network Share dialog so you can mount an acquired device as a network share This command appears only if the Virtual File System module is installed Expand Contract for a selected object anywhere along the branch of the tree expands the branch of the tree or for a fully expanded branch of the tree contracts the branch Expand All expands all branches of the tree Contract AII contracts all branches of the tree Set Included Folders is a toggle switch It initially sets Select All for the selected object in a tree and its branches Choosing it again clears the selected nodes Include Sub Folders toggles Select All for the selected object in a tree and its branches Include Single Folder toggles Select All for the selected object in a tree ignoring its branches Copy UnErase The Copy UnErase command recovers and unerases files with byte per byte precision To initiate Copy UnErase 1 Click Edit gt Copy UnErase 2 Select the file or files to copy 3 Select whether to have each recovered file appear in a new file or to merge them to a single file 8 9 Navigating the EnCase Interface 65 Enter a replacement character for erased FAT table entries The def
210. ass header cellpadding l cellspacing 1 gt lt tr gt lt td colSpan 1 gt Case Thumb lt td gt lt td colSpan 1 gt Time 09 27 06 09 35 38AM td lt tr gt lt table gt lt table class folder cellpadding 2 cells pacing 2 gt lt tr gt lt td class folder colspan 7 ThunbiThunb Drive lt td gt tr Ij lt tr gt lt th gt FileName lt th gt lt th gt Description lt th gt lt th gt Bookmarks lt th gt lt th gt Size lt th gt Created lt th gt th Last Accessed lt th gt lt th gt Last Written lt th gt lt tr gt lt t p pan l class 350 EnCase Forensic Version 6 11 User s Guide Local Keywords A local keyword is associated with a unique case and can be searched for only when that case is open If a local keyword is created in one case and another is opened the local keyword is unavailable Open a case and prepare a list of keywords specific to this case only 1 Select View Cases Sub Tabs Keywords The Tree pane appears with a display something like this This specific display shows the local keywords folder with a new folder added T b DO Keywords Log Folderi Import Keywords You can import keywords and keyword lists from other users To import a keyword list 1 Right click a keyword folder in the Tree pane 2 Select Import 3 Enter or browse to the path of the desired file and click OK The imported list appears in the Tree pane Export Keywords Keywords are expo
211. at ir iners ete EPIS LU Diet Ersten 505 New Package Dialog 5 itttes aniio iiid ed piti t Ra iH ies etii eb iae ben 506 Package Panel Murr eten ao ie tt bicis ostio ibtd veil etie bra Pelei een 506 PropertiesPanel aont deat bep ibis Dto bebe te tb ipod leet e Een 507 Create License Dialog eee EGER HEISE ERO DERE SOR HE ER E bea HERE 508 Using a PACK ae nr eee ente oem eta e o ien rede i e ie i eroe ee pee 509 Creating a Package o nearest e ted te ere iR gite tee eee i en eben ide 509 Editing a Package ie eret ta Pere uidere i re t ne ride vv Per rt 510 BULGING a Package i sores ia sett d etel e oS delen etel d S 510 Creating a license oriens err imer d er PORE HS RE S Fe EET I SEFERE sE Sa ro re EE EEEHEERUE akt 510 R unning a Package 4 i store eate b eie eti seid ded Sur Un eda o een 511 Send To HBGary Responder EnScript ccccsscsescssssseeesseesesesesnsneessscseecesesesenenesesssesnsnenenesessseeeeceeeenenes 511 xii Contents CHAPTER 14 Using EnCase Tools 515 IKO 07 1 X 516 Tools Men eeror i A i E E ETE OA AEON ERAEN AE E A EE 517 EnScript Programs Shortcut Submenu essere en een nennen 518 MWapeDEVeuiiaieetisitu praeerat toit E E a a aquest in aposatiud deti ris shoe crs 518 Mentyins Eviderice Piles c5 eet data tefte ide tail aeu telii eset sd uites tudi dot etes 521 Creating a LINEN Boot Disc enen enne 522 Dionto c EE 523 CHAPTER 15 Glossary of Terms 525 CHAPTER 16 Guidance Softwa
212. ates OS X artifacts and bookmarks them Partition Finder searches unused space to find deleted volume partitions Recycle Bin Info Record Finder finds and parses FAT INFO and NTFS INFO2 files Scan Registry scans the Windows registry and bookmarks artifacts Time Window Analysis Module analyses selected events between specified dates Windows Event Log Parser parses selected Windows event logs Windows Initialize Case locates Windows artifacts and bookmarks them WTMP UTMP Log File Parser parses WIMP UTMP WTMPX and UTMPX files on Unix systems File Mounter File Mounter is an EnScript used to search for and mount compound files including m DBX E GZip E PST m TAR E Thumbs db E Zip Searches can be by extension or signature or both Note Mounting a number of large files simultaneously can cause your system to run out of memory Note Password protected files are not mounted 496 EnCase Forensic Version 6 11 User s Guide Double click File Mounter Select the method to find the files File Mounter This script will search through the case For compound files and mount them Run over selected files only C Both r Find Files By Extension Signature Bookmark Folder Name File Mounter File Types J dbx gzip J pst C tar CNT reg 95 reg C Thumbs db D zip cab J pfc nsf stf Select the desired file types and click OK To view progress clic
213. ation repiaceqURmt var ntind 2 window open 7 heights 1 with menubareno retiableseo Miebaeeno scrolbarseno stahe no Jocibareno manbaa Jocatioreno wHind closed Ch ngelf eO Hotmad Forward MSN Home iito Mg man com 1HMOQOR0 1 241 IMG http 64 4 20 24 format vertical separator gfiMy MSH http Dg men com 1HNO00901042 IMG http 084 4 20 24Afcemat vertical separatce gf Metal http 164 4 20 24Aormat vertical separator of Search tetp Jy msn Com HVGOORO 243 IMG http 64 4 20 24format vertical veparstor gf Shopping Htp Ag men cont HMGODROT 244 IMG Mtp 64 4 20 24cemat vertical separater of Mamey Hto Jg men comi HMODSOT245 IMD Ntp 64 4 20 24 5 rmat vertical separator People AChat Http Aa min comIHNGOOSOL245 MG ltt NGA 4 20 24 20 rmn 116340 http Aig min convIHNODAAOUBT MG http 64 4 20 24A at gf MG itg i4 4 20 24 dosc EN gf herp iw 1 414 law 4 hotmail msn com cgebintiogout cumboks f IMG http A64 4 20 24 tr Search the Wed MG http 064 4 20 24Agn hv 129836 off giam J caebithmhorm cumbassF 123135523449 MOSTAR 490 449914162 IMG ttp 064 4 20 24 menu of off separator gfinpox ept HoT MaL cumboss FODODODOD 99 208339 549894991010 IMG Htp 064 4 20 24 menu of cn sepanitor gf cmpo4 cg be compose curmbar F 1231 355235 a7 208139 639644991416 MG tetp 64 4 20 20 menu on of separator gf dires Book eg bin ad resses curmbovsF 173135523 208339454904049914 MG itp KE4 4 20 24 menu o
214. ault is an underscore Click Next To determine what is to be Copy UnErased do one of the following a If only the logical files are to be Copy UnErased click Logical Files Only b If the entire physical file is to be Copy UnErased click Entire Physical File c IF RAM and Disk slack are to be Copy UnErased click RAM and Disk Slack d If only RAM slack is to be Copy UnErased click RAM Slack Only To determine which mask will be applied to the filenames of Copy UnErased content do one of the following a For no masking click None b If non ASCII characters are to be masked click Do not write non ASCII character c Ifa dot is to be substituted for non ASCII characters click Replace non ASCII characters with DOT If errors are to be included click Select Show Errors and then click Next If a destination folder other than Export is to be used select a destination folder 10 Click Finish 66 EnCase Forensic Version 6 11 User s Guide View Menu The View menu provides commands that determine the contents of the EnCase window panes View menu commands m Display specific tabs in the tree pane E Display tabs that otherwise are not displayed or that otherwise do not appear in the tree pane Toggle controls that appear in tab bars and the wrapping of the tool bar E Navigate between tabs hide tabs and control the display of tabs with or without their names E Move any tab containing windows back to their us
215. b Lib Lib Lib Lib Lib Lib Lib Lib Lib Mounting Case l Jeff s 1 Mounting Case l Jeff s 1 Could Not Mount DATAl1 C Mounting Case l Jeff s 1 Could Not Mount SYS1 C Mounting Case l Jeff s 1 Could Not Mount _USER1 Mounting Case lXJeff s 1 Mounting Case l Jeff s 1 Mounting Case l Jeff s 1 Could Not Mount _USINES Mounting Case l Jeff s 1 Mounting Case l Jeff s 1 Could Not Mount Photosh Mounting Case l Jeff s 1 Could Not Mount ADOAPTL Mounting Case l Jeff s 1 Could Not Mount ADOFREl Mounting Case l Jeff s 1 Could Not Mount HANDLER v b The Details tab provides file extent information To view file extents 1 Opena case and display its contents 2 Scroll to the file extents column in the Table pane and click File Extents in some row 3 Click the Details tab in the Reports pane to view the file extents The figure below shows the first eight file extents from a piece of evidence 3 E Text amp lHex Lodi Doc 3 Transcript E Picture Report el Console al Output O tock E cod Late File Extents EL n ET u il 52 411 16 26 834 432 8 192 13 087 4 E 64 187 4 32 863 744 2 048 16 031 1 33 104 651 4 53 581 312 2 048 26 147 1 E 115 663 4 59 219 456 2 048 28 900 1 E 143 947 4 73 700 864 2 048 35 971 1 eg 160 491 12 82 171 392 5 144 40 107 3 7 164 671 12 84 311 552 5 144 41 152 3 8 165 475 28 84 723 200 14 336 41 353 7 Navigating t
216. be PhotoShop psd pdd BBPS xO0 x01 x00 No Yes No let ae Cj 10 Adobe Photoshop A atn xOO XO0 x00 x0C No Yes No Lang Z Adobe Photoshop C aco x00 x01 4x00 No Yes No am 7 WI AES rm A Lec ca as sa ma he Ji Hunter XP Hunter XP C PS 1659279 LS 1659216 CL 414804 SO 000 FOO LE 1 If Set Include is checked all file signatures are listed The columns in the File Signature display are Name displays the file name associated with the signature Search Expression displays the string or GREP expression used to locate the file signature GREP is true if the search term is defined as a GREP expression Case Sensitive indicates whether the search term is case sensitive Analyzing and Searching Files 331 Extensions lists the three letter file extensions You can add new or edit existing signatures Adding a New File Signature A file signature may not be in the table Use this procedure to add a new one You need to know the file signature search expression This is not necessarily the same as the three letter file extension To add a file signature to the table 1 Click View File Signatures The file signature display appears 2 Right click a file topic folder and select New The New File Signature dialog appears New File Signature 34 xl Search expression Extensions Search expression GREP Symbols MP3 wFFFF Unicode character xFF Hex character Name i Any character MP3 Music
217. ble Entry into a Folder Using the Right Click Drag Method on page 434 Copying a Table Entry into a Folder Bookmarking Items 433 You can copy an entry in the Table pane to a folder in the Tree pane Copying the entry leaves the entry in the table and creates a copy in the tree El Table Bookmark Preview Comm Type Sono Ar kS m Oa roce nzle amp es Drop e O 3 Q Search Summary 4 Q Case Time Settings Move Here 4 O 5 j Logs NM RN ZE Right click and after Drag E Table oo ee Preview Comm H02 Oia Fono o 2 52 tood 3 Q Search Summary OO 4 Q Case Time Settings eo 5 2j Logs SOD Gad777 SOO File Finder See 0 5 Log Local Machine To copy a table entry into a folder 1 2 Drop the entry on the folder and select Copy Here Right click and drag the desired entry into the desired folder 434 EnCase Forensic Version 6 11 User s Guide Moving a Table Entry into a Folder Using the Right Click Drag Method You can move a table entry into a folder using the right click drag The table entry is moved from the table to the tree 3 Home 5 Entries Q Search Hits of Records J Devices ga Secure Storage Keywords Go CJ y Bookmarks M DD MT Drop Se Copy Here Cancel a
218. bootable Be aware that as soon as you boot it the underlying data will be altered Working with Evidence 257 Note that differences may occur depending on whether you are restoring an NTFS or FAT32 file system and whether the restored drive is being booted on the original hardware platform the drive was acquired from EnCase applications restore using one of the following methods m Without FastBloc SE B With FastBloc SE Restoring without FastBloc SE because the disk drivers for Windows 2000 XP and 2003 do not allow direct disk access can be performed through the ASPI layer ASPI has a problem with rounding off the last few sectors that do not fit on the last cylinder of a drive This is the reason why all sectors are visible when the drive is read yet when writes are attempted a small number of sectors may be missing This is a Windows ASPI limitation not EnCase Because of this limitation you may need to use a slightly larger drive when performing the restore If you purchased the FastBloc SE module you can restore to a drive that is controlled through FastBloc SE When you restore with FastBloc SE FastBloc SE replaces the Windows drivers and allows direct disk access thereby circumventing the ASPI layer and its associated problems Because FastBloc SE can write directly to the disk you can restore to the same size drive Drive manufacturers also state that even though drives may appear identical once partitioned they may not have
219. box dbx LOJ Bonnie and Clyde 2 Select a record from the Tree pane then click the Report panel of the Report pane Selecting an entry from the Table pane displays an individual report like this E Text amp lHex LajDoc A Transcript ESI Picture CJ console 33 Details a output C Lo4 Name Re Web Page a Additional Fields Subject Re Web Page Client Submit Time 06 03 02 10 38 00AM Creation Time 06 03 02 10 38 00AM To Billy Ray lt billyray150 hotmail com gt From Bob lt chaser1191 hotmail com gt looks ok but there are no photos Original Message From Billy Ray To chaser1191 r 22 2002 9 02 AM Subject Web Page Bob am attempting to send you the page but not sure Billy Attachments Hunter XP Hotmail Sent Items dbxXRe Web Page _ afi Reporting 449 Internet Report Records for an Internet history report are created when you execute an Internet search Perform an email search as described in the Creating a Report Using the Report Tab chapter 1 Select View Case Sub Tabs Records The Tree and Table panes appear The Tree pane data show the records and the Table pane displays the record s contents Note the subfolders Cache and History Goog c ono Internet Explorer Windows DLJE3 Cache Log History 2 Select either Cache or History to display their contents in the Table pane 3 Select a record from the Tree pane then click the Report panel
220. button displays on the main window tab bar 1 Click Add Device The Sources page of the Add Device wizard appears In the Sources tree the Local object is selected and the local device types are listed in the Table pane Complete the Sources page of the Add Device wizard as needed and click Next If you checked Sessions on the Sources page of the Add Device wizard the Sessions Sources page of the Add Device wizard appears Otherwise the Choose Device page appears If Sessions was selected on the Sources page complete the Sessions Sources page and click Next The Choose Device page appears Complete the Choose Device page as needed and click Next The Preview Devices page appears Complete the Preview Devices page as needed and click Next The devices defined and selected on the Add Device wizard are added to the currently opened case The devices that were added to the case can now be previewed and acquired 194 EnCase Forensic Version 6 11 User s Guide Completing the Sources Page The Sources page of the Add Device wizard enables you to determine m The device types of the devices added to the case m The evidence files added to the case Before you begin B Open the case B Open the Add Device wizard to the Sources page Note For a local acquisition see Acquiring a Local Drive Note For a Palm Pilot acquisition see Acquiring a Palm Drive Note For a network crossover acquisition see Doing a Drive to Drive
221. button are enabled The file containing the data from the cancelled acquisition is available to speed up the current acquisition The incomplete set containing the cancelled file can be replaced with a set containing all the data Existing Evidence File contains the path and filename of the evidence file whose acquisition was cancelled earlier The existing evidence file is replaced by the acquisition in progress Existing Evidence File Browse opens the Windows file system browser to capture the path and filename of the existing evidence file Working with Evidence 201 Search Page Use the Search page of the Acquisition wizard to Search the entire case Define a keyword search Define an email search Verify file signatures E E B E Compute hash values ij E Identify codepages E Search for internet history Ultimately these searches and analyses lengthen the acquisition time For long acquisitions these searches can be performed independently from the acquisition once the acquisition is complete Search Selected items only 829 Entries 0 Records Keyword Search Options Email Search Options C Search entries and records for keywords C Search for email or 10 keywords Hash Options C Compute hash value Additional Options C verify file signatures Cl Identify codepages Search for internet history Comprehensive Search 202 EnCase Forensic Version 6 11 User s Guide Selected Items only acquires only thos
222. ce preservation Guidance Software offers courses for law enforcement agencies organizations concerned with forensics and incident response and advanced topics for all users 544 EnCase Forensic Version 6 11 User s Guide Professional Services The Guidance Software Professional Services Division PSD combines world leading computer investigations experts with world leading forensic technology to deliver turnkey solutions to forensic investigations Guidance Software has combined its industry leading computer investigation technology with a team of the most highly trained and capable investigators in the world to bring you complete turnkey solutions for your business When you face investigative issues that go beyond your internal capabilities our professional services group is able to respond either remotely or by coming on site to provide the right technology and computer investigations personnel for the job Internal Investigations B Theft of intellectual property B Intrusion reconstruction m Wrongful termination suit Compliance B Sarbanes Oxley m PII risk assessment B California SB 1386 eDiscovery B Pending litigation B Responsive production B Forensic preservation Information Security E Compromise of system integrity B Policy review B Unauthorized use B Forensic lab implementation Index 6 64 Bit EnCase Servlet 19 A Acquiring 193 Acquiring a Disk Running in Direct ATA Mode e 53 215 Acquiring a
223. ce tbo th ideas tette t sepe ates beate ib oae ES 102 Contents Filters Pane Menu cv de reete tense eee de td eater e ei ve dre e ee 105 View Pane Tabs ee Sete e pon aduer v E E e etre eee ee E 106 The Text labs Astorii aet etii rie deste Rt etd TL Netus 109 The Eex Tabioinsematiti estet etra iig tertie mrt d eon EU o Putat dtd E 110 The DOC Tabitesotendiitetaseteliitbaetnthdubeteredidu entered ud etus libet donetur 111 Phe Transcript Tab fesse ties oor aeta it Sese usted Beserteelfido ferai t etre etes 112 The Picture Tabris timene eee Disonttidtog E EE E A AEE iieri S 112 The Report Tab enitn e eere eR delete Om RA A S e R 113 The Console Tab nat edem d elem hag ae e d tetera dpt or SHEER 114 The Details Tabi nee een re er UR rte ei te ep e idum 114 The Output T b een atte teet de eire de rete t n edem dete oed tense 115 Navigating the Tree Dang dec e een di n ade rede DR Et a Feet Pr REED Kd 115 Opening and Closing Folders with Expand Contract sse 116 Exparid AU arei eset tefte tee Keen SEI NETT DOSE E RN QN KC Urt e EV E RET URN 116 Contract AIL one dei tete tete ta eei t Gg paca te at SEI UG dp e a pen canarias sees 117 Displaying Tree Entry Information for One Branch sese 118 Displaying Expanded Tree Entry Information seen 119 Selecting Tree Entries for Operations enne enne 120 Using the Dixon BOX cete oe e Ie rue slim len e ERE Ee Hei eei tere 121 Modifying t
224. ch and set back one hour the first Sunday in November This resulting extra four weeks is called extended daylight saving time period EnCase software uses time zone definitions stored in the examiner s Windows registry to adjust for daylight saving time and time zone adjustments Microsoft released a patch altering how these adjustments are stored The Windows registry contains a subdirectory of dynamic daylight savings time entries for different years This allows the operating system to apply current daylight savings time settings to new files and the corresponding year s daylight savings time for older files On patched machines the root entry for daylight saving time settings is updated to the 2007 time zone settings and that is currently the entry EnCase software uses Therefore if the examiner machine is patched EnCase software uses the new 2007 rules for entries whose dates lie in the new four week extended daylight saving time period Consequently all file dates even those for previous years apply the new daylight savings time settings Setting the time zone settings is accomplished two different ways If you have an entire case where you want to use one time zone you can set the time zone for the entire case If you have several pieces of media that use different time zones you want to set the time zones individually for each device in your case Case Management 171 Case File Time Zones Set the time zone for the entire ca
225. ck Snapshot Folder under the Bookmarks tab Cancel The Snapshot is created and placed in the Quick Snapshot folder in your bookmarks Remote Acquisition Monitor Use the Remote Acquisition Monitor EnScript Program to monitor remote acquisitions EnScript Analysis 489 Snapshot Differential Report Use the Snapshot Differential Report to compare differences in several snapshots of a particular machine It quickly detects trends of live data Before you begin m Snapshots were created and stored in a Logical Evidence File LEF B Microsoft Excel must be installed E Add the LEF containing the snapsots into a new case 1 Double click the Document Incident EnScript Program x Retrieve Snapshots Options Target Machine Choose Snapshots For Report 10 0 36 21 O d 11 22 06 12 03 33PM GSI DO J 11 22 06 12 03 51PM GSI DO ees O B 11 22 06 12 04 51PM GSI DO Items to Report IV Processes IV Open Ports v DLLs M Output Options IV Excel v HTML IV Bookmark Snapshots Output Folder Path C Program Files EnCase6 Export e Cancel Enter the name of the target machine and click Retrieve Snapshots In the Choose Snapshots For Report list select the snapshots you want to compare 2 3 4 Choose the types of items to report 5 Choose Output Options and provide an output path 6 Click OK You can view results in the EnCase program Microsoft Excel or an
226. closed a tab 2 indicates a tab displaying only the icon with the name hidden 3 the Previous tab and 4 the Next tab 3 Cases 33 Encryption Keys x I Home t Entries LL Bogle b Hil dc 1T Devices z x X Close Tab Ctrl F4 BA Show Name 4 Previous Tab Ctrl Shift Tab gt Next Tab Ctrl Tab Ll Auto Fit Close Tab hides a tab and its associated data To display the data after closing a tab use the View menu command associated with the tab for example View gt Cases Sub Tabs gt Secure Storage reopens the Secure Storage sub tab Show Name toggles the text displaying the name of the tab When the text is hidden the icon is still displayed You can shorten the contents of the tab bar by hiding the name text Previous Tab displays the tab to the left of the current tab on the tab bar Next Tab displays the tab to the right of the current tab on the tab bar Auto Fit toggles whether the tab bar is displayed as a single row with a scrollbar or wrapped to multiple rows when the pane is resized Individual Panes The individual panes that comprise the main window are B Tree pane Table pane E View pane B Filters pane Navigating the EnCase Interface 89 Tree Pane The Tree pane establishes the context for all case data analysis The Tree pane organizes a collection of tabs that contain a tree specific to that tab A tree represents the hierarchical structur
227. conditions for showing items pane then the row will not be shown 11 The default logic for the conditions is AND To change this logic to OR right click Combinations gt Combinations Change Logic gt Change Logic 12 Click OK Note Other operations including exporting and importing are the same as filters and conditions Gallery Tab The Gallery tab is a quick easy way to view images stored on subject media The extent of files shown in Gallery tab of the Table view is determined by the selection made in the Tree pane For example to view images of the entire case set include at the root of the Case tree In Gallery you can bookmark images just like bookmarking them in the Table tab If signature analysis is not yet run Gallery view displays files based on published file extension For example if a JPG file is changed to DLL it does not appear in the Gallery until a signature analysis is run Note Running a signature analysis is suggested before performing analysis in the gallery tab See the Signature Analysis on page 327 section of this manual for more information Viewing More Columns View more pictures in Gallery by increasing the number of displayed columns 1 Right click anywhere in Gallery 2 Select More Columns Viewing Fewer Columns View fewer pictures in Gallery by reducing the number of displayed columns 1 Right click anywhere in Gallery 2 Select the Fewer Columns menu option The r
228. cradle cable to a USB or serial port on the examination machine 2 Turn on the PDA then to put the PDA in console mode a On the left side of the graffiti area use the stylus to write a lowercase cursive L followed by two dots b On the right side of the graffiti area write a 2 The PDA is in console mode 4 2 On the Sources page of the Add Device Wizard 1 Inthe Tree pane click Local 2 In the Table pane click the checkbox for Palm Pilot 3 Ifother devices are to be acquired in this acquisition continue defining devices see Completing the Sources Page or click Next Working with Evidence 221 The Choose Devices page of the Add Device Wizard displays Add Device ST C 1 Local Drives Evidence Files M Palm Pilot C C Program FilesEnC 3 Se Network Crossover CitEvidence Files Choose Devices m On the Choose Devices Page in the Table pane select the entry for the Palm Pilot device and any other devices to be acquired during this acquisition and click Next The Preview Devices page of the Add Device Wizard appears On the Preview Devices Page in the Table pane select the entry for the Palm Pilot device and any other devices to be acquired during this acquisition and click Finish 222 EnCase Forensic Version 6 11 User s Guide In the Cases Entry Home tab of the main window the Palm Pilot to be acquired appears in the Entry tree
229. cripts listed in the Table pane soi Eg EnScript EH Enterprise Examples g Document Incident Hy Machine Survey Servlet Deploy Leg Quick Snapshot Ag Remote Acquisition Monitor Lig Snapshot Differential Report Lag Sweep Enterprise E Examples Te Forensic EHG Include GHG Main 3 To run a script double click it in the table 482 EnCase Forensic Version 6 11 User s Guide Document Incident Use Document Incident to generate a report containing details of an incident that required investigation Open a case 1 Double click on the Document Incident EnScript Program 2 Enter the following details in the General Info tab Oo Incident Reference Number Primary Contact Alternate Contact Incident Timing EnScript Analysis 3 Click the Incident Details tab and enter information in the following fields o Oo OF OF 0 0 O Incident Type Other Type Status Intent Incident Cause Incident Impact Affected Systems C Other C Hacking via public network J Hacking from internal private network C Theft 483 484 EnCase Forensic Version 6 11 User s Guide 4 Click the Conclusion tab and enter the recommended course of action and comments Document Incident 21x General Info Incident Details Conclusion Recommended Course of Action Is Comments 5 Click OK The Program generates a report Click the name of the incident in the bookmarks
230. d preview or acquire the content of a device first open the case associated with the device To acquire the content of a device 1 Using the Add Device wizard add the device 2 Using the EnCase main window preview the content of the device You are ready to acquire the contents of the device as an EnCase evidence file in the currently opened case Previewing Previewing is done before an acquisition so an investigator can determine if the device should be acquired A preview is not optional although the investigator determines the extent of the preview During a preview the content of the device can be analyzed just as if the content had been acquired Note A write blocking device such as the FastBloc write blocker prevents the subject device from changing Previewing via a crossover network cable is useful if a write blocking device is not available By previewing the investigator does not have to wait to finish an acquisition before doing a preliminary examination While previewing you can run keyword searches create bookmarks perform Copy UnErase and other analysis functions These search results and bookmarks can be saved into a case file however each time the case is opened the subject media must be physically connected to the investigator s machine 184 EnCase Forensic Version 6 11 User s Guide Live Device and FastBloc Indicators In the Entries Table pane and the Preview Devices page of the Add Device wiza
231. d to run straight from the CD or DVD and do not install themselves on the subject machine You must have an ISO image of the live Linux distribution you want to use such as Knoppix Knoppix is one of the popular live distributions Note As it is not practical to modify the settings of a live Linux distribution ensure that the live distribution does not automatically mount detected devices To create a LinEn Boot disc 1 Using your EnCase application on the investigator s machine click Tools Create Boot Disc The Choose Destination page of the Create Boot Disk wizard displays Click ISO Image and click Next The Formatting Options page of the Create Boot Disk wizard displays Provide a path and filename to the ISO image you downloaded earlier optionally click Alter Boot Table and click Next The Copy Files page of the Create Book Disk wizard displays Right click in the right pane of the Copy Files page and click New The file browser opens Enter or select the path to the LinEn executable normally c program files encase6 linen click OK then click Finish The Creating ISO progress bar displays on the Copy Files page Once the modified ISO file is created the wizard closes Burn the ISO file onto a blank CD DVD using the burning software of your choice For help with this refer to the instructions that came with your software You now have a boot disc to run Linux and LinEn while you acquire the subject Linux
232. der Structure saves selected email folder structure information Analyzing and Searching Files 377 O Output Path captures the location of the export data file The default is EnCase6 Export Click OK A message appears when the export function completes Email Export E x Status Completed IV Console Start 07 23 2007 11 03 53 AM Stop 07 23 2007 11 03 53 AM Note Time 0 00 00 Successful export email count 1 Log Record Failed export email count 0 Cancel View the entire structure down to the individual message in the Export folder View a message by double clicking it The message text appears in read only form The figure shows a typical text message presentation Subject Guidance Software Detected Potential Junk Mail Dear querty guidancesoftware com Guidance Software s junk mail protection service has detected some suspicious email messages since your last visit and directed them to your Guidance Software Message Center You can inspect your suspicious email at http login postini com exec login email querty guidancesoftware com Suspicious email is kept for 14 days after which it will be automatically deleted Please visit your Guidance Software Message Center to delete unwanted messages and check for valid email For help accessing and configuring your Guidance Software Message Center http www postini com services help html Thank You Guidance Software 378
233. ders The Tree pane that appears is similar to this illustration em x i Home fe Entries LL Bookmarks Q Search Hits 4 Of Home ote Fie Extents Permissions Ci1Refe gt DE Entri eoo goo oO Te anister Fireball File S008 lyde SOG Work C3 Homemade Explosives files Ssg Money BOI Bts Navigating the EnCase Interface 133 2 Double click a filter or right click it and select Run from the drop down menu that appears Complete any dialogs that appear When the filter finishes the Table pane displays entries that meet the filter s criteria The figure below shows the filter name and other data on those files that meet the requirements Deleted Files in this case EE Table Report J Galery Timeline fJ Disk g Code Is Last i File d els Fiter Delete written Created CJ 1 oRTRAIT JPG elated Files Yes 04 30 00 04 19 38PM_ 01 28 05 08 05 08AM CJ 2 aay _KSHIFT IPG LL DeltedFles Ss Ves 04 30 0004 19 46PM 01 28 05 08 05 02AM L 3 i microprinting jpg DeletedFies Yes 04 30 00 04 19 48PM 01 28 05 08 04 58AM E UMBERS JPG LL DebtedFles Yes 04 30 00 04 19 54PM_ 01 28 05 08 05 04AM sl linesmoire jpa Deleted Files Yes 04 30 00 04 19 56PM_ 01 28 05 08 04 52AM LJ 6 ig EAL IPG Deleted Files Yes 04 30 00 04 20 00PM_ 01 28 05 08 05 24AM gifedreserveandtrea Deleted Files Yes 01 06 01 11 49 58PM_ 01
234. device 48 EnCase Forensic Version 6 11 User s Guide Configuring Your Linux Distribution Before LinEn can run on Linux you must configure Linux distribution Due to the nature of Linux and its distributions only the following standard distributions are discussed m SUSE 9 1 E Red Hat E Knoppix Note Because of the dynamic nature of Linux distributions It is recommended that you validate your Linux environment before using it in the field The process describes an ideal setup process that effectively runs the LinEn application in a forensically sound manner Many distributions provide autofs as the means auto mounting anything attached to the Linux system It is essential that autofs is disabled to prevent auto mounting Obtaining a Linux Distribution A Linux distribution can be obtained from any Linux vendor If you intend to use a LinEn boot disc you will need a live distribution such as Knoppix in order to create a boot disc If you intend to run LinEn on a installed version of Linux on your forensic machine we recommend using SUSE or Red Hat For the Linux distributions discussed in relation to LinEn obtain a distribution from one of the following E For the latest SUSE distribution go to the http www novell com linux http www novell com linux website E For the latest Red Hat distribution go to the http www redhat com http www redhat com website B For the latest Knoppix distribution go to the
235. dit Menu The Edit menu commands work with the objects and content in the currently selected tab Edit menu commands are context specific changing as you move from one tab to another or select objects or content in a tab Specific Edit menus are discussed in sections describing the features that have an Edit menu associated with them Edit E Export Copy UnErase Copy Folders T Bookmark Data Ctrl B Create Hash Set Create Logical Evidence File Mount as Network Share Expand Contract Space Expand All Contract All Set Included Folders Num Include Sub Folders ShiFt Num Include Single Folder Ckrl Num 64 EnCase Forensic Version 6 11 User s Guide The Edit menu shown here provides the following commands Export displays the Export dialog where you select fields in a file to copy data to a text file and specify the path for the file containing the data Copy UnErase starts the Copy UnErase wizard for copying evidence files and folder entries to one or more destination files This command does not change the evidence file Copy Folders displays the Copy Folders dialog where you can process the content of a selected folder or folders in a variety of ways Bookmark Data displays the Bookmark Data dialog where you can create and define a new data bookmark Create a Hash Set displays the Create Hash Set dialog for selected files already hashed You can name and categorize the h
236. drive B Drive to drive acquisitions E Crossover cable acquisitions Drive to drive acquisitions provide the means to safely preview and acquire devices without using a hardware write blocker Drive to drive acquisitions use either the subject machine or the forensic machine to perform the acquisitions The Drive to drive acquisition speed can be significantly faster than EN EXE and MS DOS from previous versions simply because Linux is a 32 bit operating system Crossover cable acquisitions require both a subject and forensic machine This type of acquisition also negates the need for a hardware write blocker however it lends itself to situations where access to the subject machine s drive are difficult or not practical This is the recommended method for acquiring laptops and exotic RAID arrays This method is slower than a Drive to drive acquisition because data is transferred over a network cable and thus is especially sensitive to the speed of the network cards housed in both machines Setup for a Drive to Drive Acquisition When a subject drive from the subject machine cannot be acquired via a crossover cable acquisition the subject drive can be acquired via a drive to drive acquisition Drive to drive acquisitions can be done in the following ways m Running a LinEn boot disc on the forensic machine m Running the LinEn utility from Linux already installed on the forensic machine m Running a LinEn boot disc on the subject machine An
237. duties epit di esie 172 Setting Time Zones Settings for Case Files c cccsesssseeseseeceeeesnsneesesesseeececeeeenenesesesessanenenenesssssees 172 Setting Time Zone Options for Evidence Files 173 General Time Zone Notes nee ee rrt te e iaceo ib EHI ae ee eee eto reel eerta 174 FAT HFS and CDFS Time Zone Specifics ssssssssssssseeeeeeeeenene nete 174 Time Zone Example z een one med n e ie e i EE REE T OE R 175 Open Gase oce etes eee et ird ie ire e nter e evi ti ee Ire eee vea 175 DAVIN Ga CASE arator en dat ali er agir d EE Grp PEOR eite ti te PER oes 176 DAVING A CASE PEE 176 Saving a Case With a New Name or New Location eene 176 Saving a Case and the Global Application Files sss 177 lose Case zoo T E bibs oracle E E a ah att undi puto ntt ts es dd uctus ede cU oet 177 Contents CHAPTER 7 Working with Evidence 179 DV CL VICW sapai E aed ale EREE L EE AEE ERE E RENNET E dee bed E RE eai 180 Jypes oE Entries o eve e EA E E E E E R ERE 180 EnCase Evidence Files ete e e Pr EE OR S EI E EA eE 180 Logical Evidence Tiles i aor tiere ne Doe eturebies etae pibe ades 181 Raw Image Piles 2nd esoteltibietethdebeteretidue tute dqeheserdi od ente te tetto tes 181 Simele FICS sri sity stent tti eser titetute lids esca ud egt eso reel ata fueril Tre vnde dies 181 Supported File Systems and Operating Systems sssssssssseeeeseneneeeee eene 182 Using Snapshots serei eren tem aom m OE GO
238. dy generated If you create or add a report that report and the options you select for it are stored in the database enabling you to regenerate it as needed Double click an item in the list to modify it Right click an item to delete it If you delete an item without selecting its check box you must click OK and then click Yes on the resulting warning message Add Click Add to create a new report definition The Report Setup dialog opens Report Setup Report Name Report Output Path Report Type S Process Data O Process AndPortData O User Data Excel File J HTML Format Edit Condition In the Report Name field specify the name of the report In the Report Output Path field specify the location to save the report In Report Type select the type of report you want to generate O Process Data O Process and Port Data O User Data Working with Evidence 269 Excel File Select to output the report as a Microsoft Excel file HTML Format Select to output the report as an HTML file Edit Condition Select to add a set of conditions to report on Modify Select an item in the list making sure the check box is cleared then click Modify The Edit Report dialog opens Edit Report Report Setup Report Name Report Output Path C Program Files EnCase6 10 0 12 Export Report Type S Process Data O Process And PortData O User Data Excel File HTML Format
239. e eee eene 219 Acquiring a PalmPilot ssi eerta eoe aote ed amiet edeteliitisdens 220 EnCase Forensic Version 6 11 User s Guide Contents vi Leaving Console M ge isiru ett ederet tr ete ea eie te ort eei aee ee o botas 222 ACQUISITION TIMES on 223 AcquiringNonslocal DEVES esien Bester ete cen Peer doeet eed iar HO ede 223 When to use a Crossover Cable sss nnne nennen 223 Performing a Crossover Cable Preview or Acquisition sse 223 Acquiring Disk Configurations tenen nennen nnne 225 Software AID onis gerere tes eter bed emeret eg ere to ne esent ie peteret iler ar tee pepe 225 Windows NT Software Disk Configurations sse 226 Dynamic Disk nero redo er dO Rid dien aere i 227 Hardware Disk Configuration ccccsesesssesseseseseseeceseeesesesesesesesnsnsnesessssecececeeenensnesesesesnsnensnenesssesees 228 Disk Configuration Set Acquired as One Drive 228 Disk Configurations Acquired as Separate Drives 229 Validating Parity on a RAID D wits cis secs ene ense tede rte a n ek Ree ein uo 230 RAID TO saei abe cider No oi oris ect tab css dein dente TO ne la ace te ap eet n o 230 Acquiring Virtual PC Images xa ethic eet eee esed eie ten edel t d Besse 230 CD DVD Inspector File Support tertie troie tete to foto testate dones ao 230 Acquiring SlySoft CloneCD Images cccccscssesssssessscesessteesesesssnsnsnesescscseeseseeesssssceseseeee
240. e This setting appears on the shortcut menu only if a corrupt image is encountered The timeout defaults to 12 seconds for the thread trying to read a corrupt image file You can modify the timeout on the Global tab of the Options dialog Bookmarking an Image Viewing File Content 319 You can bookmark images on the Gallery tab of the Table pane Figure 31 43 Copy ii 3 3 bmp M all 4 Blue hi i Export Copy UnErase Activate Single Files Create Hash Set View File Structure Analyze EFS 5 Go to Parent Ef Fewer Columns More Columns Fewer Rows More Rows Select Item BkSp Ctrl Num Ctri Num Shift Num Shift Num Space A ig 5 Sunse C aaj 6 Water li Bookmark Files Bookmark Selected Items Create new bookmark folder Folder Name HH Folder Comment Lx Cancel 1 Select the desired image or images xl Comment Destination Folder Bookmarks 2 Right click the highlighted image and click Bookmark File The Bookmark Files dialog appears 3 Modify the settings as needed and click OK The image or images are bookmarked They are in the Table pane when the Bookmark tree displays 320 EnCase Forensic Version 6 11 User s Guide Reducing the Number of Images Per Row You can reduce the number of images displayed in a row in the Gallery tab G ag 4 Blue hi C
241. e double click the package to run it Send To HBGary Responder EnScript This EnScript passes a memory object gathered by EnCase to HB Gary s Responder software 1 Select the physical memory to send EnCase Enterprise Training File Edit View Tools Help L New 2 Open bel Save lt j Print Wy Start Debugging Ad Dices x E Home Q Search Hits en Secure Storage as File Extents amp Permissions Eon Entries gt RAM o E NtfsisEC2007 1 em GS002 192 168 11 128 RAM 512 EnCase Forensic Version 6 11 User s Guide 2 Click ToolsSend To Responder He d Index Case Ctrl I 4 webmail Parser d Case Processor Alt P D Sweep Enterprise Alt S P Kama To Responder Alt R i Compile Project F7 hg Start Debugging F5 2 Compile Ctrl F9 P Run F9 153 Create Project Q Search a Logon Wipe Drive Verify Evidence Files 3 Create Boot Disk s gt Mount as Network Share Client Write block IDE channel Write block USB Firewire SCSI drive 3 Options Refrest 3 EnScript drops the physical evidence device information byte for byte into a flat file and sends it to Responder Here is an example of the file viewed in Windows Explorer Mame Size Type Date Modified E G5002 192 168 11 128 RAM memDump 523 760 KB MEMDUMP File 4 10 2008 2 05 PM EnScript Analysis 513 If you specify a device or file other than a physical memory drive an error messa
242. e your own formats Russian Sami Inari Finland Sami Lule Norway Sami Lule Sweden Sami Northern Finland Sami Northem Norway Sami Northern Sweden Sami Skolt Finland Sami Southern Norway Sami Southern Sweden Sanskrit Serbian Cyrillic Serbian Cyrillic Bosnia and Herzegovina Serbian Latin Serbian Latin Bosnia and Herzegovina Slovak Slovenian Spanish Argentina Spanish Bolivia Spanish Chile Spanish Colombia Customize f such as news and Cancel Apply Regional and Language Options 21x idvanced Language for non Unicode programs This system setting enables non Unicode programs to display menus and dialogs in their native language It does not affect Unicode programs but it does apply to all users of this computer Select a language to match the language version of the non Unicode programs you want to use Russian Y Code page conversion tables IBM EBCDIC Cyrilic Russian IBM EBCDIC Turkish 7 20924 IBM EBCDIC Latin 1 Open System 1047 Euro 20932 JIS X 0208 1990 amp 0212 1990 20936 Simplified Chinese GB2312 21025 IBM EBCDIC Cyiilic Serbian Bulgarian xl Default user account settings Apply all settings to the current user account and to the default user profile Lok canca Apr To configure the keyboard for a specific language 1 Cl
243. e Bookmark Notes N 1487 Search Show in report p Formatting I Bold Increase font size points B b Italic Increase text indent 1 4 inch t Ole cx 1 Inthe Bookmarks table in the Table pane right click the desired bookmark and click Add Note The Add Note Bookmark dialog appears 2 Enter the text of the note format the text as desired and then change the Appear in report setting as desired 3 Click OK The note is added to the Bookmarks table on the Bookmarks panel in the Table pane Bookmarking Items 417 Creating a Folder Information Structure Bookmark Use a folder structure bookmark to bookmark a folder or device Before you begin The Entries tree must display in Entries panel of the Tree pane Heme En bockmarks A Soschits of2Records D Omwes Sp Secure Storage Keywords Dee Me frees boc vs o m y Gomer D ove U coy OD k Image d Sirge Fims amp tle Iman X cose Coiote ookmark folder Structure x Delete Al Selected Cukelete FF inchado Device Information Destination Folder f bon Comes u Copyfur rase D odmak Dura cuia Create Mash Set Yew Ple Structure ipaha BFS Bl Seow Coke Cohgre Sort Select tems Sox F GotoParent dip A sewchies Zirecords Joevees Vi secure storage Keywords Hone EL WjReen aswy Tmin i Code lS mmm fem Sew tty Fie b fh fis Break Picture Selected One ot v nee Report bt Tyee 7a Us 4 GE T JEL JEL 0 Ont Im
244. e E Hon Temporary Internet Files DLJ C3 My Documents DL NetHood on PrintHood x E Text amp lHex Bh Doc A transcript E Picture Report EJ Console Details 4 Name index dat File Ext dat Description File Archive Last Accessed 08 22 03 07 55 07 AM File Created 08 22 03 07 55 07 AM Last Written 08 22 03 12 38 43AM Entry Modified 08 22 03 08 00 41 AM File Acquired 07 09 04 11 29 46PM Logical Size 15 384 Initialized Size 16 384 Physical Size 16 384 Starting Extent 3C C51977 File Extents 1 Permissions References 0 Physical Location 212 930 048 Dhweical Sartor A15 870 a P Es Bay EnScript C3 Enterprise 2j Examples Forensic Include EnScript L Big Case Fiske C Documents and Settings Default User Local SettingslHistorylHistory IESlindex dat PS 415879 LS 415816 CL51977 SO 000 FOO LE 1 Note Contents of the Table pane change as different items are selected in Tree pane and when files are clicked in the Table pane Navigating the EnCase Interface 123 Showing Columns Individual or groups of columns can be shown and hidden from view To show or hide columns using the Show Columns place the cursor in the Table pane and right click This menu option appears below To activate or deactivate the Table columns dialog right click the Table pane select Show Columns and select the desired columns Miew Search Hits Bookmark Selected Items C
245. e Export routine C Demo_Report html Microsoft Internet Explorer Oj x File Edit View Favorites Tools Help aN CEE gt ix a A 79 Search in Address ecug Ee Links gt Snagit E S M Name C Description Volume Sector 63 3318335 1 6GB File Acquired 07 05 02 11 10 09PM Logical Size 8 192 Tnitialized Size 8 192 Physical Size 8 192 Starting Extent 0C C414804 File Extents 2 References 0 Physical Location 849 550 848 Physical Sector 1 659 279 Evidence File Hunter XP File Identifier 0 Code Page 0 Full Path Case 1 Hunter XP C Onginal Path Hunter XP C Creating a Report Using Case Processor You can create reports using the Case Processor EnScript program The Case Processor Report Generator contains these features B Entry Attributes such as File Group Notable Files Highlighted Data Folder Info Email information and Records B Ability to report on only items tagged In Report E Ability to report on only selected items in the Records tab B The report captures the investigator s name organization name and creation date B The report is generated as HTML viewable outside of EnCase The data is organized like the Table tab and breaks down each set of information by its evidence file CHAPTER 12 Working with Non English Languages Working with Non English Languages 458 Non English Language Features 459 The Options Dialog Font Tab 460 Configuring
246. e K Disk Code Pipe Bomb Data Jay s Bookmarks Pipe Bomb Data Page 1 1 Bonnie and Clyde Bonnie and Clyde PIPEBOMB TXT Extremely dangerous Nes nk S40 z O 6200 c m ny T T yE 2 Bonnie and Clyde Bonnie and Clyde PIPEBOMB TXT This is Jay s bookmark from Bonnie and Clyde case HOW TO MAKE A POWERFUL PIPE BOMB This pipe bomb is extremely powerful and should b e used with extreme caution This bomb is very nice and EXTREMELY powerful though It packs quite a punch especially nestled on someone s engine block Ingredients 1 AP VC pipe The longer the more powerful I recommend about 5 inches rm Two ends preferably brass These are the things that screw on to the end of the pipe 3 Black powder qun powder 4 A drill 5 Cannon F use 6t inches long 6 Iron bits and pieces denotes optional Instructions Use the drill to make a hole in the middle of the PVC pipe a hole as big as the width o f the fuse Put one end on one end of the pipe tighten it nicely and then pour as much black powder in there as will fit Now securely fasten the other end on the other side and insert the fuse Place light and run Options Bury the bomb about six inches underground and light I once did this and it sent debris 20 feet in every direction Place on the engine block of car to destroy it Try electric detonation with an electric match Put iron bits in the black powder to make it lethal Remember If t
247. e Windows Disk Manager and select Backup from the Partition option This creates a backup disk of the disk configuration information placing the backup on a floppy disk You can then copy the file into your EnCase application using the Single Files option or acquire the floppy disk and add it to the case The case must have the disk configuration set drives added to it as well This situation only works if working with a restored clone of a subject computer It is also possible a registry backup disk is at the location Right click the evidence file that contains the key and select Scan Disk Configuration At this point the application attempts to build the virtual devices using information from the registry key Working with Evidence 227 File Edit view Tools Help iNew open lal Save Gy Print e Add Device Q Search 2 Refresh jac E Home M Bookmarks Q Search Hits 3Records fo Devices P secu4 gt afsFile Extents Permissions I References LY Hash Properties Bon Entries LOJ NT4 4 Disk Key di NT4 4 SoftRaid di sf Export DoL183 NT4 4 SoftRaid d2 LODS NT4 4 SoftRaid d3 XK cose p Copy UnErase Copy Folders rr Bookmark Data Ctrl B Bookmark Folder Structure Activate Single Files Create Hash Set Recover Folders Create Logical Evidence File BR Acquire Restore Hash Scan Disk Configuration Dynamic Disk Dynamic Disk is a disk configurat
248. e appropriate information Remote Acquisition Monitor 238 EnCase Forensic Version 6 11 User s Guide 2 Click OK 3 The monitor connects to the machine and displays the acquisition s progress r List Acquisitions Setting Up the Storage Machine This is basic Windows share setup 1 In the Acquisition Properties dialog select the Sharing tab Acquisition Properties ixl Working with Evidence 239 2 Click the Share this folder radio button and enter a Share name 3 Click Permissions 4 The Permissions for Acquisition dialog displays These settings vary depending on your environment Permissions for Acquisition 2 xj Share Pemissions Group or user names Authenticated Users ok ces sw 5 Setup the permissions you want then click OK 6 The shared folder looks like this Ge Acquisition gx Ele gdt View Favorites Tools Help ay Qa O JO search Folders E Address je C Documents and Settings Joshua Desktop Acquisition gt B Go Name Size T Date Modified File and Folder Tasks a SEVEN OF NINE 10 0 36 39 0 E01 655 350KB EnCase Image File 12 26 2007 3 04PM E m E SEVEN OF NINE 10 0 36 39 0 02 655 336KB E02File 12 26 2007 3 05 PM e va eee SEVEN OF NINE 10 0 36 39 0 E03 655 338KB E03Fie 12 26 2007 3 07 PM 9 uen this folder to the E SEVEN OF NINE 10 0 36 39 0 04 655 360KB E04File 12 26 2007 3 07
249. e entry for that partition at the sector at which it was created on the evidence file image of the hard drive To delete a partition 1 Onthe Disk tab of the Table pane navigate to the volume boot record entry as indicated by a pink block 2 Right click and select Delete Partition 3 Click Yes to confirm the removal of the partition The row in the Table view now contains an entry for Unused Disk Space instead of the now deleted partition 254 EnCase Forensic Version 6 11 User s Guide Restoring Evidence EnCase applications allow an investigator to restore evidence files to prepared media Restoring evidence files to media theoretically permits the investigator to boot the restored media and view the subject s computing environment without altering the original evidence Restoring media however can be challenging Read this chapter carefully before attempting a restore DO NOT boot up the Subject s drive Do not boot up your forensic hard drive with the Subject drive attached There is no need to touch the original media at all Remember it is still evidence Physical vs Logical Restoration EnCase allows the investigator to restore either a logical volume or a physical drive A logical volume is a volume that does not contain a Master Boot Record MBR or the Unused Disk Space A physical volume contains the Master Boot Record and Unused Disk Space Unused Disk Space however is typically not accessible to the user Most often
250. e environment Although similar in many ways to C and Java not all their functions are available in the EnScript language Classes and their included functions and variables are found in the EnScript Types tab in the Tree pane Note The EnScript language uses the same operators and general syntax as C though classes and functions are different Our message board at https messageboards guidancesoftware com forumdisplay php f 11 https messageboards guidancesoftware com forumdisplay php f 11 provides additional information about the EnScript language Included Enscript Components EnCase software comes bundled with a number of EnScript programs The EnCase installer puts these programs in the default EnCase folder Its address is typically C Program Files EnCase EnScript This folder in turn contains four subfolders visible by clicking EnScript in the Filters pane They are m Examples B Forensic B Include B Main Enterprise users have an additional Enterprise folder Each folder contains the include directory and libraries 338 EnCase Forensic Version 6 11 User s Guide EnScript Types EnScript types reference resources in EnScript language classes Perusing these provides information about EnCase classes and functions To view EnScript Types click View EnScript Types EE rabie Report t Code hane ZA Comment us 4 1 Acquisiti
251. e files you checked Keyword Search Options contains controls used to define a keyword search while the content of the device is acquired Search entries and records for keywords executes a keyword search when checked When unchecked other checked functions are performed but the keyword search is not This allows you to run a signature analysis or a hash analysis without running a keyword search This option also enables B Selected keywords only B Search entry slack Use initialized size B Undelete entries before searching B Search only slack area of entries in Hash Library Selected keywords only restricts the number of keywords used during the keyword search to the number of keywords specified shown in Number of Keywords Search entry slack includes file slack in the keyword search Use initialized size uses the initialized size of the device during the keyword search Undelete entries before searching undeletes deleted files before they are searched for keywords Search only slack area of files in Hash Library determines whether the slack areas of the files included in the hash library are searched Hash Options contains controls used to compute hash values Compute hash value determines whether a hash value is computed Recompute hash value determines whether a hash value is recomputed When you recompute the hash values they are recomputed even if hash values are already present Email Search Options contains controls
252. e formatting controls for all characters that comprise the content of the note Bold makes all content of the note appear in bold Italic makes all content of the note appear in italics Increase font size sets the font size of all the content of the note Increase text indent sets the text indent of all of the text blocks in the note 412 EnCase Forensic Version 6 11 User s Guide Bookmark Folder Information Structure Dialog Use the Bookmark Folder Structure dialog to determine whether and how much device information to include in the folder structure bookmark you are creating Bookmark Folder Structure xi J Include Device Information Destination Folder H Bookmarks od Columns 3 Cancel B Include Device Information includes folder structure information Columns specifies the number of columns of folder structure information 8 Destination Folder displays the Bookmarks tree so you can navigate to the destination folder Bookmarking Items 413 Bookmark Data Dialog for Files Use the Bookmark Data dialog for files when creating notable files and file group bookmarks The dialog lets you B add a short comment to the bookmark E create a folder B add a folder comment Bookmark Data Iv Comment Ej Folder Mame Folder Comment 414 EnCase Forensic Version 6 11 User s Guide Bookmark Selected Items appears when multiple files are selected on the Table pane When checked selected files are bo
253. e name and password when in online mode Enter Credentials x SafeBoot Security System Username Password Server Machine Name Transfer Database Algorithm AES256 FIPS z AES256 DES xl x m 388 EnCase Forensic Version 6 11 User s Guide The SafeBoot encrypted drive will be parsed The offline dialog is similar The Online check box is blank and only the Machine Name Transfer Database field and Algorithm are available Enter Credentials xi SafeBoot Security System Online Username Password Server Machine Name GUIDSBCLIENT Transfer Database Y EFS SAFEBOOT GUIDSBCLIENT SC Algorithm 7 AES256 FIPS z m DES Z x e 3 Save the case once a successful decryption is complete The credentials entered in the dialog are stored in Secure Storage eliminating the need to enter them again Analyzing and Searching Files 389 This illustration shows results of a successful decryption The Tree pane shows a SafeBoot folder the Table pane contains a list of decrypted files while the Text pane shows contents of a decrypted file Pie tdt View Tods Keb Ie CZ Open ll Save ca Print we Add Device Q search 3 Logon T Logoff 3 sese C Acqure DlReport i Gatery Toere Wowk code pen P EEE 2s s mm O 3 System Volume Information Reparse c DE biere OOD Fetes P PronecotiTests Sodi Corpie OO Should rave roc D Should hot Coole
254. e of a related collection of entries or objects The very first object in a tree is the root Folder objects contain other folder objects Non folder terminal leaf objects do not appear in the tree They appear in the Table pane when their containing folder object is highlighted Figure 13 A Tree Pane as a window along with its 1 tab bars and its 2 tree where Entries is the root of the tree Hunter XP is a device C is a volume and the rest of the tree consists of folders In the tree 4 Application Data is highlighted Each object in the tree can consist of 5 an Expand Collapse icon as seen when expanded 6 a Set All icon 7 a Checkbox 8 a Category icon and 9 a Name Tree Pane 49 Keywords J SAFEs o x Home T Bookmarks Q Search 4 gt B sFile Extents Jj Permissions 14 gt G6 9 Se gG Extend Ey Extend DE AOL Instant Messenger SDE Documents and Settings HE All Users xig Bob Hunter o 1 Application Data EY Cookies IE Desktop 90 EnCase Forensic Version 6 11 User s Guide A single entry or object in the tree consists of the following Expand Collapse determines if the contained entries or objects are displayed or are hidden Where a folder object appears that does not have an Expand Collapse icon the entries or objects it contains appear in the table in the Table pane instead of the tree Set Include determines whether the entry or object
255. e presents facsimiles of selected data It varies depending on selections B Filter pane shows filter lists Figure 7 Panes as they appear in the main wndow showing 1 Tree pane 2 Table pane 3 View pane 4 Filter pane E3 cases Pa Encryption Keys 1 EnScript gt EnScript Types File Signatures AlFile Types E3lFile Viewers H4 x C Report E Gallery Timeline I Disk 4 Home M Bookmarks Q Search Hits Z3Records fj Devices VP secure Storage Keywords Name Filter 2leFile Extents Permissions References L Hash Properties obo d GSI DOC 102033 10 0 36 21 E Cj ENSCRIPTPATH Reports IE STORAGEPATH gG Svstem32 Lock VT Codepage C3 Reports a Setup exe Setup ini C3 STORAGEPATH C3 System32 Tools O 0x0409 ini dog Entries 409 a Autorun Ext 3P 1070306 1450 Config cac 409 3 EnCase R eDiscov Config C ENSCRIPTPATH instmsia exe instmsiw exe e D ISScriptt 1 Msi J Tools Release Notes doc I Audio Track 2 l0095from the choices below REBOOTMESSAGE The installer must restart your system to complete confi lKOol9S0quring the Windows Installer service Click Yes to restart now or No if you plan to restart la lKo285ter ONUPGRADE This setup will perform an upgrade of s Do you want to continue LATERVERS I
256. e sent to a log record Acquiring a device is one process that optionally sends its outputs to a log record which results in a log record bookmark 406 EnCase Forensic Version 6 11 User s Guide Datamarks EnScript programs or EnScript modules that execute the Add Datamark method create a datamark When a datamark is created in a bookmark folder that datamark can be used as a bookmark Each datamark has a tab associated with it The tab displays when you select the datamark in the Bookmarks table on the Bookmarks tab of the Tree pane lass MainClass void Main CaseClass c RegValueClass rvi rv SetValue l RegValueClass DWORD BookmarkFolderClass folderic BookmarkRoot newnmarks if folder folder A ddDatamarki rv In Datamark B Tabe Report Bookmark Features Features that you use while working with bookmarks include E Bookmark Data dialog for highlighted data bookmarks E Add Note Bookmark dialog B Edit Folder Information Structure Bookmarks dialog m Bookmark Data dialog for files Bookmarking Items 407 Bookmark Data Dialog for Highlighted Data Bookmarks The Bookmark Data dialog is used when manually creating a bookmark The dialog provides the means to add comments to the bookmark determine the data type of the bookmark and to select a destination folder where the bookmark is to be stored Bookmark Data E x Comment iz Cancel Data Type Destination Folder gl
257. e software give an investigator the ability to search E Email addresses m Web addresses m IP addresses B Credit card numbers B Phone numbers E Dates with a four digit year 344 EnCase Forensic Version 6 11 User s Guide Creating Global Keywords Global keyword lists should be analyzed and targeted then assigned to discrete folders These folders are accessible by any case 1 Click Keywords from the Tree pane This menu appears e Mew Insert T Bookmark Data Ctrl B af Export Import Add Keyword List 43 Copy Tree Ctrl C a New Folder Expand Contract Space Expand All Contract All Set Included Folders Num Include Sub Folders Shift Num Include Single Folder Ctrl Num 2 Right click the Keywords icon in the Tree pane and click New Folder The Tree pane of the keywords tab changes showing an additional folder SDL Keywords Log Folderi 3 Rename the folder as desired Adding Keywords Add keywords directly to a new folder an existing folder or the root folder Open the Tree pane from the Keywords tab 1 Right click a keyword entry in the Tree pane This menu appears if the main Keywords icon is selected If a sub folder is selected the menu is slightly different in appearance but functions the same Analyzing and Searching Files 345 o gt Keywerd Lr Bookmark Data Ctrl B a Export Import Add Keyword List A3 Copy Tree Ct
258. e tabs displayed in the View pane Clicking one of these commands displays the corresponding tab in the View pane m x Cr D IT I oO qm X ranscript Tt Picture Report Console Details Q l YD AS utput ock odepage 0 26233 EDI Text displays the ASCII text tab in the View pane Hex displays the Hexadecimal value tab in the View pane Doc displays a Windows document representation if possible in the View pane Transcript displays the Transcript tab in the View pane Picture displays the Picture tab in the View pane Report displays the Report tab in the View pane Console displays the Console tab in the View pane Details displays the Details tab in the View pane Output displays the Output tab in the View pane Lock prevents the View tab from changing the tab based on the entry selected in the Table pane Codepage toggles the ability for the view pane to display the file information using the detected Code Page If not selected the default Code Page is used Selection Indicator indicates the number of selected items as well as the number of total possible items Navigating the EnCase Interface 75 The Filter Pane and its Tab Bar and View Menu The Filter Pane menus display a command for each of the tabs that appear on the Filter pane tab bar The Filter Pane menu and the tab bar for the Filter pane display commands corresponding to the tabs appearing in the View pane View Tools He
259. e the character into the Replace first character of FAT deleted files with field 4 Click Next The Options page of the Copy UnErase wizard appears 290 EnCase Forensic Version 6 11 User s Guide Completing the Options Page The Options page is the second page of the Copy UnErase wizard 1 Determine the scope of what is to be copied and unerased and click on the control that captures the appropriate scope 2 Determine the type of mask you want to employ during the copy and unerase operation and click on the control that uses the mask 3 Decide if you want the copy and unerase operation to stop when it encounters an error or continue execution even if errors are found This is the same as asking if you want the copy and unerase operation to run unattended For unattended execution select Show Errors otherwise clear Show Errors 4 Click Next The Destination page of the Copy UnErase wizard appears Completing the Destination Page The Destination page is the last page of the Copy UnErase wizard 1 If desired provide a path to and filename where the results of the Copy Unerase operation will be saved 2 If desired change the Split files above value 3 If Use Initialized Size is enabled and you want to use it select Use Initialized Size 4 Click Finish The copy and unerase operation begins As it runs the thread status line provides an indication of progress When the thread completes a results dialog is display
260. e to be packaged Output Path contains the to and filename of the package or package to be created Use License determines whether other license related controls appear on the dialog Use this setting if you want to license the package License Name contains the filename of the license without its file extension This setting only displays when Use License is selected Secret Key is a key used in conjunction with the license file to secure the code within the package This text is not exposed to end users and should not be given to end users Properties Panel The Properties panel of the New Package dialog captures attributes related to the product being packaged This panel is used to create build and edit the package Package Properties Product Name Product Name Major Version Minor Version Sub Version 7 7 ES 7 Description This finds all Forms of digital media Company Guidance Software Inc Business Phone 626 229 9191 Web Page www guidancesoftware com 508 EnCase Forensic Version 6 11 User s Guide Product Name is the name of the EnScript source code Major Version is the major version number of the EnScript source code Minor Version is the minor version number of the EnScript source code Sub Version contains identifiers for bug fix versions patches or build numbers of the EnScript source code Description is self explanatory Company is the name of the company associated with the
261. e viewed any time by selecting the Bookmarks tab You can mark any existing data or folder Note When a file is initially written to a multi session CD it is assigned an address offset When the file is changed it written again to the CD as a new file but with the same offset Any revisions to this initial file are all assigned the same offset The file and all its revisions can be viewed EnCase provides the following bookmark types m Highlighted data O Annotates selected data O Also referred to as sweeping bookmarks E Notes O Allows the user to write additional comments into the report O Provides some text formatting capabilities O Not bookmarks of evidence E Folder information and structure O Annotates the tree structure of a folder or the device information of specific media O No comment feature O Options include showing device information such as drive geometry and the number of columns to use for the tree structure E Notable File O Annotates individual files O Fully customizable E File group O Annotates groups of selected files O Noability to comment B Snapshot O Contains the results of a System Snapshot of dynamic data for Incident Response and Security Auditing Bookmarking Items 403 B Log record O Contains results from log parsing EnScript programs E Datamark O Contains the results of Windows registry parsing EnScript programs E Case time setting O Shows whether Daylight Savings Time is being used on the ev
262. eadwindate True False False RE readwindate 05 09 2003 08 56 05 09 2003 08 56 Michele Roter mic CDG try this Cj 8 Q readwindate True False False readwindate 05 09 2003 08 47 05 09 2003 08 47 Shawn McCreight I OC1 4 bugs that were looked at tonight O38 M 9 Q RE Bug Report True False False RE Bug Report 05 09 2003 07 41 05 09 2003 07 41 Sharren Redmond LOL RE Do you remember entering in an issue that had to c 10 RE another bug True False False RE another bug 05 09 2003 07 24 05 09 2003 07 24 Jeffrey Misner lt jef L O 3 d list for shawn another bug True False False RE another bug 05 09 2003 06 07 05 09 2003 06 07 Jeffrey Misner lt jef LOCI Description of bugs C 12 Q RE Guidance Softw True False False RE Guidance Softw 05 09 2003 06 06 05 09 2003 06 06 Dave Morris dave on reports using priority 13 4j RE Searching for M True False False 05 08 2003 11 ono Message O 14 Q RE Searching for M True False False RE Searching For M 05 08 2003 09 05 08 2003 09 Jason Cantrell jas DC qa stuph LJ 15 Q RE why does Enca True False False RE why does Enca 05 07 2003 08 05 07 2003 08 24 Sharren Redmond HOT di for release notes info 16 2 RE Issues 983 True False False RE Issues 983 05 02 2003 09 05 02 2003 09 Bill Siebert bill sieb DG reports e EnScript bug True False False RE EnScriptbug
263. earch Options Search for email Recovered deleted Outlook PST J Outlook Express DB Exchange EDB Lotus WSF F zol MBOX r Additional Options IV Verify File signatures Identify codepages Search for internet history lt Back Cancel Working with Evidence 211 To define the analysis processing as part of the acquisition 1 Do the following as required O To search all the content of devices associated with the case not just the content of the device being acquired click Search entire case O To perform a keyword search click the appropriate controls in the Keyword Search Options To perform an email search click the appropriate controls in Email Search Options O To compute or recompute hash values click the appropriate controls in Hash Options To verify file signatures in Additional Options click Verify File signatures O To identify codepages in Additional Options click Identify codepages To search for internet history files in Additional Options click Search for internet history 2 Click Next The Options page of the Acquisition wizard appears 212 EnCase Forensic Version 6 11 User s Guide Completing the Options Page of the Acquisition Wizard This page of the Acquisition Wizard specifies how the EnCase evidence file is built during the acquisition and the disposition of that file after the Acquisition is complete Name Ev
264. eck this box to produce comments on what is happening behind the scenes Database Name Since a database management system can house many databases you must specify the one you want to use Working with Evidence 265 4 Click Next If the database connection is successful a confirmation message displays Test Database Lx Specifying Database Content Use the Process Options dialog to specify what information to insert into the database Process Options 266 EnCase Forensic Version 6 11 User s Guide 1 Select the appropriate Snapshot Write Options button Save All Processes takes a snapshot of each node and inserts these items into the database O Process O Net users O Net interfaces O Open ports Save Not Approved Or Hidden Processes inserts not approved or hidden processes into the database 2 Click Finish to begin the scanning process Generating Reports on the Database Once you gather data into the database you can generate reports 1 Run Snapshot DB Reports EnScript The Snapshot Database Source Options dialog opens Snapshot Database Source Options Data Source Name Enter User Name Not Needed If Using NT Authentication sa Enter Password Not Needed If Using NT Authentication DB Timeout Interval minutes 5 Show Queries in Console x Cm Data Source Name This is the name you gave the ODBC connection when you created it Enter Us
265. ector LS displays the sector number of the logical sector relative to the beginning of the logical disk m Cluster number CL displays the cluster number The status line content relative to the location of the cursor within the file being examined includes E Sector offset SO displays the number of sectors in bytes between the start of the cluster and the current cursor location B File offset FO displays the number of bytes between the start of the file and the current cursor location E Length LE displays the length in bytes of the content currently selected by the cursor 98 EnCase Forensic Version 6 11 User s Guide Figure 18 Status line elements from drive geometry where 1 is the content of a file from start to end of file EOF 2 sectors 3 clusters 4 width of the cursor Notice that the physical sector PS value and the logical sector LS sector value are different but address the same location Panes and their Specific Tabs The panes that comprise the main window organize collections of tabs They include m Tree pane tabs m Table pane tabs B View pane tabs E Filters pane tabs Navigating the EnCase Interface 99 Tree Pane Tabs The Tree pane contains tabs with trees displaying many of the elements or objects used in your EnCase application Each tab contains a tree displaying a collection of elements in a hierarchy For example keywords you define appear in the Keywords t
266. ector to the prepared target drive thereby creating an exact copy of the subject drive The target drive should be larger than the subject hard drive When the restore completes it provides hash values verifying that the lab drive is an exact copy of the subject drive If a separate independent MD5 hash of the lab drive is run be certain to choose to compute the hash over only the exact number of sectors included on the suspect s drive so that the MD5 hash will be accurate Drive 0 cannot be restored to If the prepared target media is Drive 0 another drive must be added to the system as a master to store the restored image Restored sectors can also be verified to confirm that there is indeed a sector by sector copy of the original subject media Sometimes the Convert Drive Geometry setting is available This is entirely dependent on the drive geometry of the original drive in comparison to the restore drive Every drive is defined by specific Cylinders Heads Sectors CHS drive geometry information If the Heads and Sectors of the original drive imaged are identical to the target restore drive then the drives are of the same type and the Convert Drive Geometry setting is not available If the source and target drives are of different types for example the heads sectors settings are different then the Convert Drive Geometry is available C E wpe revanea epos n tact Tat ed dueroy al rfomaton en F cet wpod cor Deve D Label Hie
267. ed When the EnScript tab appears in the Filter pane the EnScript programs are organized into a tree extending to the programs themselves When the EnScript tab appears in the Tree pane only folders populate the tree and the programs themselves appear in a table in the Table pane The table representation contains information beyond what is visible in the tree representation in the Filter pane EnScript Types displays the EnScript Types tab in the tree pane It does not display by default File Signatures displays the File Signatures tab in the tree pane It does not display by default File Types displays the File Types tab in the Tree pane It does not display by default File Viewers displays the File Viewers tab in the tree pane It does not display by default Hash Sets displays the Hash Set tabs in the tree pane which includes the Hash Sets Home and Hash Sets Hash Items tabs They do not display by default Keywords displays the Keywords tab in the tree pane It does not display by default Machine Profiles displays the Machine Profiles tabs in the tree pane which includes the Machine Profiles Home and Machine Profiles Allowed tabs They do not display by default Packages displays the Packages tab in the tree pane It does not display by default Projects displays the Projects tab in the tree pane It does not display by default Navigating the EnCase Interface 69 SAFEs displays the SAFEs tabs in the Tree pane which i
268. ed The results are saved in the appropriate folder in the file system and if requested the results files are burned onto the disc in the default or specified directory Note The thread status line provides an indication of progress Copying and Unerasing Bookmarks You can Copy Unerase bookmarked files as well The process is the same whether copying single or multiple bookmarks If the file was deleted and resides in unallocated space the Copy UnErase wizard tries to copy the entire unallocated space since the data pertaining to the file resides there 1 On the Bookmark Tree tab select the desired bookmark folder 2 In the Table pane select the desired bookmarks Viewing File Content 291 Right click in the Table pane and select Tag Selected Files The files associated with the deleted bookmarks are selected and consolidated on the Entries Table pane Move to the Entries pane and in the Table pane right click one of the selected files Click Copy Unerase The File Selection Page of the Copy UnErase wizard appears Continue the copy and unerase process at step 4 of Copying and Unerasing Files The files associated with the selected bookmarks are copied and unerased Copying Folders E M Bookmarks Q SearchHits dRecords fZ Devices P Secure Storage Keywords E Table Report E Gallery Timeline ig Code
269. ed it is important to ensure the installed program is up to date See the Downloads topic in the EnCase Enterprise Administration Guide for more information on obtaining software updates Configuring Your EnCase Application You can configure various aspects of the EnCase application according to your needs or preferences These settings are used each time you start EnCase You are not required to open a case When a case is open a Cases Options tab displays in the Options dialog Installing EnCase Forensic 31 To configure EnCase 1 Click Tools Options The Options dialog appears 2 Click the desired tab and change the settings as needed then click OK Note Some changes made to the options settings take effect when you restart EnCase Some take effect immediately The Options dialog contains the following tabs Case Options Global Colors Fonts EnScript Programs 00 0 00 iu Storage Paths The Case Options tab displays only when a case is open 32 EnCase Forensic Version 6 11 User s Guide Case Options Tab The Case Options tab contains settings that apply to the open case options NN 2 4 Case Options Mame onnie and Clyde Examiner Name jpr Default Export Folder C Program Files EnCase6 Export BI Temporary Folder C Program Files EnCase6 Temp m Index Folder C Program Files EnCase6 Index l Name contains the name of the case associated with the case options set on this tab
270. ed in the folder defined by the root path The SAFE tree is based on SATE files contained in the folder defined by the root path Both types of files are found in the C Program Files l EnCase6 Keys folder Moving these key files while the trees are displayed requires a refresh to update the trees Browse For Folder Change Root Path Cache D Certs Config E C EnScript O EnScripts O Export Hash Sets Help Index O Keys License x Folder Keys Make New Folder Cancel Al xl Path displays a tree to navigate to the folder containing the keys Case Management 163 Edit SAFE Dialog The Edit SAFE dialog contains settings that define connections to the SAFE and enable remote login Edit Doc SAFE Client return address pK emen 164 EnCase Forensic Version 6 11 User s Guide Machine Name contains the IP address to the machine or subnet that constitutes the SAFE or SAFEs accessed using the named SAFE Remote SAFE determines if communications with the node will be routed through the SAFE so the SAFE stands between the client and the node Enabling this setting allows you to provide a value for Inbound Port and to use its value communicating with the remote SAFE Inbound Port determines which port is used when communicating with the remote SAFE at the IP address specified in Machine Name Attempt Direct Connection contains settin
271. ed this column is unpopulated Full Path displays the file location within the evidence file The evidence file name is included in the path Navigating the EnCase Interface 105 Short Name is the name Windows assigns using the DOS 8 3 naming convention Original Path displays information derived from the INFO2 file for deleted files that are in the Recycle Bin The path is where the deleted file was originally stored O The column is blank for undeleted files O The original location is shown for files in the Recycle Bin O Shows what file has overwritten the original file for deleted and overwritten files Symbolic Link can provide links to directories or files on remote devices Is Duplicate displays TRUE if the displayed file is a duplicate of another Is Internal references hidden files the OS uses internally but are hidden from the user Is Overwritten displays TRUE if the original file is deleted and its space is occupied by another file Filters Pane Menu Selecting a Filters pane menu tab displays filters features View Tools Help Ej App Descriptors db Archive Files m Cases L Encryption Keys 4 EnScript ES EnScript Types Z File Signatures ial File Types amp l File Viewers 3j Hash Sets Keywords Machine Profiles Packages Projects J SAFEs 7 lt Text Styles oa gE Cases Sub Tabs gt Table Pane gt View Pane gt Filter Pane EnScript Filters BI show Name 2 Conditions 4 Pr
272. efore you can create a file group bookmark one of the following is required The Entries tree must display in the Entries panel of the Tree pane B The Records tree must display in the Records panel of the Tree pane TROU Name Filter Report Ext File File File easy Desd EHOW e Entries o iT GORNER Tyee ae Folder gt e sos ag amp 2 E unallocated c pir File Unalloca Copy lUnErase Copy Folders x Bookmark Folder Structure I Bookmark Selected Items Comment Activate Single Files pm Create Hash Set Create new bookmark folder Create Logical Evidence File EEA Destination Folder I Bookmarks Mount as Network Share Show Columns der EN Column Sort Select Item Space Go to Parent BkSp z e eee Bookmark Type 1 QQ Search Summary Q Case Time Settings Show Entry File Preview Comment SERT Offset tenet f File Group Al af af af id Fe rae To create group file bookmarks 1 For the files to be bookmarked highlight the device or parent folder containing the files 2 Ineither the Entries table on the Table pane or the Records table on the Table pane select the files or to be bookmarked 3 Click Bookmark Data The Bookmark Data dialog for files appears 4 Accept the defaults or modify the values displayed on the Bookmark Data dialog 5 Click OK The file group bookmarks are placed
273. eing previewed to see if it is live or write blocked 2 Perform any evidence analysis required to determine if a device should be acquired 3 Once you have determined the device should be acquired acquire it Working with Evidence 185 Add Device Wizard Use the Add Device wizard to add a device for later acquisition The Add Device wizard includes E Sources page B Sessions Sources page optional E Choose Devices page B Preview Devices page You must open a case before the Add Device wizard can be opened 186 EnCase Forensic Version 6 11 User s Guide Sources Page of the Add Device Wizard You can select one or more types of sources on the Sources page of the Add Device Wizard Local drives a Palm Pilot or a network crossover connection can be used as a source device for subsequent previews or acquisitions In addition to local devices you can add folders intended to contain evidence files Sessions opens the Sessions Sources page of the Add Device Wizard when Next is clicked Sources Tree Pane organizes the device sources from which content is later previewed or acquired Sources Root Object contains the child objects The right click menu displays commands for this object You can B Expand or collapse objects in the Sources tree B Select various objects in the Sources tree Local Object refers to local devices physically connected to the machine which could include xi Sessions EFOC
274. election is a default child of the Sources root object It contains any evidence files added to the Sources tree during the prior session or invocation of the Add Device wizard The next time the Add Device wizard is opened the evidence files listed in the Current Selection folder are moved to this folder and any evidence files listed before the move are removed from the folder Once added the evidence files continue to be used as sources until they are individually removed regardless of whether they show in the selection folders The right click menu on this object lets you m Delete this object E Rename this object B Adda new folder as a child E Expand or collapse the subordinate tree Any child objects of this object on the tree appear as entries on the Table pane You can organize the children of this object hierarchically by dragging and dropping folders into each other Table Pane displays the children of the currently selected object in the Sources tree as entries in the table Right click menu commands for this object let you B Copy an entry for use elsewhere the copied entry cannot be pasted into the table E Delete an entry B Rename or edit an entry B Navigate to the parent object of the object containing the entry 190 EnCase Forensic Version 6 11 User s Guide Choose Devices Page of the Add Device Wizard Once local devices are defined a subset of those are selected here so they can be added to a case Choose Device
275. eme care Note Execute the Wipe Drive utility to remove all traces of any evidence files from a storage drive To wipe a drive 1 Click the Wipe Drive option on the Tools menu The drive selector displays Using EnCase Tools 519 Wipe Drive Iz SESSIONS ee tfc tocabves 2 Make initial selections and click Next The Choose Devices screen displays Choose Devices Windows xr e ea es a i E 3 Choose the device targeted for erasure and click Next 520 EnCase Forensic Version 6 11 User s Guide An options dialog displays The Verify wiped sectors box is checked by default and the Wipe character is hex 00 If the box is checked the Wipe Drive program reads each sector and verifies that the wipe character is written throughout You can enter any hex value in the Wipe character field IV Verify wiped sectors Wipe character hex 00 lt Back Cancel 4 Click Finish The Drives dialog opens x This will destroy all information on Device H Label NO NAME Continue Type the word Yes Yes Cancel 5 Enter Yes in the Continue box and click OK Using EnCase Tools 521 The drive is completely erased and overwritten with the specified hex string Wipe Drive displays information about the disk and the operation Wipe Drive X Status Completed Tl Console Start 10 12 06 11 51 32AM Stop 10 12 06 11 52 10AM T Note Time 0 00 38
276. en Esos PEM DAMM C Sedul 7 Som Debt gt nite uc X IA jme dr der pire Coi ye em Dtesmru do et Comet m teens 3 M traten att Avada id 508 arp oie oae p QM ien Den eled On Cnet gt Caiete am T xe cm m io LL fum See dy of ofer Cox fe menan To create a snapshot bookmark 1 On the EnScript tree expand the Forensic folder and double click Scan Local Machine The Options page of the EnScript wizard appears 2 Enter a Bookmark Folder Name select the desired modules and click Finish A dialog specific to the selected EnScript program appears 3 Complete the EnScript program specific dialog and click OK 422 EnCase Forensic Version 6 11 User s Guide The Status Line shows the progress of the executing EnScript program When the program finishes the result appear in the Bookmarks display in the Tree pane and the Table pane 4 Seethe resulting bookmarks by expanding the bookmark folder specified in step 2 Creating a Datamark as a Bookmark EnScript programs can create datamarks and place them in any folder When datamarks are placed in the Bookmark folder they can be used to create a datamark and its associated tab panel containing data from the execution of the EnScript program To create a datamark as a bookmark do one of the following B In the Code panel on the Table pane right click on the code and click Run B n the EnScript panel of the Filters pane expand the tree a
277. enc nefiLOTUS Volume Root Folder Top of Information Store Sinbox Fw B PS 7343 LS 7343 CL 7343 SO 060 FOO LE 1 326 EnCase Forensic Version 6 11 User s Guide If the corresponding ID file cannot be parsed successfully the Secure Storage is not populated with the data needed to parse the locally encrypted NSF thus the Lotus volume is empty ase Enterprise Training F e Edt View Tools Help New J Open rd Save c Prnt se Add Device Search SJ Logon Sil Refresh XX Cose LS acqure E Home 20 Fie Extents Permissions iiReferences LY Hash Properts gt BoE Entries SoA Snge Fies BODES cteodoro Strong enc nsf og e LOTUS Volume ist quee Ebo DB troecrct Brice iReport C console MB Detsis Output D tox coders Oon Qus T res US co Empty File T GED Temeoata f amp Complete Diagnostic Ay CredantEncrypton Ag Decoding Test jig OskEncypton 2m Lay Email CHAPTER 9 Analyzing and Searching Files Signature Analysis 327 EnScript Programming Language 337 Hash Analysis 338 File Hashing 339 Hash Sets 340 Keyword Searches 343 Encode Preview 363 Indexing 365 Generating an Index 367 Searching for Email 369 App Descriptors 378 Encryption Support 381 EFS Files and Logical Evidence LO1 Files 399 328 EnCase Forensic Version 6 11 User s Guide Signature Analysis There are thousands of file types some of them are standardized The Internation
278. enter the address in the Machine field of the Exclude Machine group and click Exclude 7 Click the Management tab and select Install servlet process Note You can also use this program to check for or stop servlet and SAFE processes For information on how to use these features see the EnCase Enterprise Administrator Manual 486 EnCase Forensic Version 6 11 User s Guide 8 Click Install Settings Ue X Install Options Install if servlet process not Found C Always Install Windows Servlet Path C Setup exe m Linux Servlet Path Command Line parameters verify installation Retry Failed deploys every 24 ai hours Cancel 9 Complete the dialog as appropriate using the following functions O Install if servlet process not found only installs a servlet if one is not found Always Install installs a servlet on all machines Windows Servlet Path Enter or Browse to the servlet location on your machine Linux Servlet Path Enter or browse the Linux servlet on your machine O OF 0 cu Command Line parameters Enter any command line parameters you want to use in conjunction with the servlet LI Verify installation Verifies that the install completes successfully Retry failed deploys Controls how often the program tries to redeploy a servlet on a machine that failed 10 Click OK EnScript Analysis 487 11 Click on the Settings tab to set the output options Machine Survey a
279. ently selected folder object in the Sources tree The right click menu commands for this object let you E Delete the folder where you opened the right click menu E Delete folders selected in the tree B Copy the entry where you opened the right click menu m Select the object on the tree that corresponds to the entry where you opened the right click menu in the Table pane E Navigate to the parent of the object containing the entry where you opened the right click menu in the Table pane 188 EnCase Forensic Version 6 11 User s Guide Sessions Sources Page of the Add Device Wizard When Sessions is enabled you can add evidence files to the Sources tree using the Add Text List dialog or the Add Evidence Files browser xl IV Sessions Add Text List Add Evidence Files be Sources Name Comment L Last Selection 1 5 Local Drives LO Current Selection Back Cancel Sessions opens the Sessions Sources page of the Add Device Wizard when you click Next Add Text List opens the Add Text List dialog which contains a list of paths to and filenames of evidence files to be added in batch to the Sources tree Add Evidence Files opens the Add Evidence Files file browser where you can enter the path to and the filename of an evidence file so the evidence file is added individually to the Sources tree The following types of files can be added using this file browser E Evidence File E01 E SafeBack File 001 E V
280. ents eliminating the need for security keys on client machines however you must still install the security key drivers for your SAFE machine Before you begin ensure your EnCase application is closed To install your security keys 1 Insert the installation CD ROM If autorun is enabled the splash screen appears Click the security key drivers link Click Next when HASP installation wizard displays Click Finish when the installation is complete 2 3 4 5 Click Next when the summary displays 6 7 Insert the security key and Windows will find the security key 8 Open the EnCase application Note If the security key is inserted before clicking Finish the drivers will not be installed properly Remedy this condition by reinstalling the driver with the security key removed Troubleshooting Security Keys Installation is usually trouble free but if there are problems with installation go to the troubleshooting page http www guidancesoftware com support articles articles asp http www guidancesoftware com support articles articles asp on our Web site Navigate to the message board to research your problem 30 EnCase Forensic Version 6 11 User s Guide Obtaining Updates Version 6 is the latest and most current version of the software suite Updates containing new and upgraded features however are published on a regular basis To protect your chain of custody and to ensure you have the latest updates install
281. enu The Export Configuration screen displays 8 Click Browse to specify the SDB file s storage location 9 We recommend using the computer name as the SDB file name 10 On the Export Configuration screen select Include all users in the configuration then click OK An Export Configuration dialog displays 11 Repeat steps 7 10 for all other computers you want to decrypt Analyzing and Searching Files 387 Authentication Modify the SDMCFG INI File Before performing an online authentication modify the file from the SafeBoot server 1 Open SDMCFG INI file with a text editor and if the line exists change the value of AuthType 1 to AuthType 0 If AuthType is set to 1 communication between the SafeBoot server and EnCase is encrypted and the online authentication process is hindered 2 If the line does not exist in the file enter AuthType 0 to the end of the file SafeBoot Encryption Support Disk Encryption EnCase provides a way for you to view SafeBoot encrypted hard drives during an investigation This feature is only available to a user with an EDS cert enabled Note If no EDS cert is found the physical device will mount but the encrypted file structure cannot be parsed Use EnCase to perform SafeBoot Encryption as follows 1 Use the Add Device Wizard to add the device or volume 2 When prompted select the appropriate encryption algorithm from the list then enter a user name server name machin
282. ep Enterprise 483 System Menu 61 T Tab Right Click Menu 88 Table Pane 91 525 Table Pane Menu 72 Table Pane Tabs 99 Table Tab Columns 102 123 Technical Support 529 Temp Folder 525 Testing a Non English Keyword 467 550 Testing an EDB File 301 Text 401 Text Styles 455 The Console Tab 114 The Details Tab 114 The Doc Tab 111 The EnCase Installer 21 The Filter Pane and its Tab Bar and View Menu 75 The Hex Tab 110 The Main Window 60 The Options Dialog 154 514 The Options Dialog Font Tab 454 The Output Tab 115 The Outputs Page of the Create Logical Evidence File 241 The Picture Tab 112 The Report Tab 113 The Table Pane and its Tab Bar and View Menu 7 The Text Tab 109 The Transcript Tab 112 The Tree Pane and its Tab and Sub Tab Menus 70 The View Pane and its Tab Bar and View Menu 73 Time Zone Example 173 Time Zone Settings 168 Timeline Tab 147 Toolbar 80 508 Tools Menu 77 509 Training 534 Tree Pane 89 525 Tree Pane Tabs 99 Troubleshooting Security Keys 29 Turning Filters Off 136 Turning On Encode Preview 358 Types of Acquisitions 193 Types of Entries 178 c Jnicode 525 Jnicode Fonts 455 ninstalling the Examiner 26 pdating the Database 258 sers Right Click Menu 158 sing a Case 167 sing a Folder to Organize a Bookmarks Report 415 424 425 sing a Package
283. er Name Not Needed If Using NT Authentication Specify a user name If you set up the ODBC connection to use NT Authentication it remembers your user name so you do not need to enter it manually Enter Password Not Needed If using NT Authentication Like your user name you must specify a password to gain access to the database If you set up the ODBC connection to use NT Authentication it remembers your password so you do not need to enter it manually DB Timeout Interval minutes Specify how long you want to wait before a DB timeout occurs This indicates how long the program waits before assuming the connection is bad the default is 5 minutes Working with Evidence 267 Show Queries in Console Check this box to produce comments on what is happening behind the scenes Database Name Since a database management system can house many databases you must specify the one you want to use 2 Click OK The Snapshot DB Reports dialog opens Snapshot DB Reports Time Between Queries Minutes 0 3 Select the check box for the reports you want to generate 4 Click OK to begin generating the report 268 EnCase Forensic Version 6 11 User s Guide Using the Snapshot DB Reports Dialog This dialog lists reports generated from the database snapshot You can add or modify reports as well as export reports to a file or import them from a file Items This list box contains information on reports alrea
284. er applies appear in the Condition column In this case we ran a filter looking for files that had any date before 21 September 2006 You can change the date and time in these files The Table view looks like this after the filter is run t E Table Report L Gallery 2 Timeline f Disk iy Code Name Filter gt MachineKeys MySelectedFiles kal A D user dmp Z 3 Pbk Column numbers are changed but the file selected names and the condition name appear as in the picture above To return to the original display click the MySelectedFiles tab to change the sign to a sign f MyselectedFiles m Display All original files reappear with the filter in the field displayed on only those files which meet the parameters To hide the filter name select the Display tab and change it to a sign Importing Conditions You can import conditions created by others To import a condition filter someone else has written 1 Right click in the Condition pane 2 Select Import 3 Navigate to or enter the path where the filter is located and click OK 144 EnCase Forensic Version 6 11 User s Guide Exporting Conditions Export filters to share them with other users Jv Export Tree For Import Fields E Name E Filter F Only Checked Rows 3 In Report Start JV XML Formatted Output File export xml E Back Cancel To export a filter from
285. eration The Console tab indicates diagnostic information as the index progresses vagjDoc i Transcript SJ Picture Report 7 Details 4 50AM Info Index Script started SOAM Info Index Indexing device Bonnie and Clyde SOAM Info Index Indexed 12 files 115 560 bytes 50AM Info Index All files were indexed successfully 50AM Info Index Script completed in 0 seconds Analyzing and Searching Files 369 Searching for Email The program s search engine can search various types of email artifacts This includes mail from E Outlook pst Outlook 2000 amp 2003 E Outlook Express dbx B Exchange edb 2000 amp 2003 B Lotus Notes nsf 5 6 6 5 amp 7 B AOL MBOX Thunderbird 1 Inthe Search dialog select the desired Email Search Options 2 Click Start Search Selected items only 0 Entries 2 Records Keyword Search Options Email Search Options Search entries and records for keywords Search for email 9 keywords Recovered deleted v Search entry slack v Outlook PST use initialized size C Outlook Express DBX C Undelete entries before searching v Exchange EDB C Search only slack area of entries in Hash Library Lotus NSF AOL Hash Options MBOX C Compute hash value Additional Options iv verify File signatures Identify codepages C Search for internet history Note In addition click
286. es for the folder structure the progress bar indicates which pass is currently running The recovered folder structure is placed under the virtual Recovered Files folder 250 EnCase Forensic Version 6 11 User s Guide Recovering UFS and EXT2 3 Partitions EnCase applications use a different method for recovering deleted files and folders that have no parent in UFS and EXT2 3 partitions When you preview a computer or add an evidence file containing one of these partitions to your case a gray folder called Lost Files is automatically added to the tree in the Entries tab as a child of each partition In the Master File Table MFT in NTFS all files and folders are marked as a folder or file and as belonging to a parent The files within a folder are that folder s children If you first delete the files then delete the folder and then create a new folder the originally deleted files can be lost The new folder s entry in the MFT overwrites the deleted folder s entry The original parent folder and its entry in the MFT are overwritten and gone Its children however were not overwritten and their entries are still in the MFT As with NTFS with UFS and EXT2 3 partitions the application parses the MFT and finds those files that are still listed but have no parent directory All of these files are recovered and placed into the gray Lost Files folder Recovering Folders from a Formatted Drive If the evidence file shows a logical volume but has
287. estigation If not the analysis can be redefined and performed again 84 EnCase Forensic Version 6 11 User s Guide Panes as Separate Windows The individual panes that appear in the main window can be displayed in separate windows In the main window each pane has a drag handle You can drag the pane outside the main window and the pane will appear in a secondary window Once three panes are dragged from the main window the remaining pane does not display a drag handle and remains associated with the main window The panes cannot be dragged back into the main window Refreshing the view displayed in the main window places all the panes back in the main window in their usual location Navigating the EnCase Interface 85 Figure 9 Panes appearing as secondary windows showing the Tree pane Table pane and Filter pane as separate windows The View pane appears in the main window where the Reset view command is selected from the View menu The Reset view command puts the panes appearing in separate windows back into the main window derne NN e PaE Q hes Y ries L0 4g EnScript E cases T Encryption Keys x Enterprise fm i Entries TL Bookme4 b Cases iai A Cases Include Information Assurance Main ZuEnCase Enterprise Training File Edit View Tools Help L new DG App Descriptors Delete Update 2 Archive Files Report a Console a3 Details Ge Output tock E Codepage 1 Cases 35 Encryption Keys 32 En
288. et up the ODBC connection to use NT Authentication it remembers your password so you do not need to enter it manually DB Timeout Interval minutes Specify how long you want to wait before a DB timeout occurs This indicates how long the program waits before assuming the connection is bad the default is 5 minutes Show Queries in Console Check this box to produce comments on what is happening behind the scenes Database Name Since a database management system can house many databases you must specify the one you want to use 262 EnCase Forensic Version 6 11 User s Guide Maintaining the Database 1 Run Initialize Database EnScript The Initialize Database dialog opens Initialize Database Database Source Options Maintenance Options No Maintenance Delete All Records Delete Records Older Than 0 o a Cane 2 Select the Maintenance Options tab to run basic cleaning maintenance on the database itself including deleting database records and fill in the various fields or check the appropriate box No Maintenance Use this option if you want to initialize the database selected by default Delete All Records Once a database is created select this option to delete the entire contents in the database but not the database itself Delete Records Older Than You can automatically schedule cleaning the database by selecting this option With this option selected the followin
289. etails G Output C Lock C Codepage C 0 82027 bd EzRhB b WD GOG DEF HAB Select All Find Od Qu Od Que ZF x Bookmark Data o aA Cancel o zl Cancel Data Type Destination Folder Data Type Destination Folder L ISO Latin FTP a LIJ Bookmarks amp RTL Unicode A LT Bookmarks HE ISO Latin ERTL 40 HE ISO Latin Colors RTL 60 HO Low Bit ASCII E RTL 80 GHEY RTL Unicode LE RTL 100 8j Unicode HE RTL 120 E Text Style EV RTL FTP 3 Unicode Text e HHO Unicode Unicode Text Text Style Unicode Text Unicode Text zl L Non Unicode ll Jb asbl ib yo cats r gabal giso goal D t t X a De Re Rett A a Fiber goal gage ploall Liall Jl isb Jl dash yo ual Jb ll z all tall lo pagal 3 9 yo dsl Sal Ss dab Jl 2429 olio dager Sito gll gb Il 2923 Se eee islab Jo JI gb B6 pa 32a M go Mhl aic T Vu ped EN LT NAM i Abo JE ASS coa dl cili alaiall 033 c all abu Jo J slo JE AS ow dl dab JI 292 alll s de sitiall Jui 3529 dy Jl dass 53 il a 985 09 ipao I culo LY To bookmark non English language text 1 Display the text in the View pane 2 Sweep or select the desired text then right click and click Bookmark Data The Bookmark Data dialog appears 3 Enter a Comment 4 Select the desired text style in Data Type 476 EnCase Forensic Version 6 11 User s Guide The content appears w
290. ete Delete Delete All Selected Ctri Delete a Export EVI Tag Selected Files Ctrl Shift T ET Tag File Ctrl T A View Search Hits Bookmark Selected Items LI Show Excluded Show Deleted Exclude Ctrl E Exclude All Selected Ctrl Shift E SS show Columns Column Sort d Select Item Space 2 Go to Parent BkSp Selecting the latter displays the Exclude All Selected dialog x r Start From C Root Folder 2 items Current Folder 2 items Cancel 2 Select the appropriate option and click OK The selected files are temporarily deleted Note Viewing the report shows the concatenated results Navigating the EnCase Interface 129 Filters Filters are EnScripts that modify what data are displayed Note There are different types of filters available depending on the tab chosen on the Tree pane For example the filters available for search hits are different from those available for entries Several filters exist for filtering out objects of little or no interest to an investigation Filters do not remove these objects from the case they simply hide them from the Table pane The Filter pane allows investigators to run create edit or delete filters conditions and queries The Conditions tab allows the user to build filters by simply specifying parameters Conditions 2 Queries 44 gt F Filters Ley Search File Permissions Windows Ly Search File Permi
291. ete Delete Delete All Selected Ctri Delete Exclude Ctrl E Exclude All Selected Ctrl Shift E a Export Tag File Ctrl T A View Search Hits Bookmark Selected Items SS Show Columns Column gt Sort b Select Item Space 5j Go to Parent 3 Select Exclude The Tree display reappears but the excluded folder is marked with a red X Home TE Entries Q Search Hits 2344 gt rore Som Bookmarks OB Jay s Bookmarks Pipe Bomb Data DLJ c3 Graphics AAI scal local 01 07 08 The associated Table view is also marked as deleted Bookmark Bookmark Bookmark T e Start Sector M 1 C File Report A 2 Sy HTML Carver A 3 df Snapshots amp 4 El Highlighted Data 933 376 1 823 Bookmarking Items 441 Show Excluded Excluded bookmarks are not deleted they are merely hidden from view It is possible to display them again if necessary You can show excluded files from the Tree pane the Table pane from the Show Excluded too on the top toolbar Regardless of the method you select the steps are similar 1 In the Tree pane select and right click a folder This dropdown menu displays ef Edit Enter J Add Note Insert X Delete Delete Delete All Selected Ctrl Delete Adjust Rows E Export E Tag File Ctrl T LJ Encode Preview Summary Bookmark Exclude Ctrl E Exclude All Selected Ctrl Shift E L Show Excluded X Rename F2 i3
292. ets This allows an investigator to enter search and locate words written in Japanese Arabic or Russian for example Keyword hits and the document display in the original language 1 Select the Code Page tab on the New Keyword dialog A list of supported language sets appears Here the Arabic Code Page is checked Li Search expression Code Page Keyword tester Code Page Preview Code Page Name Valid Code resssg 01 AA 1 SI Arabic Windows Yes 1256 23456789 Q ABCDEFGHIJKLMNO Cj 2 amp Baltic DOS Yes 775 PQRSTUVWXYZTY o 3 Baltic 150 Yes 28594 s dde stuvwxyz 4 Ez Baltic Windows Yes 1257 i d HE ooh Eg LAB HB Central European DOS Yes 852 gren og E Central European ISO Yes 28592 Totas UG ten tae 7 Ez Central European Mac Yes 10029 965 nella lb Ode SEIS WF yoyo X D 8 i Central European Windows Yes 1250 bbE 3 3 38J8p0o C 9 Croatian Mac Yes 10082 mem doy L3 10 E Cyrillic DOS Yes 866 LAE a Cyrillic ISO Yes 28595 GB 12 E Cyrillic KOI8 R Yes 20866 2 Return to the Search Expression tab of the dialog and enter the keyword Perform a search as usual File Edit View Tools Help new 5 Open jd Save lt j Print Z Add Device Q Search ig Refresh pap Edt Delete Ey Cases x rj Table Report ast Gallery dd Timeline Disk ig Code QyHome
293. evious Tab Ctrl Shift Tab 2 Display gt Next Tab Ctrl Tab l Queries A Text Styles lt Cl Auto Fit Reset view 106 EnCase Forensic Version 6 11 User s Guide The menu that appears above the Filter pane shows the same tab options These are described here i 5 EnScript Q Hits T Filters fS Conditions 2 Queries Text Styles un Clicking a tab changes the contents of the Filters pane as follows E EnScript displays an EnScript tree menu B Filters displays all available filters B Conditions displays all available conditions Display shows filters conditions and queries that are running B Queries displays tree menu of available conditions B Text Styles provides access to available text styles View Pane Tabs The View pane tabs display different representations of the entries selected in the Table pane When the type of view is appropriate for the selected entry in the Table pane the View pane tab is enabled E Text Hex i oo V3 Transcript E Picture E Report EJ Console 33 Details 2 Output tock E Codepage T 2 40659 Navigating the EnCase Interface 107 The View pane accesses the following tabs B Text m Hex E Doc B Transcript B Picture B Report E Console B Details E Output The tabs on the View pane cannot be closed The tab bar for the View pane also contains controls specific to the View pane These controls include Lock prevents the tab from changing
294. ex tab contains a representation consisting of an address the numeric byte values and the text representation of those numeric byte values Report Gallery Timeline 2 Disk Name Filter O 1 Extend O 2 Documents and Set O WA 3 O Evidence Mi 4 export e O 5 Incomplete 6 Inetpub LJ 7 C3 Msc 8 Msocache 9 NVIDIA C 10 3 Program Files J 11 g RECYCLER c 12 C Reports J 13 C3 System Volume Info C 14 temp ooog oo oo oo oL oo oo o0 oo f z 02800 00 00 00 cs 40 00 00 00 kg OSGCD 1A 93 81 2D F2 C6 01 CD nn ez nn 0842D FZ C6 Ol 00 00 00 00 00 BE eee e 11225 01 53 00 77 00 65 00 65 S wrere 14073 00 65 00 20 00 31 00 30 s e 1 0 16834 00 37 00 34 00 38 00 50 4 7 4 8 P 1i 19600 00 02 00 A0 00 8C 00 O0 p e p 22440 Dl 22 94 2D F2 C6 01 40 aH n az gH n 25200 00 00 00 CC 00 00 00 00 i e 28065 00 70 00 45 00 6E 00 74 e p 30830 00 2D 00 31 00 37 00 2D 0 Navigating the EnCase Interface The Text Tab The Text tab shows the highlighted file as ASCII text amp lHex fho Transcript Picture Report Console 33 Details G Output Lock C Codepage 0 11477 lDOlOD Peete eee hmm f eee tee t eZ Canon Canon PowerShot G2otttt tte t eee ee eee nn ten 2027 04 25 0 00200 1 52 46 E yeeneeeee v rrr nn 0210 0
295. f end gf Options cg brioptions curmborsF 1231355234 200339464060d 499101G tiaia vascrpt CaliPaneHelp Ym CreateMag Hm IMG Htp 04 4 20 24 spacer gf MG http NEL 420 24 1 s GME tip MEL 4 20 24 spacer gf chaser 191 hotmal com Tp oweseegt GAWIN Quick Address List MG ttp 064 4 20 24 st gr tilyray150 Cc Havasengt GAWIN Bice Jnvancret GAWD Amechments Tools Spel Check sctionary Thesaurus Rich Text Edtor ON Copy Message to Sent Folder gt From John Datst John Detsitidgudancescfware com gt gt To thaser 191 hotmad com gt gt Subject Bank Name Accturt and Routing Numbers gt Date Mon 3 Jun 2002 13 12 02 4700 gt gt Bark of America gt 14321 24927 gt 294812318 gt gt Plaase don hurt het Reporting 451 Search Hits Report Keyword searches require good reports Sometimes found keywords are a significant part of a case There are several permutations of keyword search reports Run a standard keyword search 1 Click Search Hits The four pane display shows results of the search Anew G3 Open la Save cdjPrint Se Add Device Q Search Logon Refresh 7X Delete _ Show Excluded Show Deleted x C Report E5 Gallery Timeline fZ Disk 4 M Bookmarks A Search 4 togo Q Search Hits EHO i Little Thumb og Al Email Addresses og Al Web Addresses Log AITIP Addresses D j Credit Card s og Phone Numbers og Dates with 4 digit y Preview O 1 jUnalocated Clusters
296. fter 5 JU Bookmarks mumm Bookmark Type 0B eoO Gz peas 095 go CT ead Gd eoO Gd gore oo File Finder Lon Local Machine E Table Bookmark Type Preview Comm 016 0O 2 2 O 3 Q Search Summary Q Case Time Settings 5 2j Logs m c sf es NN Right click and Drag a Table Preview Comrr 1151 DL 21682 O 3 Q Search Summary 4 Q Case Time Settings L 5 2j Logs To move a table entry into a folder using the right click drag method 1 Right click and drag the desired entry into the desired folder 2 Drop the entry on the folder and click Move Here The entry is moved to the folder on the tree and removed from the table Bookmarking Items 435 Moving a Table Entry or Folder into a Folder Using the Drag Method Home E Entries sj Table ga Preview Commr SoD Boo Ar KS m B 21 Deal lee D 2 ez Drop I IJ Q Search Summary E Q Case Time Settings 5 2j Logs p TIL 6 Drag after sj Table or fT IBeokm A 2o m ar tae Preview Comm SH 1 0002 O10 CUO O 212 go Td O 3 QQ Search Summary oe IE Q Case Time Settings GDC a SOO Gil Finder See C 6 Loo Local Machine 1 Drag the desired entry or folder into the new parent
297. fying the same output file The keys for each user are appended to this output file Acquire a device with CREDANT encrypted files or load an evidence file into the Case The Enter Credentials dialog displays prompting you for only the Username Password Server Offline Server File Machine ID and Shield CREDANT ID SCID information Note In Offline mode the only information you must provide is the Password and Server Offline Server File full path and filename to the bin file downloaded using the CEGetBundle exe utility Analyzing and Searching Files 395 When EnCase decrypts CREDANT encrypted files the key information is placed in Secure Storage in EnCase and saved with the case You do not have to re enter this information Enabling the Forensic Administrator Role on the CREDANT Server To enable the Forensic Administrator role on the server you must change settings as described below These instructions assume that the CREDANT installation folder is C Program Files CREDANT 1 Enable the Web interface for EnCase to download the encryption keys a Open C Program Files CREDANT CMG Enterprise Edition Device Server 1 2 conf context properties b Make sure the forensic method is enabled service forensic enable true Stop and restart the device server from the Start menu Click Start CMG EE Device Server Stop Device Server Service then Start Device Server Service 1 Add the Forensic Administrator role a
298. g 270 Evidence File 520 Evidence File Time Zones 170 Examiner 520 Exchange Server Synchronization 299 Exclude File Bookmarks 431 Exclude Files 128 355 357 Exclude Folder 432 Excluding Bookmarks 431 Excluding Search Hits 127 Expand All 116 Export Folder 520 Export Keywords 345 Export to msg 370 Exporting a Machine Profile from the SafeBoot Server 380 Exporting a Report 448 Exporting Conditions 144 Exporting Filters 137 Exporting to msg 370 Extracting Email 366 F FastBloc 521 FAT HFS and CDFS Time Zone Specifics 172 File Allocation Table FAT 521 File Group Bookmarks 397 File Hashing 335 File Menu 62 File Mounter 488 File Selection Page of the Copy UnErase Wizard 27 File Signature 521 File Signatures 324 File Signatures with Suffixes 325 File Slack 521 File Viewer Features 288 File Viewers 288 Filter Pane 521 Filter Pane Menu 76 Filtering Effects in Table Pane 94 Filters 129 Filters Pane 93 Filters Pane Menu 105 Find 148 Fitting Columns to Data 125 547 EnCase Forensic Version 6 11 User s Guide Folder Information Structure Bookmarks 397 Font 521 Fonts Tab of the Options Dialog 36 Forensic EnScript Code 484 G Gallery Tab 146 314 General Time Zone Notes 172 Generating an Index 362 Generating Reports on the Database 262 Getting Ready to Acquire the Co
299. g 7jHe 8 E sige 10 c 113 E Cent 12 3e 5 Name Code THEE Ars 2 fel Arat 3 dg ara Code Page 4 ges C Unicode 6 a Unicode Binden 6 5 A C Other E Balt 8 E Bat 9 S Bat 10 cer jg 12 zi e J Name Code 1 5 Arabic 864 864 2 i Arabic ASMO 708 708 3 5 Arabic DOS 720 Code Page 4 Arabic 50 28596 C Unicode 6 i Arabic Mac 10004 C Unicode Big Endian 6 Arabic Windows 1256 E OD 7 Baltic DOS 776 SS SSS 8 S Baltic SO 28594 9 Baltic Windows 1267 10 Central European DOS 852 11 S Central European ISO 28592 12 E Central European Mac 10029 Code Page contains settings that determines the code page type used in the text style Unicode specifies Little Endian Unicode If UTF 7 or UTF 8 is used select Other not Unicode Unicode Big Endian specifies Big Endian Unicode Other lets you select from the Code Page list Code Page List contains a list of supported code pages Working with Non English Languages 465 Configuring Non English Language Support Non English language support involves B Configuring individual interface elements B Creating and applying text styles used on the Text and Hextabs m Creating non English keywords B Creating non English search terms E Bookmarking non English text E Viewing Unicode files E Using code pages 466 EnCase Forensic Version 6 11 User s Guide Configuring Interface Elements to Display
300. g options become active and configurable O Days Specifies the age of a record you want to delete For example selecting 1 means you want to delete records at least one day old O Run Maintenance Daily This check box runs the cleaner every day at specified hours and minutes Working with Evidence 263 Updating the Database 1 Run Snapshot To DB EnScript You will be required to log into a SAFE When you successfully log in this dialog opens Select the Role and Machine Name or IP Options SAFE Choose The Role You Want To Assume User E S Roles Total Connections 100 g Active Connections 1 Connections To Use 1 Remediation Allowed Yes Snapshot Allowed Yes SAFE Version Network Tree Enter IP addresses or machine names on separate lines Enter ranges on separate lines and delimit the start and stop address with a dash Example localhost 192 168 5 5 192 168 0 16 192 168 0 64 192 168 1 1 192 168 3 255 FdO0 0 1000 20 0 0 0 100 Cancel This is where you O specify the nodes you want to scan O take a snapshot Choose the Role You Want to Assume in the tree select the specific role you want to use when connecting to the nodes Be sure to select a valid Role to enable the Next button Click Network Tree to open a dialog where you can select nodes added to the role via SAFE Lower text box under Network Tree manually enter IP addresses hostnames and ranges here O Valid ranges
301. ge displays Lj L3 r r LJ L3 Lj LJ I EJLEJ EJ EX EXIEI I EHE oon OO 0 tk WN 10 Se C sa D S E BN Se H Saw I s Sa K sL Sa M saN Sa 0 See P Q See R a S Se T PN Invalid Drive type o o coccoccccoccocOcoccococoo coodocooiuiu U d HBGary Responder does not support analyzing Windows Vista memory dump CHAPTER 14 Using EnCase Tools E Toolbar 516 E Tools Menu 517 516 EnCase Forensic Version 6 11 User s Guide Toolbar The toolbar contains icons for the most frequently used EnCase functions When you open EnCase in acquisition mode only the New Open Print and Refresh icons display in the toolbar When you open a case the Add Device icon displays There is a corresponding menu command for each toolbar icon When the toolbar is wider than the main window the toolbar wraps to another line Some of the icons are enabled only when they are useful such as Print and Refresh The panes and the tabs in the toolbars also display context dependent icons accessed from right click menus New opens the Case Options wizard for defining a new case Open displays a dialog for opening an existing case Print opens the Print dialog Refresh updates a list or table to reflect changes in the file system Save opens the Save dialog Add Device opens the Add Device wizard Search opens the Search dialog so you can search evidence associated with the case Othe
302. gs that determine what kind of connection is made to the specified SAFE None should be enabled when the target system cannot establish a connection with an EE client Then all traffic is redirected through the SAFE server This can increase communication times however it provides the investigator with the ability to obtain data that is otherwise not available Client to Node Local should be enabled when the client Examiner and the node servlet reside on the same network and the SAFE resides on a different network This allows data to transfer directly from the node to the client after the client successfully authenticates through the SAFE Also the client will use the IP address that the node believes it has rather then the IP address the SAFE has for the node In this configuration the network should be designed so that all the company s employees are located on the Corporate Desktop Network and should employ routing NATing Client to Node SAFE enables NAT where a private IP address is mapped to a public IP address Typically the SAFE and node reside on the same subnet and the client on another This allows data to transfer directly from the node to the client after the client successfully authenticates through the SAFE The client also uses the IP address that the SAFE believes the node has rather then the IP address the node reports it has to allow a direct connection between the client and node machine This option is enabled b
303. h A comprehensive Internet history search differs from a regular Internet search Specially tagged keywords are added internally and the software takes a different code path than a regular search In this comprehensive search EnCase examines the entire device including file slack and unallocated space for specific markers that indicate Internet artifacts The basic Internet history search parses known file types for Internet artifacts The latest version of EnCase software and either Windows XP or 2000 must be installed Begin an unallocated space search the same way you begin a regular search 1 Select Comprehensive Search in the Search Dialog 356 EnCase Forensic Version 6 11 User s Guide Selecting Search for Internet History at the same time as shown in the figure performs a regular Internet history search in addition to the exhaustive search OOOO 04 Selected items only 65 Entries 1 Record gt Keyword Search Options M Email Search Options IV Search entries and records for keywords Search for email Selected keywords only 18 keywords Recovered deleted JV Search entry slack Outlook PST Use initialized size F outlook Express DEP Undelete entries before searching Exchange EDB Search only slack area of entries in Hash Library F Lotus NSF m Hash Options I AOU Compute hash value Mmeo Recompute hash values r Additional Options IV verify
304. hat tabs appear in the Table pane The Table Report and Code tabs appear in almost all contexts Entries that involve time can appear in a Timeline tab Where image content is involved the Gallery tab is among the tabs that display 100 EnCase Forensic Version 6 11 User s Guide Figure 19 Tabs that display in the Table pane as determined by the Tree tab displayed in the Tree pane Gray values mean that tab is available for use White values mean that the tab is not available for use Selected Tree Pane Panel Table Pane Panels Table Report Gallery Timeline Code App Descriptor Home App Descriptor Properties Archive Files Cases Home Cases Entries Home Si Cases Entries File Extends Cases Entries Permissions Cases Entries References Cases Entries Hash Properties Cases Bookmarks Home Cases Search Hits Home Cases Search Hits Hash Properties Cases Records Home Ee Cases Records Additional Fields Cases Devices Home Cases Devices Acquisition Info Cases Devices Sources Cases Devices Subjects Cases Devices Read Errors Cases Devices Missing Sectors Cases Devices Disk Elements Cases Devices CRC Errors Cases Secure Storage Cases Keywords Encryption Keys EnScript EnScript Types File Signatures File Types File Viewers Hash Sets Home Hash Sets Hash Items Keywords Machine Profiles Home Machine Profiles Allowed Packages Projects SAFEs Home SAFEs Hetwork SAFEs Roles SAFEs Users SAFEs Events Text
305. he Domino administrator Encryption of the local mailbox is not mandatory but it is advisable because without encryption a person familiar with the NSF file structure could read email without needing Lotus Notes Encryption occurs at block level 322 EnCase Forensic Version 6 11 User s Guide Determining Local Mailbox Encryption Look in the header the first 0x400 bytes at offset 0x282 If the byte is Ox1 the mailbox is locally encrypted 0000240 0000250 0000260 0000270 0000280 0000290 00002A0 00002B0 00002C0 00002D0 coooooooococ Parsing a Locally Encrypted Mailbox 1 Obtain the corresponding ID file from the Domino server All user ID files are backed up on the server either on disk as a file or in the Domino directory as an attachment to email 2 Parse it using View File Structure so that the private key is inserted in Secure Storage E Export Copy UnErase Lr Bookmark Data Ctrl B Activate Single Files Create Hash Set L View File Structure Go To Overwriting File A i J Copy Ctrl C Show Columns Column Sort Select Item Space f Go to Parent BkSp Viewing File Content 323 Encrypted Block The example below shows an encrypted block at offset 0x22000 Address 0x02C8CB44 2 Columns 16 Se cc 65 dc 2e 0 17 1 da 73 d7 b7 8c a7 48 00 leU a R sx GSH b7 68 05 01 7e dd 5 7 ab a9 97 94 08 9 fc d2 h Y 6 O 54 04 69 82
306. he EnCase Interface 115 The Output Tab Use the Output tab to obtain output from various EnScript programs i E Text Hex LAjDoc i Transcript E picture Report C console 33 Details ul gt _ Gi Output 1 E GSI AOLIMEnterpriseModule 537 4 MainClass could not be f Navigating the Tree Pane The Tree pane presents a structured view of all gathered evidence in a Windows like folder hierarchy Use the structured view when exploring Entries Bookmarks Search Hits Keywords and other views of evidence You can add folders to the structure to suit your working requirements Note that some folders have a plus sign next to them Clicking the plus sign opens the folder and displays its contents oom f Entries HOC f Hunter xp BDO C DOLE Extend o0 AOL Instant Messenger Documents and Settings Ey l Users Jic Bob Hunter Ic Default User E LocalService gt NetworkService og Hunter Pics HD My Music amp O C3 Program Files EO ye RECYCLER amp D IC System Volume Information BDO WINDows D0 we E 116 EnCase Forensic Version 6 11 User s Guide In the figure above the Documents and Settings folder is expanded to show the five folders it contains Note that the symbol next to the open folder is a sign indicating the folder is expanded Opening and Closing Folders with Expand Contract Use the Edit menu or right click in the Tree pane to use Expand Contract to o
307. he Table Pane sse tentent nennen tenente 122 Showing Columns ets eie edet e pe idee imet ii fret i tbe de deet Hes ob tse Ud 123 Hiding Columns isien noii te tete eee i diede ri de Eee eden idee ie eet 125 Auto TIE ATE Co litmis jeep e e IUE NH enDi aE IE RETO CHIEDI REL 125 Fitting Columns to Data des uem ele ORI ls ees esten e n epe eee epa eode 125 Resetting Columns iie UH ARN OD TED D UH tee e eee tette tite 126 Setting a LOCK on Columns ient ter i n gne EAE SEE Ton e Eee e rode ctun 126 Excluding Search FtS i iie ettet eel a e ed n e eee ee Heide 127 Ip SITAME haba Ga ea ave 128 ig a ta ered 129 Creating a Filter iecore eigo vata sade Hn i n D ee HE re daca vada Ca eri caters 130 Editing a PIer ione ite I phi ete breit eteludiie aed eiii fiiius 131 Running a Filter iiien i aia den diio bete bendi E a d ente cities 132 Combining Filters non rh eh ooi d irse a ED LR i aiea ao a 134 AINND OR FiltetLoele aai ttis bid eb eh etie ile ees tie Hobo ais aaen totis siete 135 Changing Filter Ordet usb Heidi sdb HE THIS RE Ge EH ties 135 Turning Filters Off teret cree eoe Ee reuera eese stet ape e EYE Uere ve aug ee e RES REEE UR 136 Deleting a Filter ect een rore RR E EAT RTE EEEE T 137 Importing Piltets eee tnter E EEEE E E EEEE RAEE ER EEEE 137 Exporting EMIefs ere ee E EAI E EAA VERB estos TENTER E 137 CONOS s oe d E EA EE EE EEEE ed reet EAA 138 Creating Co
308. he email dbx file displays and component files or layers in the compound volume folder can be opened and displayed in the view of your choice Notice that the icon for the compound email file looks like a disk drive and no compound volume indicator is added to the icon after it is parsed 310 EnCase Forensic Version 6 11 User s Guide Viewing MS Outlook Email The process of mounting Outlook pst files is identical to that of Outlook Express as previously described When EnCase applications mount an Outlook pst file messages are viewable by clicking on the PR Body file and selecting the Text tab in the View pane Because the text is likely Unicode apply a unicode text style to make it easier to read When expanded the top level or top root of the pst file directory contains multiple folders including B Inbox props properties B Message store storage containing the PR PST PASSWORD file and other IDs B Name to id map E Root folder The Root folder contains B Search Root reserved for future use B Top of Personal Folders containing the Inbox Sent Items and Deleted Items Each pst email message file appears as a folder with all message properties within the folder as well as any attachments Many of the fields within the pst mail folder are duplicated which is part of the pst format If a keyword is a match within a certain field it is duplicated in the secondary field as well Created written and modified date
309. he text field This text will appear in the filter column of the Table pane when a file meets this criteria O Change the color element by clicking Text Color or Frame Color then double click Background and Foreground colors then click OK 3 Choose Filter or Condition 4 Select the filter or condition from the list 5 Enter text into the text field This is text will appear in the filter column of the Table pane when a file meets this criteria 6 Change the Color element by clicking Text color or Frame color then double click the Background and Foreground colors then click OK 7 In the New Display dialog repeat Step 4 as often as required Note The filters and conditions shown here will not hide rows that do not match the requirements of the selected filters These selections simply adjust how the matches are indicated in the interface 8 In the Conditions for showing items pane right click Combinations and select New 9 In the New Combination dialog select filter or condition then select the filter or condition from the list and click OK Note You do not need to enter the same filters or conditions here as entered in the display setting for shown items pane 146 EnCase Forensic Version 6 11 User s Guide 10 Repeat Step 7 as many times as needed Note This is the logic for hiding rows If for example an item matches a filter from the display settings for shown items pane but it does not match the logic in the
310. hen LEFs are verified the stored hash value of the file is compared to the entry s current hash value B If the hash of the current content does not match the stored hash value the hash is followed by an asterisk If no content for the entry was stored when creating the LEF but a hash was stored the hash is not compared to the empty file hash B If no hash value was stored for the entry when creating the LEF no comparison is done and a new hash value is not populated Raw Image Files Raw image files contain a collection of files but lack the integration of metadata and compression hash values that the EnCase evidence file provides Before raw image files can be acquired they must be added to a case The Linux dd command is typically used to produce raw image files Raw image files can be acquired and added to a case During acquisition the raw image file can be hashed and compressed Once acquired raw image files are incorporated into an EnCase evidence file Single Files Individual files can be added to the case once Activate Single Files is selected Any file type supported by an EnCase application can be added to a case You can do this through the interface or through drag and drop When files are added they appear in the view pane You can add a folder containing files to a case This can only be done using drag and drop When you add folders the folders appear in the entries tree and the entries table The individua
311. hine For instance if a file is saved at 3 p m the time stored is 3 p m There is no time zone associated to 3 p m when the time is stored Setting the time zone at the device or volume level identifies the time zone in which the recorded times occurred When the evidence is added to the program it is assumed to be in the investigator s local time Modifying the device level does not change times because the device time zone associates a time zone only to the times stored Case Management 175 Time Zone Example B The target computer has an HFS in New York 5 GMT B The file is created at 3 p m The stored time in the computer is 3 p m B The drive is imaged and the investigator writes that the computer displayed the correct local time B Aninvestigator in California opens the evidence file The EnCase program initially assigns a time zone to the device level of 8 GMT since that is the time zone setting of the West coast investigator s machine The time still displays 3 p m because EnCase software knows the stored time is 3 p m and the local time zone of the examiner is 8 GMT Open a Case Open a case to continue analysis or to review a case 1 Select File Open File Edit View Tools Help i3 New 4 Open Ctrl O lal Save Ctrl S Save As il Save all Ctrl Shift 5 c3 Print Printer Setup Ge Add Device Add Raw Image Exit Alt F4 0 C Documents and SettingsYjay reidy TSYDesktopiThumb Ct
312. his MainClass Size 184 c CaseClass Size 3376 Name EnScript 2 v6 58 Ust NamelistClass Size 32 Name Rg dialogbox MyDialog Size 1763 Name Step M O M 322 Stren StreamClass Size 48 Ref 2 3 rebld RebuldClass Size 64 Ref 2 now DateClass 17 08 07 22 36 02 UTC i start vint 1187390162 0x46c622d2 entryroot EntryClass Size 92 Name FOLDER entry EntryClass Size 92 Name Hunter XP FOLDER 502 EnCase Forensic Version 6 11 User s Guide Help for EnScript Modules The Case Processor Sweep Enterprise and Scan Local Machine screens contain a Help button or Help section for each available module EnCase File Report EnCase File Report EnScript Analysis 503 EnScript File Mounter The File Mounter program catalogs the contents of selected compound files for example zip files This produces a listing of the items in the compound file not the actual file contents The program duplicates the structure of compound files into Log Record bookmarks You define the types of files to process and the criteria You can select file types by file extension or signature You can choose to mount them persistently leaving them mounted after the conclusion of the EnScript program or non persistently The non persistent option returns them to their unmounted state when the EnScript File Mounter program completes Other options include E The ability to create a Logical Evidence File L
313. his is used correctly it can be as pow erful as a hand grenade Also light this in the correct place or else it could make your lif e miserable The report is retained 448 EnCase Forensic Version 6 11 User s Guide Email Report Email records are created when you perform an email search Perform an email search as described in the Creating a Report Using the Report Tab chapter 1 Select View Case Sub Tabs Records A display of the Tree and Table panes appear The Tree pane data show the records and the Table pane displays the record s contents The figure shows the contents of Hunter XP 3 Home GERS M Bookmarks C4 Name Fiter T ted h eae tes iHome 9 Additional Fields C 1 e Folders dbx Ponga Records LJ 2 Bily dbx Son f Hunter xP 3 s chaser1191 D se Folders dbx HD s Billy dbx ED sw chaser1191 HO See Hotmail Sent Items dbx ED e Outbox dbx N S Hotmail Sent Item s Outbox dbx 6 chaser1191 7 Se Hotmail Deleted It L a SOs chaser1191 8 Se Deleted Items dbx HO s Hotmail Deleted Items dbx LJ 9 se 3do software tools D0 s gt Deleted Items dbx Ld 10 Se Hotmail Bank Infor D se 3do software tools dbx J 11 ee Bank Information dbx os Hotmail Bank Information dbx 12 se Hotmail Inbox dbx o0 See Bank Information dbx HD Se Hotmail In
314. history Comprehensive Search 358 EnCase Forensic Version 6 11 User s Guide Selected items only runs a search for items limited to the files folders records or devices that you checked Search entries and records for keywords executes a keyword search when checked When unchecked other checked functions are performed but the keyword search is not This allows you to run a signature analysis or a hash analysis without running a keyword search This option also enables E Selected keywords only B Search entry slack B Use initialized size E Undelete entries before searching E Search only slack area of entries in Hash Library Selected keywords only restricts the number of keywords used during the keyword search to the number of keywords specified shown in Number of Keywords Search entry slack searches the slack area between the end of logical files and the end of their respective physical files Use initialized size searches only the initialized size of an entry as opposed to the logical or physical size Note Initialized size is only pertinent to NTFS file systems when a file is opened if the initialized size is smaller than the logical size the space after the initialized size is zeroed out Thus searching the initialized size searches only data a user would see in a file Undelete entries before searching undeletes deleted files prior to searching Search only slack area of entries in Hash Library is used in c
315. hows the concatenated results Analyzing and Searching Files 363 Show Deleted Files Excluded files are not deleted They are merely hidden from view To see them again select the Show Excluded function Note Deleted files are stored in a temporary buffer until the file is closed at which time the buffer and deleted files are erased Exclude a number of files To review excluded files 1 Click Show Excluded Deleted files reappear in both Table pane and in Report pane Encode Preview Encode Preview lets you apply text encoding to the Preview column on the Bookmarks and Search Hits tab This feature allows non English alphabet bookmarks and search hits to display properly in the Preview column Turning On Encode Preview The preview column displays certain non English languages as plain text by default When this happens the text appears as a string of symbols that have no bearing on the actual text representation Turning on Encode Preview displays the actual text using the proper characters Change the Fonts Tables option to a Unicode font that supports the characters you intend to display Arial Unicode MS is recommended because of the breadth of the characters included 1 Openan evidence file and click Text or Hex in the View pane The document appears ires amp lHex aa Do Ar anscript E Picture Report gt ooo llle s ld Jil yc ell 006 alll ss V 240 vlilo aluo cuyas ubin Sh F acljo ai
316. ick Start Control Panel Region and Language Options The Regional Options tab of the Regional and Language Options dialog appears 2 In Standards and formats select the desired language 3 Select the Advanced tab The Advanced dialog appears 4 In Code page conversion tables check the desired code page 468 EnCase Forensic Version 6 11 User s Guide 5 Click OK The keyboard is mapped to the selected non English language Entering Non English Content without Using Non English Keyboard Mapping Windows provides a character map so you can enter non English character strings without remapping the keyboard EnCase v6 0a EnCase v6 0e EnCase v6 00 EnCase v6 0p Internet Explorer MSN Outlook Express amp PowerDVD s Remote Assistance e Windows Media Player 3 Windows Messenger Synchronize iE Tour Windows XP 4 Windows Explorer A WordPad E e v a G Set Program Access and Defaults eS Windows Catalog Help and Support Run fan d Accessibilty v e Communications Entertainment au C Microsoft Interactive Training e n Tools e CD Address Book E sneott 8 Cj Calculator E Startup Command Prompt l an VMware I Notepad BY EnCase Y Pant ET EnCase v5 9t Program Compatibility Wizard Cases AjFile Types ZjlFile Viewers A Text Styles X vices en Secure Storage Ke e Com Keywo
317. ide 2 Click Edit Source The filter source appears in the Table pane B Table Report 2 Gallery Timeline f Disk f Deleted Files T Differing Initialized Size 7 Find files between any dates T NewFilter lass MainClass DateClass bDate aDate NameListClass List String Name bool Include UserCancel MainClass Listi new NameListClass List Created new NameListClass List Written new NameListClass List Accessed new NameListClass List Modified new NameListClass List Deleted aDate Nowi bDate Nowi DialogClass dialog MainWindow Files between n dates new DateEditClass dialog Show files with any date on or after DialogClass NEXT DialogClas new DateEditClass dialog Show files with any date on or before DialogClass SAME DialogCl new ListEditClass dialog Dates to filter on DialogClass SAME DialoqClass NEXT 180 if dialog Execute SystemClass CANCEL UserCancel true Note The Table pane menu shows the Code icon selected the text editor s menu highlights the filter you are editing and the scroll bars allow you to maneuver in the display 3 Edit commands as needed Filter behavior changes Running a Filter Running a filter against a set of evidence files produces data that conform to the filters parameters Open a case file and select folders to search 1 Run a filter by clicking Select All home plate on evidence fol
318. idence Number J D Notes File Segment Size MB Compression 640 Burn Disc I Thane Start Sector Stop Sector Good Slower Smaller 0 855 Best Slowest Smallest Password Confirm Password Block size Sectors Error granularity Sectors 64 E 64 IV Generate image hash F Quick reacquisition Read ahead Output Path D E01 E Alternate Path cows To define how the EnCase evidence file is built and output 1 2 3 4 Accept the default values or enter or select alternative values Enter an Evidence Number and Notes If a hash has not been requested yet and one is desired click Generate image Hash If you might run out of storage space where you are storing the acquired device specify additional storage by browsing to or entering a path and filename in Alternate Path Click Finish The acquisition starts and the Thread Status Line appears at the bottom right corner of the main window displaying the status of the thread performing the acquisition You can cancel the acquisition during processing see Cancelling an Acquisition When the Acquisition Results dialog displays a status of finished select Console Note or Log Record Click OK Working with Evidence 213 The Acquisition Results dialog closes and the acquisition is complete Canceling an Acquisition You can cancel an acquisition while an Acquisition is running After canceling the Acquisition can be restarted If however the acqu
319. idence file and whether dates should be converted to a single time zone B Search summary O Contains search results times and keywords for a particular case Note Case time settings bookmarks and Search summary bookmarks are created automatically Highlighted Data Bookmarks The highlighted data bookmark also known as a sweeping bookmark or a text fragment bookmark can be used to show a larger expanse of text This bookmark type is created by clicking and dragging text hex doc or transcript content in the View pane Notes Bookmarks The notes bookmark gives the investigator a great deal of flexibility when adding comments to a report This bookmark has a field reserved only for comment text and can hold up to 1000 characters It also contains formatting options including m italics B bold B changing font size B changing the indent of the text 404 EnCase Forensic Version 6 11 User s Guide Folder Information Structure Bookmarks Use folder information bookmarks to bookmark folder structures or devices By bookmarking a folder structure the entire directory structure of that folder and its children can be shown within the report or bookmarked for later analysis Individual devices volumes and physical disks can be bookmarked as well This shows important device specific information in the final report Note This type of bookmark is useful for marking directories that contain unauthorized documents pictures and applicati
320. if the file type of the file selected in the Table pane changes By default the View pane displays the appropriate tab for the type of file selected in the Table pane This behavior is overridden when Lock is selected When you select Lock the currently displayed tab type is retained even if the selected file type in the Table pane changes For example if you Lock the View pane with the Picture tab in view and then select entries in the Table pane that do not contain images the Picture tab may show nothing Codepage determines whether the detected rather than the default codepage is used in tabs that display text Selected Total displays the number of entries selected as a fraction of the total number of entries available in the current case The context established by selecting an entry in the Table pane determines what content is displayed in the View pane The View pane displays the content of one entry from the table While several entries can be blue checked in the Table pane only one entry can be highlighted at a time 108 EnCase Forensic Version 6 11 User s Guide Figure 21 View pane context where 1 the Table pane contains a table where only one entry can be 2 highlighted for further exploration in 3 a tab in the View pane 4 Checking table entries does not drive the content displayed in the tab displayed in the View pane The representation of the highlighted content is made when you 5 select the desired View pane tab 6 The H
321. ightmost column is hidden Navigating the EnCase Interface 147 Viewing More Rows View more pictures in Gallery by increasing the number of displayed rows 1 Right click in the Gallery tab 2 Select More Rows Viewing Fewer Rows View fewer pictures in Gallery by decreasing the number of displayed rows 1 Right click anywhere in gallery 2 Select Fewer Rows Timeline Tab The Timeline is a great resource for looking at patterns of file creation editing and last accessed times You can zoom in to a second by second timeline and zoom out to a year by year timeline by right clicking and selecting the appropriate option 1234567891011121 2 3 4 5 6 7 8 9 101112 aon nf CO P9 Above the calendar are selection boxes to quickly and easily filter which type of time stamp to display E Written B Accessed E Modified E Deleted B File Acquired BA Written I Accessed f Modified T Deleted 4 File Acquired E Tabe Report Gallery 23 Code lu2sdadasu6sZoBug odbi2his2 344 CuCZUBuOuIle 148 EnCase Forensic Version 6 11 User s Guide Clearing one or more of these boxes changes the timeline presentation Modifying the View Pane The View pane provides display specific functionality of items selected in the Table pane Copy You can copy data in the Text and Hex tabs You can also copy RTF from a report so it can be pasted into an external program that accepts RTF input In e
322. ile Group 130 048 254 Jay s Bookmarks Pip NoName Highlighted Data 932 387 1 821 Jay s Bookmarks Pip NoName 1 File Group 946 176 1 848 Jay s Bookmarks Pip NoName File Group 946 176 1 848 Jay s Bookmarks Pip NoName ul Note Jay s Bookmarks Pip NoName Note The Excluded column of the display shows which files are excluded and which are not CHAPTER 11 Reporting Reporting 443 a Creating a Report Using the Report Tab 444 a Creating a Report Using Case Processor 456 444 EnCase Forensic Version 6 11 User s Guide Reporting The final phase of a forensic examination is reporting findings Organize and present reports in a way the target audience understands Formatting and presentation considerations should be should be made when the evidence is first received EnCase software is designed to help mark and export findings so the final report is generated quickly The software provides several methods for generating a report Some investigators prefer to break up the final report into several sub reports in a word processing program with a summary report directing the reader to the contents Others create paperless reports on a compact disc using a hyperlinked summary of the subreports and supporting documentation and files Creating a Report Using the Report Tab Creating reports is usually one of the last tasks performed when investigating a case With the EnCase application you can create re
323. ime of analysis Examiner A general destination folder to place data copied from the evidence folder Export Folder A general destination folder to place data copied from the evidence file F FastBloc FastBloc is a collection of hardware write blockers and one software write blocker File Allocation Table FAT Refers to a file system used primarily in DOS and Windows operating systems There are several levels designed to cope with larger devices FAT12 is usually used for removable media whereas FAT16 was initially used on hard drives FAT16 has a 2GB size limit so FAT32 was introduced for larger hard drives FAT32 has been superseded by the New Technology File System see NTFS and is the recommended file system for Windows 2000 and later File Signature Unique identifiers published by the International Standards Organization and the International Telecommunications Union Telecommunication Standardization Sector among others to identify specific file types File Slack The area between the end of a file and the end of the last cluster or sector used by that file This area is wasted storage so file systems using smaller clusters utilize disk space more efficiently Filter Pane The Filter pane is typically located in the lower right quadrant of the four pane display It provides access to EnScript programs filters conditions and queries Also see Tree Pane View Pane and Table Pane Font
324. in a new order Because all filters are selected and thus active all will be run The order in which they run however is changed In the first example below Selected Files Only runs first while in the second example it runs second 2 EnScript f Filters fS Conditions Display Queries A Text 4 P Text Frame bene Color Color S5 1 fS Selected Files Only F Default B Default F Default B Default NI 2 Y Deleted Files F Default B Default F Default B Default Mi 3 Y Yahoo Mail Pages F Default B Default F Default B Default 4 b 3 4 EnScript T Filters Conditions M Display 2 Queries A Text 4 b Text Frame Nans Color Color NI 1 T Deleted Files F Default B Default F Default B Default MI 2 12 selected Files Only F Default B Default F Default B Default S 3 Y Yahoo Mail Pages F Default B Default F Default B Default 4 b Turning Filters Off There are several ways to turn off or disable filters You can toggle the Query icon to alternate between the filtered list and the unfiltered one This is an all or none toggle When you have more than one filter or condition in the Filters pane Display tab deselecting a filter modifies the Table view to show only files that result from the still checked items For example the list in the next example shows three active filters Selected Files Only File Extension and Deleted Files but File Extension is unchecked AZ EnScript f F
325. in the Bookmarks table of the Table pane 420 EnCase Forensic Version 6 11 User s Guide Creating a Log Record Bookmark Log record bookmarks are created by a process status dialog for example the Acquisition Search Results dialog that allows their content to be saved in a log record Before you can create a log record bookmark a process results dialog must be open x Status Completed Console Start 09 21 06 10 51 08PM Stop 09 21 06 10 51 09PM Note Time 0 00 01 Name Disk Image v Log Record Path C Program Files EnCase6 Disk Image EO1 GUID CA6118DC8937B64F8D093D57E77CD2C9 Acquisition Hash 458447B7E436D230EECC17386CO02FB04 Cancel ases Home e Entries Bookmarks Q Search Hits Z3Records fZ Devices P Secure Storage Keywords tz Table x Bookmark Page Show eo eee Type Maced A Picture S x bp Ole O 1 Q Search Summary too O 2 Q Case Time Settings poo 3 2 toss To create a log record bookmark 1 On the process results dialog select Log Record 2 Click OK A Logs entry appears in the Bookmarks table in the Table pane Creating a Snapshot Bookmark Bookmarking Items 421 Snapshot bookmarks are created by various EnScript programs Note Before you can create a snapshot bookmark display the EnScript panel in the Filter pane Fe ER Vw Toc bite y gan Sere PE Zp ACen seed Qui
326. inated outside an EnCase application reacquiring it results in the creation of an EnCase evidence file containing the content of the raw evidence file You can move EnCase evidence files into a case even if they were acquired elsewhere This does not require a reacquisition Just drag the files from Windows Explorer and drop them on the Sessions Sources page of the Add Device Wizard You may also want to reacquire an existing EnCase evidence file to change the compression settings or the file segment size Reacquiring an Evidence File Before you begin B Your EnCase application is open B The file to be reacquired is included in the case B The case has been opened xi F samo arere come ermer ina iet fal Se tre LE Dein mat x cC xij B P r r t r i i F moate m r I taa nadons e r f ramets te tatae mete r LI Orem E 2 C r D Sach arty dh na of e rh bry r T PI aw face FF Gnd en Saab E prera a fe E pir RI r Comoe hah vd P vete epa Peeve r T7 Merthy cobran Hehe Dene nw grt Ger Sew tor riene ary 7 Messe a EL T F wa Cm Cred amara E C3 Coed te Ure Ceci To reacquire an evidence file 1 Inthe Tree pane click Cases Entries Home The Entries tree appears in the Tree pane 2 Right click the device to be reacquired and click Acquire The After Acquisition page of the Acquisition wizard appears 3 Perform the acquisition see Specifying and Running an Acquis
327. inekeys Contract All You can close an entire tree with one menu click If one or more folders is expanded beneath the highlighted item the entire tree is contracted Contract the entire table by opening the Edit Menu then click Contract All Expand Contract Space Expand All Set Included Folders Num Include Sub Folders Shift Num Include Single Folder Ctrl Num The hierarchical tree contracts and displays the highlighted item only BOO te Entries 118 EnCase Forensic Version 6 11 User s Guide Displaying Tree Entry Information for One Branch Highlighting is one of three ways to choose items in the Tree pane Highlighting an item in the tree displays its contents in the Table pane Figure 22 Highlighting a tree entry where 1 is the highlighted item 2 are folder objects contained in the highlighted item in the Tree pane and 3 are items contained in the highlighted item enumerated in the Table pane don Entries SOC fg Gs1 Doc 102033 10 0 36 21 1 SD C DIE Extend DE Documents and Settings SOME Administrator C3 Application Data E Cookies Desktop c Favorites gG Local Settings C3 My Documents E NetHood C3 PrintHood Cj Recent gG SendTo Cj Start Menu OG Templates DOE All Users amp O 3C darrell cardenas DOE david locke amp O C3 Default User OES jeffrey misner IE LocalService DLJ NetworkService DE Evidence
328. ing Tools gt GSI gt Webmail Parser specifically searches for Netscape amp Hotmail and Yahoo Web Mail 370 EnCase Forensic Version 6 11 User s Guide Web Mail Parser Web mail including Netscape Hotmail and Yahoo Web mail can be searched Open a case that is thought to contain Webmail 1 Select Tools GSI Webmail Parser Tools Help a GSI lal Index Case Ctrl I 4 Webmail Parser The Webmail parser options dialog appears Webmail MES Webmail Types S Netscape Web Mail S Hotmail Web Mail S Yahoo Web Mail Run on selected File Only Cancel 2 Select the Webmail types for collection Optionally a search can be run only on selected files The search status displays on the status bar Parsing webmail 0 01 02 3 Click the Records tab The Tree pane displays a list of discovered files Pa Encryption Keys J SAFEs x S Entries Bookmarks OX Search Hits 4 gt 33 Additional Fields og Records togig Fiske amp oafgc oG Netscape Ej Hotmail E Yahoo 4 Open a folder to view its contents in the Table pane Name addtional Subject CJ 1 3 242 1 htm Re FAKE ID FAKE O 2 3 9st htm e Re Fake ID s O3 G 3 e 1 htm Re GO TO WW I3 4 C compose 1 htm los mainentrance 1 htm 5 To view the data in the Report pane select a file and click Report Analyzing and Searching Files 371 File c
329. ing XML Formatted exports filters in XML format 3 Check the Export Tree field as in the figure 4 Navigate to or enter the path where the filter is located and click OK Note By default the Output File text field contains a file named export txt This can be changed and a complete export path can be entered or navigated to Conditions Conditions are similar to filters They limit Table pane content Several created conditions exist and like filters they vary depending on the chosen Tree tab The first figure below shows the display when the Conditions tab is selected Q His T Filters K Conditions Queries AV Text Styles 4 gt He Conditions Files H Email Examinations References Conditions File Extents EHO General Conditions Filter by Date Filter by size H Hash Conditions H5 Print Spool Files i Signature Conditions Permissions Conditions Navigating the EnCase Interface 139 Creating Conditions To create a new condition right click a folder in the Conditions tab in the Filter pane and select New Conditions Fiters Source Code Note To use a filter inside a condition create the filter by first clicking the filter tab and creating a filter Once created click the Conditions tab and the filter appears in the properties list 140 EnCase Forensic Version 6 11 User s Guide To create a condition 1 Entera name in the Name field 2 Right click Main on the co
330. ing bookmarks are edited with the Edit Folder Dialog Bookmarking Items 425 Edit Highlighted Data Bookmarks Dialog Use this dialog to edit highlighted data bookmarks Edit Highlighted Data xj Comment usbest exe zi EHI Data Type L E Types n oe Text LEJ Do not Show L E High ASCII LE Low ASCII Eg Hex E Unicode L ROT 13 Encoding LE HTML LE HTML Unicode Gey Picture bd Case 5DX1 DRIVER drive i usbest exe Comment contains text describing the bookmarked content Data Type contains the data type of the bookmarked content Selecting a different data type does not alter the content of the bookmark Content contains highlighted data that was bookmarked Note You cannot edit this field 426 EnCase Forensic Version 6 11 User s Guide Edit Note Bookmarks Dialog Use this dialog to edit notes bookmarks Notes Note to be edited IV Show in report Formatting 7 Bold Increase Font size points o v Italic Increase text indent 1 4 inch o Cancel Notes contains text describing the bookmarked content A note can contain up to 1000 characters Show in report when checked the content of the note bookmark appears in the report tab panel of the Table pane Formatting contains controls for formatting all characters in the note Bold makes all content bold Italic makes all content italics Increase font size sets the font size of al
331. ing the Acquisition wizard 208 EnCase Forensic Version 6 11 User s Guide Specifying and Running an Acquisition This completes creation of an EnCase Evidence File Before you begin Open the After Acquisition page of the Acquisition wizard xj A mri ier ture A Lr sentie ma x Cc E HH oman Acte meter dh f Seth Pn ard patum edes Ext rae ares enn tm ate LOI uas m rtt ae r aao Come rate then hohen nite r Pie segrare Sus 980 men ins s den p ponte C msa Jur nho dt urna d Pn rh Ln r teest comtan ft nce _ mese d em ab a d f 3 Wc sena Pd f d Compute Fa chr D emt the ptm ees f m r NEL d BaO terpeuetr uten Tegeta rma retay fe f a P crete tw 7 r ame tem ao c 4 E m E e 7mm cu mran Senn an To specify and run the acquisition 1 As needed change the default settings on the After Acquisition page as described in Completing the After Acquisition Page of the Acquisition Wizard 2 Click Next If you selected Search Hash and Signature Analysis the Search page of the Acquisition wizard appears Otherwise the Options page of the Acquisition wizard appears 3 Ifthe Search page appeared as needed O Change the default settings on the Search page described in Completing the Search Page of the Acquisition Wizard O Click Next The Options page of the Acquisition wizard appears 4 As needed O Change the default settings on the Options page described in Com
332. ing the EnCase Interface 111 The Doc Tab The Doc tab of the View pane uses Oracle Outside In technology to display text in its native format This viewer technology provides application software developers with high fidelity document viewing without having to use native applications for more than 390 file formats on Windows platforms 3 Text amp lHex 3 Transcript E Picture Report E Console Details Gl gt SAT OMT qm ODER REG BALANCE DEBT AMOUNT CREO 96 06 08 95 10 21 112 EnCase Forensic Version 6 11 User s Guide The Transcript Tab The Transcript tab uses Oracle Outside In technology to extract text from a file containing more than text The Transcript tab displays plain text content pulled from its non plain text native format This makes it especially attractive for creating sweeping bookmarks inside files that are not normally stored as plain text such as Excel spreadsheets i E Text amp lHex Lail Doc E Picture E Report CI Console Details G gt Valued Gateway Client Bob Microsoft Excel 9 3 5 30 0 O 0 O H B HHP GHGS 6 maaaaaano000 O O 0 05 0000000ACCT TYPE ACCT NAME ENTRY DATE QTY ORDER REG BALANCE DEBIT AMOUNT CREDIT AMOUNT ENDI DE COMMENTSV BEG MONTH BAL MONTH END BAL BEG YEAR BAL YEAR END BAL B BA 96 05 2 124 195963 200 FROM MO B BA 96 05 27 96 100 FROM MO B BA 96 06 06 200 FROM MO E 108 5 100 FROM MO B BA 96 07 29 196 GOOD B BA
333. ion Using LinEn sse 51 Acquiring Device Configuration Overlays DCO and Host Protected Areas HPA 54 Acquiring a Disk Running in Direct ATA Mode eee eene 54 Mode S5electi l 1 iet ce nati A teet dotis atte e IAT i E EIA 55 Doing a Crossover Cable Preview or Acquisition sssseseseeeeneneneerrne enne 56 Hashing the Subject Drive Using LinEn ssssssseseeeeeeeeneeeeneneeneenenentn tenete 58 CHAPTER 5 Navigating the EnCase Interface 59 The Main WiIDndOWssi te qe uet t aditu CC 60 System MENU m does 61 File Menti unen eite e re eite etre die Salen dt isis 62 FAME e CH O OR 63 hr M Qn 64 Miew Metke ED 66 The Tree Pane and its Tab and Sub Tab Menus sss eene nenne 70 The Table Pane and its Tab Bar and View Menu sese eere nnne nen n 71 Table Pane Menu einn em e anit sue shee timete etti eps 72 The View Pane and its Tab Bar and View Menu sees 73 View Pane Men see e e Re E OE Le e e ireeiiiisee a as a ereet 74 The Filter Pane and its Tab Bar and View Menu 0 cccccccccessseessecesscecsceceseceeseecesscecseceseccsseceeeeenaecnes 75 Filter Pane Meriib is eee tbe herr ee bo Goede era ee oe E e ORA E EP e e DRE Heu a 76 Pose UTE EE 76 Tools Melton eee tee E Gies tarte o eade e ec ee to Gaels dee pe o
334. ion available in Windows 2000 Windows XP and Windows 2003 Server The information pertinent to building the configuration resides at the end of the disk rather than in a registry key Therefore each physical disk in this configuration contains the information necessary to reconstruct the original setup EnCase applications read the Dynamic Disk partition structure and resolve the configurations based on the information extracted To rebuild a Dynamic Disk configuration add the physical devices involved in the set to the case and from the Cases tab right click on any one of the devices and choose Scan Disk Configuration If the resulting disk configurations seem incorrect you can manually edit them via the Edit command in the Devices tab 228 EnCase Forensic Version 6 11 User s Guide Hardware Disk Configuration Hardware disk configurations can be acquired B Asone drive B As separate drives Both Raid 5 and Raid 10 can be acquired Disk Configuration Set Acquired as One Drive Unlike software disk configurations those controlled by hardware contain necessary configuration information in the card s BIOS Because the disk configuration is controlled by hardware EnCase cannot reconstruct the configurations from the physical disks However since the pertinent information to rebuild the set is contained within the controller the computer with the controller card actually sees a hardware disk configuration as one virtual drive reg
335. irectory O logging on to a remote SAFE O additional commands that expand or collapse the SAFEs tree SAFE Objects provides additional functionality through a right click menu such as O editing the settings of the SAFE O changing the root directory O logging on to a remote SAFE SAFE Right Click Menu The SAFE right click menu provides additional functionality T Edit Enter Update Ctrl U Change Root Path 162 EnCase Forensic Version 6 11 User s Guide Edit opens the Edit SAFE Dialog where SAFE settings are defined and remote logons are enabled Update updates the Users tree display When a user s private key is added to the default C Program Files l EnCase6 Keys folder or any other folder specified by the current root path the tree does not immediately display the new user The new user appears when the wizard is opened again or when the User tree is updated Use the Change Root Path command to specify a folder that contains the private keys of users other than the default folder Specify the root path in the Browse for Folder dialog The Users tree contains only those users in the folder specified as the new root path Browse for Folder Dialog Use this dialog to change the root path used in the Users tree and the SAFE tree to specify the path to folders containing keys for users or SAFEs The default path is C Program Files EnCase6 Keys The User s tree is based on the private keys contain
336. is and it sent debris 20 feet in every direction Place on the engine block of car to destroy it Try electric detonation with an electric match Put iron bits in the black powder to make it lethal Remember If this is used correctly it can be as pow erful as a hand grenade Also light this in the correct place or else it could make your lif e miserable Note To set the in report value for multiple items select several in the table panel of the table pane and then follow the sub step in step 2 The report containing the bookmarked content and the metadata about the bookmarks can now be viewed Customizing a Report You can customize a report using the Edit Bookmark Folder dialog Note Any bookmarks that will appear in the report must be in the same folder in the Bookmarks tree To customize a report 1 2 Right click the folder containing entries for the report Select Edit The edit folder dialog appears Using the Fields list double click each field in the order you want it to appear in the report Each field is moved to the Format list Enter any label text needed The text appears in the Format list Cut and paste the text and fields as needed Once the content of the Format list is correct click OK 438 EnCase Forensic Version 6 11 User s Guide 6 On the Table pane click Report The report appears with its customized contents Excluding Bookmarks Hiding all or parts of the listing is cal
337. is checked This captures the time zone you want to use with your case 172 EnCase Forensic Version 6 11 User s Guide Evidence File Time Zones Use the Time Properties dialog to set the time zone for each evidence file Time Zone GMT 06 00 Saskatchewan GMT 07 00 Arizona GMT 07 00 Chihuahua La Paz Mazatlan New GMT 07 00 Chihuahua La Paz Mazatlan Old GMT 07 00 Mountain Time LIS amp Canada GMT 08 00 Pacific Time LIS amp Canada GMT 08 00 Tijuana Baja CaliFornia GMT 09 00 Alaska GMT 10 00 Hawaii GMT 11 00 Midway Island Samoa GMT 12 00 International Date Line West Time Properties E xi Details GMT 08 00 Pacific Time US amp Canada 2006 Time Zone Bias 480 Daylight Bias 60 Standard Bias 0 Daylight start Sunday Week 1 of Month 4 Hour 2 Standard start Sunday Week 5 of Month 10 Hour 2 2007 Time Zone Bias 480 Daylight Bias 60 Standard Bias 0 x JV Use single DST offset 2006 2007 bd Cancel The features of the Time Properties dialog are Time Zone List captures the time zone the subject device was set to Details provide rules used for the time zone selected in the Time Zone list The rules listed here populate using Dynamic Daylight Savings Time which requires that your computer is properly patched in order to use the new DST rules described above Use Single DST Offset specifies not to use Dynamic DST and
338. isition ends without being cancelled you cannot restart it lt lt 0 x I 5 5 43 Tye Notes File Segment Sze VB Cemeression 640 a T Buen Oise C Nore Start Sector Step Sector Good Slower Smaller o v az GEES CE EMO CIT 34 a a a P Aequi 0 0 01 27 elapsed 1 15 00 romairing G F canerstemagabach I r i oa Cee Output Path a No DED 2j Akernate Path xi sak Frith ome St ONEI O5 04 598M Ny are Sto 09 0206 05 05 494M I Noe Tene 0 00 50 Name Large T Log Record 7 Path C Documents and Setungs Case 8724 My Documents i arge EOL Double Click Gum Acquiring 0 1 15 00 QD soan Cx JI To cancel an acquisition while it is running 1 At the bottom right corner of the main window double click the Thread Status Line The Thread Status message box appears 2 Click Yes The Acquisition Results dialog appears displaying cancelled status 3 Click Ok The acquisition is cancelled You can restart it at a later time 214 EnCase Forensic Version 6 11 User s Guide Acquiring a Local Drive Before you begin The local drive to be acquired was added to the case 1 To protect the local machine from changing while its content is being acquired use a write blocker see Using a Write Blocker then verify that the device being acquired is shown in the Tree pane or the Table pane as write protected see Live Device and FastBloc Indicators 2 Perform the acquisition see S
339. iters 8 Conditions 72 Display 2 Queries Text 4 Text Frame aam axa l Color c amp amp f 1 Iz Selected Files Only F Defauit B Default F Default B Defauk G2 fS File Extension F Default B Default F Default B Defauk 3 Y Deleted Fies F Default B Default F Default B Defauk SSS 24 Navigating the EnCase Interface 137 Deleting a Filter You can remove a filter from the Display list by selecting it right clicking it and then clicking Delete from the drop down menu As a safeguard a dialog displays Click Yes to complete the deletion The Table pane display automatically updates to reflect the change The filter condition or query is not deleted from the Filters Conditions or Queries tab from which it was executed Importing Filters Filters others create can be imported into your collection and used To import a filler someone else has written 1 Right click in the Filter pane 2 Select Import 3 Navigate to or enter the path where the filter is located and click OK Exporting Filters Send your filters in a text file to others NES x v Export Tree far Import fields E Name v XML Formatted EJ Filter F Only Checked Rows E In Report Start 1 Stop 17 Active Rows 17 Output File export xml l 138 EnCase Forensic Version 6 11 User s Guide To export a filter from your collection 1 Right click in the Filter pane 2 Select Export Note Select
340. ith the selected text style applied 5 Click OK The text is bookmarked and the dialog closes Viewing Unicode Files By default EnCase displays characters in ANSI 8 bit format on the Text and Hex tabs in Courier New font Viewing Unicode files properly requires modifications to both the formatting and the font First the file or document must be identified as Unicode This is not always straightforward Text files txt containing Unicode begin with a Unicode hex signature xFF xFE Word processor documents written in Unicode however are not so easy to identify Typically word processor applications have signatures specific to the document making identification of the file as Unicode more difficult 000 ypT h i s iS a unicode document written using notepad in phain text before 000 This is a unicode document written usin A RTL 120 080 g notepad in plain text after LA RTL FTP HE Unicode A Unicode 40 Select LA Unicode 60 LA Unicode 80 LA Unicode 100 LA Unicode 120 LA Unicode FTP HA Text Style LA Unicode Text HA Unicode Text L A Non Unicode Figure 32 To view Unicode files do the following 1 Click Text Styles The Text Styles tab appears in the Filter pane Notice the default characters between the ASCII characters The second eight bits of the 16 bit Unicode encoding cannot be translated 2 Click the desired Unicode based text style The text displayed in the Text
341. ither tab select the text right click and select Copy Goto Use Goto to specify where to move the cursor in the View pane To skip to a location 1 Right click in the View pane 2 Select Goto 3 Enter the file offset in the other field and click OK Goto can also interpret selected text using Little Endian or Big Endian To interpret selected text 1 Highlight text in the View pane 2 Right click the View pane and choose Goto 3 Click Little Endian to see the representation in Little Endian 4 Click Big Endian to see the representation in Big Endian Navigating the EnCase Interface 149 Find Find works in most tabs of the View pane Use it to locate strings within data To find a string 1 Display Text view 2 Right click the View pane x Expression EZ Search J Case Sensitive C all Files I arp Whole Document Results in Output window C From Cursor C Current Selection Cancel Click Find Enter a string in the Expression field To use a GREP expression check the GREP option Select either Whole Document From Cursor or Current Selection Select Case Sensitive if desired Choose whether to have results appear in output pane Click OK oN 9 p Oo The system finds the expression you entered CHAPTER 6 Case Management Overview of Case Structure 151 Case Related Features 157 New Case Wizard 166 Using a Case 169 Open a Case 175 Saving a Case176
342. ition 4 Pay particular attention to the disposition of the file a Use the New Image File controls on the After Acquisition page 234 EnCase Forensic Version 6 11 User s Guide b Click Quick Reacquisition on the Options page of the Wizard The evidence file is reacquired Adding Raw Evidence Files Reacquiring a raw evidence file embeds the file containing the image of the contents of a device with case metadata and optionally the hash value of that image Before you begin B You have a raw image file that can be accessed by the forensic machine m A case is open 3 Fie BS J tew J Qpen tri kd e Cubs Save As F sme Cu shit s d on Printer Setup Se Add Devic Add Raw Image OF te AF Q C Documents and Settings david Jocke TS1My Documents Case 6 1 C Documents and Settingsidavid locke TS My Documents Case S t2 amp C Documents and Settings david locke TS My DocumenisiCase 3 Cuts 2 C Documents and Settings david Joche TS My Documents Case 9 cue 4 C Documents and Settings david locke TS My Documents Case 2 Cuts C Documents and Settings david locke TS1My Documents Case 1 ule To acquire a raw evidence file 1 Inthe Tree pane click Cases gt Entries gt Home The Entries tree appears in the Tree pane 2 Click File gt Add Raw Image The Add Raw Image dialog appears 3 Drag and drop the raw images to be acquired The raw images to be added are listed in the Component Files list 4 Accep
343. its tab display Mounting Compound Files 1 Select the compound files to be mounted 2 Select any desired additional options such as O MakeLEF O Mount Persistent O Search and O Find Files 3 Click OK Index Case File indexing is part of the improved search engine The index is a list of words in the evidence file with pointers to their occurrence in evidence Because the index is smaller than the original evidence file it is optimized for quick searching To learn more about case indexing see the Analyzing and Searching see Analyzing and Searching Files on page 327 sections 498 Scan Local Machine EnCase Forensic Version 6 11 User s Guide Scan Local Machine is an EnScript program used to run modules against a local machine 1 Double click Scan Local Machine It uses many of the same modules available in Case Processor 2 Complete the options as desired and click Finish Depending on the modules chosen additional dialogs may appear open Complete them as necessary Bookmark Folder Name ScanLocalMachine Folder Comment Test the File Finder Module IV Snapshot Data J Detect Spoofed MAC Hash Processes Get Hidden Processes Mark Logged On Users Get DLLs Search File Slack Export Path C Program Files EnCase6 Export m Compound File Mount options Don t Mount Fast C Mount Detect Extension Slow C Mount Detect Signature Slowest OOOO 04 Modules Double C
344. ivate Key File Enter Mail Certificate Path Password 4 Select the Enter Mail Certificate tab The only allowed certificate format is PFX Analyzing and Searching Files 397 5 Enter the path to the PFX certificate and the password then click OK Enter Items The PFX cert is decrypted and stored in Secure Storage 398 EnCase Forensic Version 6 11 User s Guide S MIME decryption and signature verification happens in background Given the proper password the certificate is stored in Secure Storage under E Mail Certificates folder After you import the required certificates into Secure Storage you can parse the email container files using the View File Structure feature in the Entry View S MIME contents are displayed like this prior to decryption B8 EnCase Enterprise Training lal xli File Edit View Tools Help iNew 2g Open led Save print Add Device Q Search 3 Logon d Refresh X Delete enses x E rabie Report 7i code f Devices Ef secure storage o Name Encrypted Type l SubType Id hd CJ 1 83 Eel Certificates S Mime Certificates 74953150 2086943385 7562812 2224302 Br ap eee E Mail Certificates S Mme Certificates H 1 1 3774953150 2086943385 756 B EMail Certificates I rc c m NR RN ER CR c w amp lHex LajDoc Transcript E picture
345. ive Acquisition Using LinEn 51 Doing a Typical Acquisition 194 Dynamic Disk 223 E Edit Bookmark Folder Dialogs 422 Edit Datamarks Dialog 421 Edit Folder Dialog 423 Edit Folder Information Structure Bookmarks Dialog 419 Edit Highlighted Data Bookmarks Dialog 418 Edit Log Record Bookmarks Dialog 421 Edit Menu 63 Edit Notable File Bookmarks Dialog 420 Edit Note Bookmarks Dialog 419 Edit SAFE Dialog 162 Edit Snapshot Bookmarks Dialog 420 Editing a Bookmark 415 416 Editing a Filter 131 Editing a Package 503 Editing a Signature 328 Editing Conditions 141 EFS Files and Logical Evidence LO1 Files 393 Email Report 441 Enabling or Disabling Entries in the Report 438 448 Enabling the Forensic Administrator Role on the CREDANT Server 389 EnCase Evidence Files 178 EnCase Examiner Support for Microsoft Vista 19 EnCase Forensic 520 Encode Preview 358 Encrypted Block 319 Encryption 520 Encryption Support 375 EnScript Analysis 473 474 EnScript Debugger 493 EnScript Example Code 492 EnScript File Mounter 496 EnScript Help 498 EnScript Programming Language 333 EnScript Programs Shortcut Submenu 510 EnScript Tab 38 Guidance Software EnScript Types 334 498 EnScript amp Language 520 Entering Non English Content without Using Non English Keyboard Mapping 462 Enterprise EnScript Programs 180 475 Error Handlin
346. ject was acquired and is stored on the storage drive Connect the storage drive to investigator s machine Add the EnCase evidence file using the Sessions Sources page of the Add Device Wizard see Completing the Sessions Sources Page Acquiring a Disk Running in Direct ATA Mode If the Linux distribution supports the ATA mode you will see a Mode option The mode must be set before the disk is acquired An ATA disk can be acquired via the drive to drive method The ATA mode is useful for cases when the evidence drive has a Host Protected Area HPA or drive control overlay DCO Only Direct ATA Mode can review and acquire these areas LinEn is been configured as described in Linen Setup and autofs is disabled cleared Linux is running in Direct ATA Mode If the FAT32 storage partition to be acquired has not been mounted mount it 2 Navigate to the folder where LinEn resides and type 1inen in the console The LinEn Main Screen appears 220 EnCase Forensic Version 6 11 User s Guide 3 Select Mode then select Direct ATA Mode You can now acquire the disk running in ATA mode 4 Continue the drive to drive acquisition with Step 3 of Doing a Drive toDrive Acquisition Using LinEn Acquiring a Palm Pilot Before you begin The Palm Pilot is not yet added to the case B The examination machine is booted into Windows B Your EnCase application is running 1 Putthe Palm Pilot or Handsprings PDA in its cradle and attach the
347. k OK when the search complete dialog appears Click Records sear hE 03 Status Completed Console Start 06 27 2007 12 35 19 PM Stop 06 27 2007 12 35 36 PM Note Time 0 00 17 Files 13 685 Log Record Cancel A closed tree view of all located mailboxes appears Selecting a file displays one mail file s contents in the Text Hex Transcript and Report tabs of the Report tab In addition the email file and its attachments are listed in the Table pane Open the high level tree to see the mailbox s contents Email contained in the mailbox is visible in the Tree pane and both email and attachments are visible in the Report pane An envelope and paperclip icon indicates mail containing attachments Analyzing and Searching Files 373 After you finish you can view and interact with attachment see Viewing Attachments on page 374 files Searching Selected Items If you choose to search selected items the items must be selected in both the Records and Entries tabs 1 Blue check selected items in the Entries and Records tabs TL Bookmarks Q Search Hits 3Records 4 gt e File Extents Permissions T1Referen4 gt HOM Entries lie Ba 9M Single Files Se 2 0000000 00000 nn 2007 hwp Homa Compound Volume A Entries M Bookmarks Q Search Hits 58 Additional Fields Sog of Records Om LDR 3 Single Files 2 In theSearch dialog under Keyword Search Options click Search entries and
348. k Windows File Archive X 92 EnCase Forensic Version 6 11 User s Guide Sorting a Table You can sort up to five columns of a table in the Table pane You can do this in two ways 8 Double clicking on the column header B Using the Sort command on the table s right click menu A single red triangle appears in the column header when sorting a single column and to indicate the primary sort when you sort by more than one column To sort by multiple columns after the primary sort press the shift key while double clicking the desired additional column headers Two red triangles appear in the header of the second column sorted Three red triangles appear for the third column sorted with four in the fourth and five in the fifth Figure 15 A table with five sorted columns where the columns are sorted in the following order File Type File Category Signature Description and Last Accessed aed n aan nas t Descrigtion t nm uan L3 19 rnd File Archive 04 30 07 03 18 33PM 09 10 06 11 59 3 l L01 File Archive 04 30 07 03 18 36PM_ 09 13 06 05 21 36 Folder 05 17 07 09 19 03AM 09 10 06 11 59 3 These methods work for all tables regardless of where they appear in the interface not just tables in the Table pane Navigating the EnCase Interface 93 Filters Pane The Filters pane contain the following tabs E EnScript E Filters E Conditions E Queries B Text Styles These tabs organi
349. k the Console tab in the View panel t z Text amp lHex Eo A Transcript E Picture Report Details G Output Lock Mf Codepag4 gt 10 10 06 03 07 16PM Info File Mounter Lib Mounting V6 Hunter XP Forensic Hunter XP C RECYCLER 4 10 10 06 03 07 16PM Warn File Mounter Lib Could Not Mount Df935 zip Probably Corrupted Fil l0 10 06 03 07 16PM Info File Mounter Lib Mounting V6 Hunter XP Forensic Hunter XP C WINDOUWS l0 10 06 03 07 16PM Warn File Mounter Lib Could Not Mount wuv3is ll tgz Probably Corrupted 10 10 06 03 07 17PM Info File Mounter 5 file s mounted 10 10 06 03 07 17PM Info File Mounter Script completed in 1 seconds EnScript Analysis 497 Compound Files The File Mounter EnScript program lets you mount all selected compound file types leaving them mounted at the conclusion of the EnScript program investigation Its main purpose is to let you catalog the contents of targeted compound files This is a listing of items within the compound file not the actual contents themselves The EnScript program finds targeted files based on the Find Files By and Selected Files options It then catalogs the file contents into a LogRecordClass bookmark and adds them to the LEF if you select that option The program then performs a preliminary keyword search that stops after a single hit After a hit the file is placed into a list of files that are then mounted and completely searched Results appear in the Search H
350. l Write block USB Firewire SCSI drive 156 EnCase Forensic Version 6 11 User s Guide A tabbed dialog appears The tabs are E Case Options when a case is open m Global B NAS Colors B Fonts B EnScripte B Storage Paths B Enterprise Case Management 157 Note All fields on the Case Options tab are mandatory The Case Options fields in the illustration show the default values m Name holds the case name B Examiner Name is the investigator s name Default Export Folder is the location to which exported data are sent Temporary Folder is the location to which temporary data are sent B Index Folder is the location of case indices Case Related Features Cases use these processes B Logon wizard E New Case wizard 8 Options dialog B Case Time Setting dialog 158 EnCase Forensic Version 6 11 User s Guide Logon Wizard The Logon wizard captures the user name password and SAFE to use for the current session The user and password are established by the administrator or those granted administrator level permissions The Logon wizard displays the following pages E Users page B SAFE page Jane Doe John Doe keymaster SA saFEs 3 Doc SAFE 3 RD SAFE 3 RD1 SAFE Case Management 159 Logon Wizard Users Page The Users page of the Login wizard captures the current user s password and user name Logon 0X Password 1 User 5 98 Users 89 Jane Doe
351. l content in the note Increase text indent sets the text indent of all of text blocks Edit Folder Information Structure Bookmarks Dialog Use this dialog to edit folder information structure bookmarks Edit Folder Information x V Include Device Information Columns 3 Cancel Bookmarking Items 427 Check Include Device Information to show folder structure in the bookmark Columns determines the number of columns of folder structure to show in the bookmark Edit Notable File Bookmarks Dialog Use this dialog to edit notable file bookmarks Edit Notable File x Comment Cancel Comment can contain up to 1000 characters Edit Snapshot Bookmarks Dialog Use this dialog to edit snapshot bookmarks Edit Snapshots XI Comment Snapshot Cancel Name is the name of the snapshot bookmark An EnScript program supplied this name value when the bookmark was originally created Editing lets you provide a more meaningful name Comment contains text describing the bookmarked content An EnScript program supplied this text when the bookmark was originally created Editing lets you provide more meaningful comments 428 EnCase Forensic Version 6 11 User s Guide Edit Log Record Bookmarks Dialog Use this dialog to edit log record bookmarks x Name Comment Name is the name of the log record bookmark The EnCase application supplied this name when the bookmark was originally created Editing
352. l files within the folder appear only on the entries table 182 EnCase Forensic Version 6 11 User s Guide Supported File Systems and Operating Systems What s new in this release B Support for the Novell File System B UFS2 File System m Mac DMG image files m Updated NTFS Parser GUID partition tables as implemented according to the Intel Extensible Firmware Interface EFI are also supported Support for the DOS EN EXE utility was dropped so you should now do drive to drive and crossover cable acquisitions using the LinEn utility Using Snapshots Snapshots collect a variety of information to create snapshot bookmarks Snapshots are the output of EnScript programs In EnCase Forensic only the Scan Local Machine EnScript program creates snapshots In EnCase Enterprise the following EnScript programs create snapshots B Sweep Enterprise B Quick Snapshot The Sweep Enterprise EnScript program captures live information from a selected network tree without a case or Enterprise logon needed before running The Quick Snapshot EnScript program captures live information from a selected machine associated with a device in an open case For more information on these EnScript programs see Enterprise EnScript Programs on page 481 Working with Evidence 183 Getting Ready to Acquire the Content of a Device Before you can acquire the contents of a device you must add the device and preview the device s content To ad
353. l memory before shutting down a computer As always it is recommended that examiners document and explain their procedures for later reference Working with Evidence 271 Running WinEn To run WinEn open a command prompt on the target computer The user logged on must have local administrator privileges on the computer and you must start the command prompt with that privilege level Once you open a command prompt run WinEn using the syntax below It is recommended that you compress the evidence file that is created and save it to removable media so that no additional changes are made to the target computer There are three ways to supply necessary information to WinEn when running from the command line E Command line options E Configuration file B Prompt for value 272 EnCase Forensic Version 6 11 User s Guide Command Line Options Syntax winen option option p lt EvidencePath gt Path and file name of the evidence file to be created maximum 32768 characters d lt Compress gt Level of compression 0 none 1 fast 2 best e lt Examiner gt Examiner s name maximum 64 characters m lt EvidenceName gt Name of the evidence within the evidence file maximum 50 characters c lt CaseNumber gt Case number related to the evidence maximum 64 characters r lt EvidenceNumber gt s lt MaxFileSize gt Evidence number maximum 64 characters Maximum file size
354. ld Not Compile 4c8b p a sN P UA ES4JAapwALIO OV U 4 4KDp i G p 34F 1 4D y6 A NUEXDO96 M p Cy oe 8uOfiV ie amp 6 O CD J amp IILNC 18m amp y8Z Z TYp HE TempData 561ncq QLEstilyo X 610 O ceZi7UX 2 j O oUAErE 8VOZEX lt 1 F aN wd 6 OsecD 96 SIFF YbA E Uc LI2 c NO Q cY Y CE o R ay m yc I t Complete Diagnostic 5fa gt cQ 22_AfQm B6 4 p 1 S6 7 MERE od l WN04 O3CE CE x Li Ligc CiiPa oi f Ups JEHAUxz Yi qfaX w y H 8v y MAQ _60j I g CredantEncryption 693R S4ljt z ECE f ctl yCD Zi x amp R SK 9sI Yo yiy c ADDI 8EU I 6 vdE O U3Sp0 g Die p ja amp AEoT Z g Q i p 36 Oqg kc Svipu F Xo n Decoding Test 72e8ur9XO 8EQ zu DA R 4n5 U8 V V zd N 7 48 DQOA Oa DiZ dii ceAS 638 YSAZB APO Br CEwfipvDxD BOYVY A T gt tg DiskEncryption TcSp pi amp ossp GABZSuil D348 amp ZET w ECT1CER CE Jfiy ExO PWE 4p t Cvj O Y B A OC1xU OS6 pB Ch amp E H g EDS DA Hos O SJItiOxRW t X I2 12107 OG W6 8EmiTGAS U4fr uA 006 Gi Ge Zu6Ss Y mPZh K M H N KE y 4F 7 Email 8f7 i2 iNI SM 6 8 6 HAYGUSH tE60 7 H Ne amp I C1 preso L W O n f4 t 8 o K 8N S 9CPbX2Ie22 78 6ol 4 ZM Q350l 8Sc O AF Zot g FileTest 990459 OK i V 07 040 GxAOD UY gt G EL R SOLEATI YNO U608 E C O C OE H 9 N I B
355. le pane Gallery Tab The Gallery tab provides a quick and easy way to view images stored on the subject media This includes all images purposely stored as well as those inadvertently downloaded from the Web You can access all images within a highlighted folder highlighted volume or the entire case If a folder is highlighted in the Tree pane all files in the folder are displayed in the Table pane Clicking a folder s Set Include selects all files in that folder and files in any of its subfolders Once selected on the Table pane any images in the selected files display in Gallery tab You can bookmark images in the Gallery tab and display them in the report The Gallery tab displays files based on their file extension by default For example if a jpg file has been renamed to dll it WILL NOT be displayed in the Gallery tab until you run a Signature Analysis on page 327 Once the signature analysis recognizes that the file was renamed and that the file is actually an image it is displayed in the Gallery tab EnCase applications include built in crash protection which prevents corrupted graphic images from appearing in the Gallery or Picture tab The corrupt images are stored in cache so that they are recognized the next time they are accessed No attempt is made to display them These images are cached at the case level so they do not attempt to display in that case file again until you run a signature analysis You can clear the cach
356. lect File gt Save As Save As _2 x Save in O Evidence gt Q2 rri My Recent Documents E Desktop 2 My Documents Wr e Big Case Case Bonnie and Clyde Case Class1 Case Fiske Case Case V5 Test Case Case V6 Hunter XP Forensic Case My Computer e My Network File name vs Test Case Case Places Save as type Version 5 Case File Case Cancel ersion 5 Case File Case Backu Case File cbak Expand the Save as type field and make a selection O Case File saves the file as version 6 O Version 5 Case File saves the file as version 5 O Backup Case File saves the file as a version 6 backup file Case Management 155 Case Backup By default a backup copy of the case file is saved every 10 minutes By default backup files cbak are saved to C Program Files EnCase Backup With the exception of the extension this file has the same name as the parent file To change the default save time 1 Select Tools Options Global 2 Change the number in the Auto Save text field Selecting 0 disables the auto save function This is not recommended The Options Dialog The Options menu allows you to customize the software To access the menu select Cases Options from the toolbar Tools Help Q Search 3 Logon Wipe Drive Verify Evidence Files J Create Boot Disk eq Mount as Network Share Client Write block IDE channe
357. lected The figure below shows each column header In order to fit them into the document they are stacked In the EnCase Table pane you scroll horizontally across the pane to see them You can drag and drop columns to arrange them according to your needs Each is described below Navigating the EnCase Interface 103 Name is the name of the entry Icons to the left of the filename indicate the type of entry such as device folder or document Filter displays the name of the saved filter options if the files meet the criteria set In Report indicates whether or not the item appears in the report To include the file in a report right click the In Report column and select In Report or select the entry and press Ctrl R To include more than one entry in the report select each one in the first column checkbox then right click the In Report header and select In Report File Ext displays a file s extension such as exe jpg or doc File Type names the file type The software generates this information from the File Types table using the file s extension When you run a Signature Analysis this information is generated from the file s identifying header information inside the file File Category classifies the entry as Windows database picture etc Signature identifies the file by header not file extension See Analyzing and Searching Files for more information on using file signatures Description gi
358. led Excluding You can exclude any number of bookmarks from the Tree and the Table pane display using the Exclude Bookmarks feature Exclude File Bookmarks In Bookmarks view the Tree pane displays the bookmark folders you have created for an open case You can prevent individual bookmark files from being displayed in the Table pane using the Exclude Bookmarks feature Before running this option bookmarks must have been created in the open case Exclude an entire folder of bookmarks as follows 1 Open the bookmarks folder to view its contents 2 Select blue click or highlight a file The illustration below shows a graphic file checked i E able Report E Gallery Timeline f Disk 3 Code oranda Booka Salad TTE poemat M1 H File Group 16 896 33 Jay s Bookmarks Pip NoName E Highlighted Data 17 592 34 Jay s Bookmarks Pip NoName Lj 3 H File Group 946 176 1 848 Jay s Bookmarks Pip NoName IC 4 Highlighted Data 932 387 1 821 Jay s Bookmarks Pip NoName EE 1 File Group 98 816 193 Jay s Bookmarks Pip NoName L416 4 File Group 127 488 249 Jay s Bookmarks Pip NoName oA 1 File Group 946 176 1 848 Jay s Bookmarks Pip NoName Os H File Group 92 160 180 Jay s Bookmarks Pip ANoName J 9 8 File Group 130 048 254 Jay s Bookmarks Pip NoName Lj 10 1 File Group 98 816 193 Jay s Bookmarks Pip NoName O 11 Highlighted Data 17 154 33 Jay s Bookmarks Pip No
359. les before searching Lotus NSF Search only slack area of fies in Hash Library Iv aor E l F Meox I Compute hash value Additional Options TT Recompte hash values v Verify file signatures Identify codepages Search for internet history 2 In the Hash Options area check Compute Hash Values 3 Select files to be included in the hash set 4 Right click the Table pane and select Create Hash Set from the menu The Create Hash Set dialog appears x Name 10 BMBs Category Selected Graphics Cancel 5 Enter a set Name and Category and click OK A hash set is created Note While the Category entry can be anything the two industry standards are Known and Notable with the latter being assigned hash values that are of interest to the investigator 342 EnCase Forensic Version 6 11 User s Guide Rebuild a Hash Library To select a hash set to used in a case rebuild the library Note Only items selected on the Hash Sets tab are included in the library 1 Select View gt Hash Sets A list of hash sets appears Report iy Code Name Filter Category resor Report 3 Experimental No Known NM yj BMP Files I know about Mo Pictures 2 Select the desired hash set 3 Right click and select Rebuild Library from the menu When Rebuild completes a message indicating the number of rebuilt libraries appears Rebuild Library x e 1 2 hash se
360. lications components and processes with a limited privilege but have elevation potential for specific administrative tasks and application functions To disable UAC you must be logged on with a credential that is a member of the local administrator group 1 From the Start menu select Control Panel Internet Internet Explorer zy E mail el Windows Mail ai Welcome Center Documents Backup Status and Configuration Pictures Windows Media Player Music Small Business Resources Search E Windows Fax and Scan Recent Bene Windows Meeting Space Computer E ay Windows Photo Gallery Network Windows Live Messenger Download Connect To Windows Update Control Panel Default Programs Help and Support 42 EnCase Forensic Version 6 11 User s Guide 2 In the Control Panel Home window enter UAC in the search field The User Accounts option automatically displays under the search field Control Panel Home User Accounts Turn User Account Control UAC on or off Classic View Search Windows Help and Support for UAC Can t find it See how to improve search results User Accounts S Turn User Account Control UAC on or off Search Windows Help and Support for UAC Can t find it See how to improve search results 4 The User Account Control message displays prompting you to continue or cancel If you started this action continue Rg User Accounts Control P
361. lick For options _ LogFile Parser a G Active Directory Information Parser AOL IM Information C App Descriptor Utility C Compromise Assessment Module C Consecutive Sectors EXIF Viewer S File Finder J File Report _ Find Protected Files C HTML Carver IM Archive Parser Kazaa Log Parser J Link File Parser J Linux Initialize Case Linux SysLog Parser Selected Modules 1 teca Note Scan local machine searches the local examiner machine and does not search the evidence within the case If you want to search the evidence in the case use Case Processor Webmail Parser Use the Webmail Parser to search the case for remnants of Web based email EnScript Analysis 499 EnScript Example Code In the EnScript tree in the Filter pane the Examples folder contains example code These programs can serve as a base for additional programming The COM folder contains sample EnScript programs that use COM to provide integration with MS Windows and MS Office applications See the EnScript Program User Manual for more information The EnScript example programs include Compound File Viewer B Create Index Directory B Enterprise Using Entry Data B Enterprise Registry Operations B Enterprise Using Snapshot Data B Find Valid IPs B Index Buffer Reader Compound File Viewer parses compound files into their constituent parts for viewing Create Index Directory ge
362. lity 522 Live Device and FastBloc Indicators 181 Local Keywords 345 Locally Encrypted NSF Parsing Results 321 Log Record Bookmarks 398 Logical Evidence File 523 Logical Evidence Files 178 238 Logical Restore 254 Logon Wizard 157 Logon Wizard Users Page 158 Lotus Notes Local Database Encryption 18 Lotus Notes Local Encryption Support 317 Machine Survey Servlet Deploy 478 Maintaining the Database 257 Malware 523 Manually Create App Descriptor 373 Minimum Requirements 22 Mode Selection 54 Modifying Case Related Settings 167 Modifying the Table Pane 122 Modifying the View Pane 148 Mount Mounting 523 Mounting Compound Files 490 548 Moving a Table Entry into a Folder Using the Right Click Drag Method 425 427 Moving a Table Entry or Folder into a Folder Using the Drag Method 428 N Navigating the EnCase Interface 59 Navigating the Tree Pane 115 Network Tree 523 New Case Wizard 164 New Features 17 New File Viewer Dialog 289 New Package Dialog 499 New Technology File System NTFS 523 New Text Styles Dialog 456 New Text Styles Dialog Attributes Tab 456 New Text Styles Dialog Code Page Tab 458 Node 523 Non English Language Features 453 Notable File Bookmarks 397 523 Notes Bookmarks 397 NSF Encryption Support 376 NTFS e 523 NTFS Compressed Files 314 O Obtaining a Linux Distribution 48 Obtaining Updates
363. located Clusters In the bottom right hand corner a progress bar indicates the number of MFT records found and the approximate time required to complete the search 5 After the application locates the MFT records in the Unallocated Clusters a prompt appears showing the number of entries found Duplicate or false hits are parsed so the number of entries that appears in the prompt may be lower than reported during the recovery 6 Click OK 7 The application resolves the recovered MFT records to data on the volume and attempts to rebuild the folder structure with children files and folders under parent folders This process can take a long time however the results greatly benefit examinations of NTFS volumes Since rebuilding the folder structure can take a long time you can opt to have faster access to the recovered files If the recovered MFT entries in the unallocated space are NTFS4 you can choose to E process the entries for parent child relationships or B place all recovered entries into the Recovered Files folder immediately with no folder structure This dialog box shows the number of passes required to sort the entries This number may be large but most passes process instantly The length of time required to process a given group depends only on the number of records within that group This change does not affect NTFS5 recovered entries These entries are processed quickly as before If you choose to process the entri
364. lp El App Descriptors 3b Archive Files im Cases 34 Encryption Keys 3 EnScript e EnScript Types Z Eile Signatures 1A File Types E File Viewers j Hash Sets Keywords E Machine Profiles y Packages Projects 3 SAFEs A Text Styles 2 Cases Sub Tabs d Table Pane gt view Pane p Filter Pane Rg EnScript f Filters RI Show Name E Conditions 4 Previous Tab Ctrl Shift Tab Display gt Next Tab Ctrl Tab l Queries A Text Styles C Auto Fit Reset view 76 EnCase Forensic Version 6 11 User s Guide Filter Pane Menu The Filter Pane command on the View menu displays the Filter Pane menu The Filter Pane menu contains commands corresponding to the tabs displayed in the Filter pane Clicking one of these commands displays the corresponding tab in the Filter pane A Text Styles EnScript displays the EnScript tab in the Filter pane Filters displays the Filters tab in the Filter pane Conditions displays the Conditions tab in the Filter pane Display shows active filters Queries displays the Queries tab in the Filter pane Text Styles displays the Text Styles tab in the Filter pane Auto Fit When you resize a window pane some tabs may not be viewable Va Encryption Keys EnScrip4 P X CL Bookmarks Q Search Hits i Record 4 gt Additional Fields Instead of scrolling to them you may want to use Auto Fit IE f App Descriptors Archive Files x L
365. ly written using the symbols 0 9 and A F or a f For example the decimal numeral 79 whose binary representation is 01001111 can be written as 4F in hexadecimal 4 0100 F 1111 530 EnCase Forensic Version 6 11 User s Guide Host Protected Area HPA An area of a disk designed to allow vendors to store data safe from user access diagnostics or backup tools If present data stored in this area is inaccessible by the operating system BIOS or the disk itself Index An EnCase index is a feature that allows quick access to the data in an evidence file Internet Protocol Address IP A unique number that devices use to identify and communicate with each other on a computer network utilizing the Internet Protocol standard Any participating network device including B routers B computers E time servers B printers B Internet fax machines B some telephones must have its own unique address An IP address can also be thought of as the equivalent of a street address or a phone number IPv4 specifies addresses in four eight bit decimal numbers separated by a dot IPv4 specifies a port number with a colon IPv6 addresses the limitations that IPv4 has with the total number of addresses IPv6 is typically written in eight 16 bit hexadecimal numbers which are separated by a colon IPv6 specifies a port number with a space K Keyword A keyword is a string or expression used in searching your evidence L
366. m For information on automatically creating an app descriptor See Create App Descriptors with an EnScript Program see Create an App Descriptor with an EnScript Program on page 379 380 EnCase Forensic Version 6 11 User s Guide Create an App Descriptor with an EnScript Program The scripts for creating app descriptors are Scan Local Machine and Case Processor 1 Run an EnScript program such as Scan Local Machine An options wizard appears Bookmark Folder Name 852 Folder Comment Snapshot Data J Detect Spoofed MAC v Hash Processes Get Hidden Processes Mark Logged On Users J Get DLLs Search File Slack Export Path C Program Files EnCase6 Export ES Compound File Mount options Don t Mount Fast C Mount Detect Extension Slow C Mount Detect Signature Slowest OOOO 04 Modules Double Click For options C LogFile Parser C Active Directory Information Parser C AOL IM Information S App Descriptor Utility C Compromise Assessment Module C Consecutive Sectors J EXIF Viewer C File Finder C File Report C Find Protected Files J HTML Carver C IM Archive Parser C Kazaa Log Parser C Link File Parser J Linux Initialize Case J Linux SysLog Parser Selected Modules 1 teen 2 Complete the fields Bookmark Folder Name is the name of the folder in the bookmark area Li O Folder Comment is an optional field for entering you
367. menus display commands for tabs contained by parent tabs When a tab contains other tabs it has a View command that displays a sub tab menu The sub tab menu contains commands that display each of the contained tabs View Ej App Descriptors 4b Archive Files amp Cases By Encryption Keys g EnScript S EnScript Types Z File Signatures 1A File Types z IE Cases a Encryption Keys File viewers J Home ie Entries Q Search Hits 3Records f Devices P Secure Storage Keywords Hash Sets Keywords Machine Profiles Packages Projects SAFEs Text Styles Memes 5ub Tabs DE lt a amp ty i3 Home gt D Entries Table Pane LT Bookmarks View Pane q Search Hits Filter Pane x53 Records E Devices X Close Tab Ctri F4 A Secure Storage BI Show Name Keywords 4 Previous Tab Ctrl Shift Tab as gt Next Tab Ctrl Tab Auto Fit Reset view When a tab contains only one other tab selecting the containing tab is equivalent to selecting the contained tab For example selecting Cases Sub Tabs gt Bookmarks is equivalent to selecting Cases Sub Tabs gt Bookmarks Sub Tabs gt Home The commands in the Sub Tab menus open their corresponding tab or display a corresponding Sub Tab menu Navigating the EnCase Interface The Table Pane and its Tab Bar and View Menu
368. minister v The forums allow registered users to post questions exchange information and hold discussions with Guidance Software and other users in the EnCase community Different discussion groups are available as follows Foreign Language Groups B French B Arabic B German B Spanish B Japanese B Chinese E Korean Forum Groups E User Group B Consultant and Practitioners Computer Forensic Hardware Issues B EnScript Forum Product Specific Groups only available to customers who have purchased the respective products B Neutrino B Enterprise B FIM E eDiscovery Enter a Group by clicking on the Group name EnCase User s Grou r Exchange information and tips with other EnCase users Guidance Software 541 Posting to a Group To create a new post click the IP New Thread icon Click the Ws Post RED icon to reply to a post or use the Quick Reply icon at the bottom of each post ua 713 Searching The forums contain an accumulation of over ten years of information Use the Ed button to search for keywords or click Advanced Search for more specific search options Seach Show Threads Show Posts Advanced Search Bug Tracker Use Bug Tracker to submit and check the status and priority of submitted defect and enhancement requests It is broken down by product showing the current number of bugs enhancements and public bugs for each product To access the Bug Tracker click on the
369. mmands that access information and perform tasks associated with using your EnCase application Using the Help menu you can B display the readme help file E register your application E find out about your application B get information about your license B learn what modules are installed and other information Help G K Help F1 EnScript Help What s New Register EnCase About EnCase Navigating the EnCase Interface 79 What s New displays the EnCase Release Notes as a help file Register EnCase displays the application registration page where you can m Find your dongle serial number If connected to the Internet register your application B If not connected to the internet find instructions on how to register your application About EnCase tells you which version of EnCase and which modules you have installed 80 EnCase Forensic Version 6 11 User s Guide Toolbar The toolbar provides icons for the most frequently used EnCase program functionality The toolbar displays on the main window It contains icons for performing the most frequent tasks in the current application mode or context When EnCase opens in acquisition mode only the New Open Print and Refresh icons appear in the toolbar Once a case is opened the Add Device icon appears When the application is an enterprise application the Logon icon appears and once logged on the Logoff icon displays Figure 5 The Main Window To
370. mp Servlet Management 12 Select an output option O Bookmarks Outputs results to bookmarks in the current case O Excel Outputs results in an Excel file If you select this option browse to or enter an output folder 13 Click OK The program will optionally create a bookmark folder called Machine Survey Run With an incrementing integer The program will also optionally create an Excel spreadsheet called MachineSurvey xls in the folder specified above 488 EnCase Forensic Version 6 11 User s Guide Quick Snapshot Use Quick Snapshot to quickly take a snapshot of a machine currently being investigated Quick Snapshot does not offer a deep options set so if you want scheduling options or the ability to run EnScript program modules while taking a snapshot use the Sweep Enterprise program Before you run Quick Snapshot E Open EnCase and log on E Create a case E Add a device to the case To create a quick snapshot 1 Double click the Quick Snapshot EnScript Program 2 Note the machine in the IP List and select an Available SAFE and Role 3 Click OK Note the IP list displays the machine to be investigated using Quick Snapshot This list is for information purposes only and you cannot add additional nodes Quick Snapshot x IP List Available SAFEs 10 0 36 21 B SAFEs L Doc SAFE Roles bs Roles amp All Access No search L S Access Subnet 4 Snapshots will be placed in Qui
371. mus ertet ae Ea e eea E E n E e E aedi 430 Contents Using a Folder to Organize a Bookmarks Report sss 431 Organizing Bookmarks eee eben ere nere eb SH evite eo ea ee eret ron dieere nene 432 Copying a Table Entry into a Folders triosi eene nennen 433 Moving a Table Entry into a Folder Using the Right Click Drag Method 434 Moving a Table Entry or Folder into a Folder Using the Drag Method sss 435 Bookmark Reports and Reporting ccccesesescssessseseeseseeensesesesesesnensnesesescscececeeesenenesesesesnsneneneneassesees 435 Viewing a Bookmark on the Table Report Tab ssssssssssseeeeeeene eene 436 Customizing a Report etse eet dte ei epe Erg n ATEA o IE RERE eie 437 Excluding BOOKMARKS asics eh aoo em tem m Eo er ete P e A ser ER Ert dene 438 Exclude File Bookmarks eet tente e meteor ite ere ert ete ed 438 ExcludeEold6E eed ien oom i ep d ad ap dp ere eade e Eres detti 439 SHOW EX CHIC edt Re e ede fte ades au iiti mte re tut 441 CHAPTER 11 Reporting 443 Reporting ts 444 Creating a Report Using the Report Tab ccccesesessssssesesseseeessnsnenesessscececeeeenssesesesesnenenenesesseseeeseeeneneies 444 Enabling or Disabling Entries in the Report sse eee 445 Report Simgle Piles cot ced eee treu ple een ib dio avis deem reote t dre ded 445 Report Multiple Piles ix endete tente eigo amb ten en gelo s
372. must be defined as such IPAddress1 IPAddress2 O IPAddress2 must be greater than IPAddress1 that is IPAddress1 is the lowest IP Address in the range and IPAddress2 is the highest IP Address 2 Once you specify which nodes to scan for snapshots you must specify which database to use 264 EnCase Forensic Version 6 11 User s Guide 3 Click Next The Snapshot Data Source Options dialog opens Snapshot Data Source Options Data Source Name SnapshotToDB Enter User Name Not Needed If Using NT Authentication sa Enter Password Not Needed If Using NT Authentication DB Timeout Interval minutes 5 Show Queries in Console Data Source Name This is the name you gave the ODBC connection when you created it Enter User Name Not Needed If Using NT Authentication Specify a user name If you set up the ODBC connection to use NT Authentication it remembers your user name so you do not need to enter it manually Enter Password Not Needed If using NT Authentication Like your user name you must specify a password to gain access to the database If you set up the ODBC connection to use NT Authentication it remembers your password so you do not need to enter it manually DB Timeout Interval minutes Specify how long you want to wait before a DB timeout occurs This indicates how long the program waits before assuming the connection is bad the default is 5 minutes Show Queries in Console Ch
373. n Linux or the FastBloc SE module EnCase applications running in Windows with a hardware write blocker will not detect DCOs or HPAs The application now shows if a DCO area exists in addition to the HPA area on a target drive FastBloc SE is a separately purchased component HPA is a special area located at the end of a disk It is usually configured so the casual observer cannot see it and can only be accessed by reconfiguring the disk HPA and DCO are extremely similar the difference is the SET MAX ADDRESS bit setting that allows recovery of a removed HPA at reboot When supported EnCase applications see both areas if they coexist on a hard drive For more information see the EnCase Modules Manual Acquiring a Disk Running in Direct ATA Mode If the Linux distribution supports ATA mode you will see a Mode option The mode must be set before the disk is acquired An ATA disk can be acquired via the drive to drive method The ATA mode is useful for cases when the evidence drive has a host protected area HPA or drive control overlay DCO Only Direct ATA Mode can review and acquire these areas LinEn is configured as described in LinEn Setup and autofs is disabled unchecked Linux is running in Direct ATA Mode To acquire a disk running in Direct ATA Mode 1 Ifthe FAT32 storage partition to be acquired has not been mounted mount the FAT32 storage partition 2 Navigate to the folder where LinEn resides and type linen in the con
374. n 6 11 User s Guide Unicode select if you are searching a Unicode encoded file Unicode uses 16 bits to represent each character Unicode on Intel based PCs is referred to as Little Endian The Unicode option searches the keywords that appear in Unicode format only For more details on Unicode see http www unicode org Note The Unicode standard attempts to provide a unique encoding number for every character regardless of platform computer program or language Big Endian Unicode select if you are investigating a Big Endian Unicode operating system such as a Motorola based Macintosh Big Endian Unicode uses the non Intel data formatting scheme Big Endian operating systems address data by the most significant numbers first UTF 8 meets the requirements of byte oriented and ASCII based systems UTF 8 is defined by the Unicode Standard Each character is represented in UTF 8 as a sequence of up to four bytes where the first byte indicates the number of bytes to follow in a multi byte sequence Note UTF 8 is commonly used in Internet and Web transmission UTF 7 encodes the full BMP repertoire using only octets with the high order bit clear 7 bit US ASCII values US ASCII It is deemed a mail safe encoding Note UTF 7 is mostly obsolete and is used when searching older Internet content Creating International Keywords Analyzing and Searching Files 347 You can search international keywords of non English character s
375. n as a flat file from sector 0 to the last sector Files folders and any other file system architectural structure is lost 192 EnCase Forensic Version 6 11 User s Guide Preview Devices Page of the Add Device Wizard This page displays a list of the devices eligible to add x Write Read Name Label Access Sectors Size Blocked File System TEN HL DT ST ASPI 854 1 7MB lt Back Cancel Table Pane lists the devices that are added by clicking Next Table Entry Rows display the details of the device defined in that row The right click menu for each row provides commands that B Toggle the Read File System setting for the entry where you opened the right click menu B Copy the entry m Edit the entry including the Read File System value The best means to select or enable the Read File System is via this edit command Read File System Column when deselected the file system is read in as a flat file from sector 0 to the last sector Files folders and any other file system architectural structure is lost Working with Evidence 193 Adding a Device The devices added using the Add Device wizard determine the type of acquisition to be performed The primary determiner is the device type set on the Sources Page of the Add Device wizard The process for adding a device varies once the device type is selected Open a case where you want to add devices When a case is open the Add Device
376. n understanding of object oriented programming are helpful for coding in EnScript Note For more detailed information on the EnScript programs included with the EnCase application refer to the EnCase Programs User Manual Note For additional help in programming with the EnScript language you can attend a training class or visit the EnScript message board EnScript Analysis 481 Enterprise EnScript Programs Enterprise EnScript programs contain programs typically used with enterprise cases Many of these programs require a SAFE to be set up to properly use them The available Enterprise Enscript Programs are Document Incident used to generate a report containing the details of an incident that required investigation Machine Survey Servlet Deploy used to manage deploy remove and install SAFEs and servlets to machines on the network Quick Snapshot used to quickly take a snapshot of a machine that is currently being investigated Remote Acquisition Monitor used to monitor remote acquisitions between the servlets and a network storage device Snapshot Differential Report used to report on differences of snapshots take over a period of time Sweep Enterprise used to conduct thorough examinations on computers specified from the network tree To view Enterprise EnScript programs 1 Inthe Filter pane click EnScript to display the EnScript panel 2 Open the Enterprise folder from the EnScript tree to see available s
377. nCase Forensic Version 6 11 User s Guide Sources Page Use the Sources Page of the Create Logical Evidence File Wizard to specify source files that will comprise the logical evidence file being created Create Logical Evidence File x Target folder within Evidence File JV Include contents of files v Hash Files v Include contents of folder files JV Add to existing evidence File Lock file when completed Evidence File Path s Cancel Source is the name of the parent device containing the file or files to include in the logical evidence file Files contains the number of files and the total size of the file or files to include in the logical evidence file Target folder within Evidence File is the name of the folder containing the files that comprise the logical evidence file Include contents of files if disabled only the filename is known to the logical evidence file and when the logical evidence file is opened no data displays in the View pane Hash Files determines whether the files comprising the logical evidence file are hashed as they are put into the logical evidence file Add to existing evidence file determines whether the files comprising the logical evidence file are added to an existing evidence file When this control is enabled Evidence File Path appears Lock file when completed determines whether the logical evidence file is locked after creation Working with Evidence 245 Evidence
378. ncludes the SAFEs Home SAFEs Network SAFEs Roles SAFEs Users O SAFEs Events They do not display by default Lun cu SAFEs or Cases Sub Tabs displays a sub menu associated with the tab currently displayed SAFEs or Cases In the figure above the SAFEs Sub Tabs command displays because the SAFEs tab is displayed in the Tree view not shown If Cases were displayed then the command would be Cases Sub Tabs Table Pane displays the Table Pane menu View Pane displays the View Pane menu Filter Pane displays the Filter pane menu Close Tab hides the tab currently in use Once hidden a tab can only reappear if it is opened using the tab commands on the View menu Show Name toggles the display of the name of the tab currently in use Previous Tab selects the tab to the left of the tab currently in use When the tab currently in use is the leftmost tab the rightmost tab is selected Next Tab selects the tab to the right of the tab currently in use When the tab currently in use is the rightmost tab the leftmost tab is selected Autofit toggles the wrapping of the toolbar The toolbar extends to the right beyond the tab when Autofit is not selected When Autofit is selected the toolbar wraps so that the entire toolbar displays Reset View puts any tabs appearing in windows back into the main window in their usual locations 70 EnCase Forensic Version 6 11 User s Guide The Tree Pane and its Tab and Sub Tab Menus Sub Tab
379. nd double click the desired EnScript program object The EnScript program creates the datagram as a bookmark and creates a sub tab named to match the name of the program that created it In addition an entry is output to the Output panel of the View pane Using Bookmarks You can create bookmarks on entries and records These operations are available E Creating see Creating a Bookmark see Creating a Bookmark on page 414 E Editing see Editing Bookmarks see Editing a Bookmark on page 423 B Extending by adding a note bookmark see Creating a Notes Bookmark on page 416 E Organizing into folders see Using Folders to Organize a Bookmark Report see Using a Folder to Organize a Bookmarks Report on page 431 Reports can contain bookmarks and fields containing bookmark attributes B To determine which table entries should appear in a report see Viewing a Bookmark on the Table Report Tab on page 436 B To determine which entry fields that should appear in a report see Customizing a Report on page 437 Bookmarking Items 423 Editing a Bookmark You can edit most bookmarks The particular editor displayed is determined by the type of bookmark you are editing See the individual edit dialogs for bookmark specific information The instructions in this topic apply to editing any bookmark except file group bookmarks which cannot be edited Note The contents of the Bookmarks table is driven by the object selected in the
380. nd name of the folder where temporary files are created Index Folder contains the index file for any indexed file or collection of files Add Device Once a case is open add evidence in accordance with the information in the Working with Evidence section Case Management 169 Using a Case A case is central to an investigation Before you can add a device preview content or acquire content you must open a case This may be a new case or an existing case Once you create a file you can add a device proceed with the device preview and acquisition and subsequent analysis Use the Case Options page to define a case The settings on this page are the same as those on the Case Options tab of the Options dialog Once a case is open you can establish its time zone settings Modifying Case Related Settings Use the New Case wizard Case Options dialog to modify case related settings after the case is created 1 Open the case 2 Click Tools Options The Case Options tab displays 3 Change the settings through the various tabs in the Options dialog 4 Click OK For more information see the Installation of EnCase Enterprise chapter 170 EnCase Forensic Version 6 11 User s Guide Time Zone Settings The Energy Policy Act of 2005 Public Law 109 058 amends the Uniform Time Act of 1966 by changing the start and end dates of daylight saving time beginning in 2007 Clocks are set ahead one hour on the second Sunday of Mar
381. nditions osten Eate qe ap irati pen pd egt E E E 139 Editing Conditions cet etare attese eed tedio tetendit antedios nd fete titel atn 141 Running Conditionsosn dioi paetund teta agpo redd atetetidi aser efr fi ied aged od cee 142 Importing CondiBors 1 starea e EE EEE E E tien terii Dd iwraietie etus 143 Exporting Conditions on mans etundtoo detinet ag Beer dirette fidele Ted dU ote 144 Ou 145 Galery Tabor RR bre he te EI rei RD ritiro edis idtm 146 EnCase Forensic Version 6 11 User s Guide Contents Viewing More Columms ret teet ee rre e bises e eie ipe ee t ee e eei ee eiue 146 Viewing Fewer Columns eee erm ite tens eere rei ie dee treten eeepc es 146 Viewing More ROWS erre ng eroe etie deg eire fe see E e er ise iin en erre ion 147 Viewing Fewer ROWS ss 355 nepos eret aget ene ee ati p Or eb RESI res e HERR 03008 147 Tmelne Tab ente erre nbeaenm deve er dene avete age ert ate soestbons esque 147 Moditying the View Dane o eerie teens eter nen iiedettatiiu qve dni aste atti avrei o ed 148 CODY E E E EE emet R GERE E E O E vie di mte elerdis esses aevi pui os 148 Cu osteo 148 E dxsee 149 CHAPTER 6 Case Management 151 Overview of Case Structure x t ette aoe e a eE ht teo itae iere he cede dieron 152 Case Management m mtem i E e eie s rp hee enero eae repre d en 152 Concurrent Case Management cccccccccccccccscssseeieensnesscscscscscsesescsesesenssesnscscsesesessse
382. nditions tree and select New to see the New Term dialog x Function Name Value a Prompt for value Properties Operator Case Sensitive S Name has a value S FullPath has no value GREP b IsFolder equal to b IsSelected not equal to S Path greater than S Examiner greater than or equal to S ExportFolder less than S TemporaryFolder less than or equal to S IndexFolder Contains GUID Matches b InReport Find uu Edit Source Code e Name Compare 0 3 Select a property an operator and if prompted a value and choice Depending on the property and operator chosen you can also select O Prompt for Value O Case Sensitive O GREP 4 To edit the source code click Edit Source Code 5 Repeat the steps above to create as many terms as you want to make the condition as detailed as possible 6 Click OK to save the condition 7 To nest terms create a folder by right clicking the desired location in the Tree pane and choosing New Folder Place the nested terms inside this folder 8 If you want to change the logic right click the term and select Change Logic This changes the AND operator to an OR and vice versa 9 If you want to negate the logic right click the term and select Not 10 When satisfied with the logic click OK Navigating the EnCase Interface 141 Editing Conditions Conditions can be opened and edited when there are no open cases b
383. ned and portable for easy field acquisitions with on site verification immediately following the acquisition FastBloc SE is a software version of this product Acquiring in Windows Without a FastBloc Write Blocker Never acquire hard drives in Windows without FastBloc because Windows writes to any local hard drive visible to it Windows will for example put a Recycle Bin file on every hard drive that it detects and will also change Last Accessed date and time stamps for those drives Media that Windows cannot write to is safe to acquire from within Windows such as CD ROMs write protected floppy diskettes and write protected USB thumb drives Windows based Acquisitions with a non FastBloc Write Blocker EnCase applications cannot recognize the presence of any hard drive writeblocker other than FastBloc For that reason EnCase will report that the subject hard drive is not protected when it might be Users of non FastBloc writeblockers are encouraged to test their equipment and become familiar with their capabilities 218 EnCase Forensic Version 6 11 User s Guide Performing a Drive to Drive Acquisition Using LinEn Once LinEn is set up run LinEn choose Acquire then select the drive to be acquired and the storage path Optionally provide additional metadata LinEn was configured as described in LinEn Setup and autofs is disabled cleared The investigator identifies the subject drive to be acquired and the storage drive that
384. neneseseseanenenes 230 Acquiring a DriveSpace VoluMe mesio eaer iniii tenete nennen 231 Acquiring Firefox Cache in R cords sihan iite ea EE enne 232 Reacquiring Evidence eie arr E oe ede iari rented e D o teret 233 Reacquiring an Evidence Filetin aes insine e E E e aai ERE nennen eren 233 Adding Raw Evidence Files eee Deed eei idee irr ibo e ESES OR Aaaa TETTES 234 Remote ACQUISIUOD si entrepris HRERIIRUN Era E oee k T rE EEES E C benscenta TE Eaa Tie drei ien 235 Remote Acquisition Monitor sese eene enne nnne nnne 237 Setting Up the Storage Machine nennen 238 gba 240 Hashing the Subject Drive Using LinEn seesseesssseeeeeeneneneertete enne 240 Hashing the Subject Drive Once Previewed or Acquired sss 241 Logical Evidence Files tenete eti eere e idee e eret qus ep de opea 242 Create Logical Evidence File Wizard sssssssssssssseeeeeeeneneeeneneneeneenenennnn 243 Sources l age isiedietesduoeiponinondieletelutamie e ended ubi dubie etri ibus 244 The Outputs Page of the Create Logical Evidence File see 245 Creating a Logical Evidence File sse 246 Recovering Folders tete ed eee d ted ed eb epe te Eb dne hpe d reete ibas ERES 247 Recover Folders on FAT Volumes sse tenentes 248 Recovering NTFS Fold ts eee dere ie eoi e etin bete eese ete tue hee eit 248 Recovering UFS and EXT2 3 Partitions sssess
385. nerates a plain text file containing all words in an INDX file FindValidIPs finds IP addresses Index Buffer Reader parses information from an index buffer INDX file COM Folder EnScript Code The COM folder contains sample EnScript code that uses the COM API as an integration point into various other applications like MS Office or the Windows File System Programmers use these includes to create new EnScript programs The COM folder contains these programs B Create Word Document m File System B Read Word Document B Excel Create Workbook B Outlook Read 500 EnCase Forensic Version 6 11 User s Guide EnScript Debugger The EnScript debugger allows EnScript programmers to conduct runtime debugging of their programs After you create a project for the target EnScript program the Start Debugging functionality is enabled EnCase Enterprise Training File Edit view Help iL New eB Open lal Save Print I Compile D gt Run be Add Device QQ Search a Logon Re Debugging disabled no project for the currently selected EnScript program EnCase Enterprise Training File Edit View Tools Help L3jNew open ig save print p Start Debuaginpl gt Add Device Q Search 3 Logon 3 R Enni Debugging enabled there is a project for the currently selected EnScript program When you click Start Debugging the debugger starts and opens four new tabs in the View Pane locals Breakpoints Cl Dependencies Ou
386. nfiguration types can be created E Spanned B Mirrored E Striped E RAID 5 B RAID 10 B Basic Software RAID EnCase applications support these software RAIDs m Window NT see Windows NT Software Disk Configuration E Windows 2000 see Dynamic Disks E Windows XP see Dynamic Disks E Windows 2003 Servers see Dynamic Disks 226 EnCase Forensic Version 6 11 User s Guide Windows NT Software Disk Configurations In a Windows NT file system you can use the operating system to create different types of disk configurations across multiple drives The possible disk configurations are B Spanned B Mirrored B Striped m RAID 5 E Basic The information detailing the types of partitions and the specific layout across multiple disks is contained in the registry of the operating system EnCase applications can read this registry information and resolve the configuration based on the key The application can then virtually mount the software disk configuration within the EnCase case There are two ways to obtain the registry key B Acquiring the drive B Backing up the drive Acquire the drive containing the operating system It is likely that this drive is part of the disk configuration set but in the event it is not such as the disk configuration being used for storage purposes only acquire the OS drive and add it to the case along with the disk configuration set drives To make a backup disk on the subject machine us
387. ng 1234 and 4321 produces the same checksum but not the same CRC D Device Configuration Overlay DCO The Device Configuration Overlay sometimes called Disk Configuration Overlay is similar to the Host Protected Area It is an optional feature within the ATA 6 standard and is supported by most hard disks Like the HPA it can also be used to segment a portion of the hard disk drive capacity from view by the OS or file system usually for diagnostic or restoration purposes Disk Slack This is the area between the end of the volume and the end of the device E EnCase Forensic EnCase Forensic is recognized as the standard computer forensic software used by more than 15 000 investigators and 40 of the Fortune top 50 companies EnCase Forensic provides law enforcement government and corporate investigators reliable court validated technology trusted by leading agencies worldwide since 1997 Encryption The process of encoding information to make it unreadable without a key to decode it EnScript amp Language A programming language and Application Program Interface APT that has been designed to operate within the EnCase environment Evidence File The central component of the EnCase methodology is the evidence file This file contains three basic components header checksum and data blocks that work together to provide a secure and self checking description of the state of a computer disk at the t
388. ns New Insert I Bookmark Data Ctr B af Export Import Add Keyword List 43 Copy Tree Ctrl C C3 New Folder Expand Contract Space Expand All Contract All Set Included Folders Num Include Sub Folders Shift Num Include Single Folder Ctri Num xrv Bc e i Disk Cleanup 4 Disk Defragmenter 39 Files and Settings Transfer Wizard LA Scheduled Tasks security Center S System Information B System Restore ter Map CIT lx Characters to copy Advanced view U 0021 Exclamation Mark Search expression Code Page Keywffid tester GREP Symbols wFFFF Unicode character Search expression 4 Mame o WwFF Hex character m Any character Any number 0 9 Case Sensitivi I Unicode Repeat zero or one F GREP Unicode Big Endia m g Repeat at least once Iv Active Code Pag UTF8 A Z A through Z E Repeat zero times TUTE XYZ Either X Y or Z Unicode View XYZ Neither X nor Y nor Z Literal character 0414 0434 041E 043E 0411 0431 0420 0440 Group ab together for 041E 043E 0415 0435 0020 0423 0443 0422 0442 0420 0440 D41E 043E Working with Non English Languages To enter non English content using the Character Map utility 1 Click Start gt All Programs gt
389. ns UNIX Or Windows Y Unique Files by Hash f Yahoo Mail Pages LY Yahoo Web Mail Pages 2 Click New from the drop down menu The New Filter dialog appears E 1 EnScript YY Filters E Conditions Display 7 Queries Text Styles an D T Fir Ly Le gg Export Import LP New Folder Y LT Expand Contract Space LY Expand All LY Contract All Y Hotmail Web Mail Pages f Netscape Web Mail Pages f OLK Folders Containing Attachments HY Search File Permissions UNIX Or Windows Y Unique Files by Hash f Yahoo Mail Pages LY Yahoo Web Mail Pages Navigating the EnCase Interface 131 Enter a descriptive name in the Filter Name field and click OK A source editor appears in the Table pane lass MainClass bool MainiEntryClass entry return true Enter EnScript code as required to accomplish your task The newly created filter name appears at the bottom of the Filter pane list Execute the new filter as required by double clicking it Editing a Filter Change a filter s behavior by editing it Display the Filter list in the Filter pane then edit it Edit a filter as follows Right click the filter you want to edit A drop down menu appears gt Run T Edit Enter zi Y Mew Insert X Delete Delete gg Export Import Rename F2 L New Folder 132 EnCase Forensic Version 6 11 User s Gu
390. ns when adding EFS files to a logical evidence L01 case The file is encrypted and the EFS stream is missing from the same folder within the L01 the file cannot be decrypted The file is encrypted and the EFS stream is in the same folder the file can be decrypted except for the remainder of the file if any The file is decrypted and the EFS stream is missing the file remains decrypted 1 The file is decrypted and the EFS stream is in the same folder the file will be decrypted twice The workaround in this case is to disable EFS or delete the private key from the secure storage From version 6 11 on all the scenarios above are handled gracefully because the EFS stream is added internally E If the file is encrypted the EFS stream is automatically stored with the file as metadata E If the file is decrypted the EFS stream is not automatically stored as it is not needed This does not prevent you from storing the stream by specifically saving it to the LEF If an encrypted file is decrypted and added this is noted and displayed in the report CHAPTER 10 Bookmarking Items Bookmarks Overview 401 Bookmark Features 406 Creating a Bookmark 414 Using Bookmarks 422 402 EnCase Forensic Version 6 11 User s Guide Bookmarks Overview EnCase allows files folders or sections of a file to be marked and saved for reference These are called bookmarks Bookmarks are stored in their associated case file and can b
391. nsic Version 6 11 User s Guide Hashing the Subject Drive Using LinEn This allows the investigator to know the hash value of the drive LinEn is configured as described in the setup topics and autofs is disabled The investigator has identified the subject drive to be hashed To perform a hash using LinEn 1 Navigate to the folder where LinEn resides and type linen in the console The LinEn Main Screen displays Select Hash The Hash dialog displays Select a drive and click OK The Start Sector dialog displays Accept the default or enter the desired Start Sector and click OK The Stop Sector dialog displays Accept the default or enter the desired Stop Sector and click OK The Hash Results dialog displays If you want the hash result to be written to a file click Yes If you are saving the hash value to a file the Save Hash Value to a File dialog displays otherwise the LinEn Main Screen displays Enter the path and filename of the file that will contain the hash value and click OK The hash value is saved and the LinEn Main Screen displays A hash value is calculated for the selected sectors of the selected file You can save this hash value to a file CHAPTER 5 Navigating the EnCase Interface The Main Window 60 Panes and their Specific Tabs 98 Navigating the Tree Pane 115 Modifying the Table Pane 122 Modifying the View Pane 148 60 EnCase Forensic Version 6 11 User s Guide The Main
392. ntent of a Device 180 Global Tab 33 Globally Unique Identifier GUID 521 Glossary of Terms 517 Goto 148 GREP 521 GUID 521 Guidance Software 527 H Hardware Disk Configuration 224 Hash 522 Hash a New Case 335 Hash Analysis 334 Hash Sets 336 522 Hashing 236 Hashing the Subject Drive Once Previewed or Acquired 237 Hashing the Subject Drive Using LinEn 57 236 Help for EnScript Modules 495 Help Menu 78 Hexadecimal 522 Hiding Columns 124 Highlighted Data Bookmarks 396 Host Protected Area HPA 522 If the Restored Disk Does Not Boot 255 Import Keywords 345 Importing Conditions 143 Importing Filters 137 Include EnScript 497 Included Enscript Components 333 Increasing the Number of Images Per Row 316 Index 522 Index Case 490 Indexing 152 360 Indexing a Case 152 Guidance Software Individual Panes 88 Initializing the Database 256 Installed Files 25 Installing EnCase Forensic 21 Installing Security Keys 29 Installing the Examiner 23 Integers 402 Internet History Searching 350 Internet Protocol Address IP 522 Internet Report 442 Internet Searching 351 Introduction 15 45 K Keyword 522 Keyword Searches 339 Keyword Tester 343 L Leaving Console Mode 218 LEF EFS Encryption Enhancement 17 Legal Notification 527 LinEn Set Up Under Red Hat 48 LinEn Set Up Under SUSE 48 LinEn Uti
393. nterface 81 L New 23 Open lal Save lt j Print A Add Device Q Search 3 Logon CF Logoff E Refresh SB Find BookmarkData Ctrl B Export Copy Ctrl C Go To Ctrl G i Select All Ckrl A Find Ctrl F New displays the Case Options wizard where a new case is defined Open displays the Open dialog where you can open an existing case Print displays the Print dialog Refresh updates a list or table to reflect changes made in the file system to files that drive the EnCase application Save displays once a case is opened the Save dialog Add Device displays once a case is opened the Add Device wizard so that a device can be previewed or acquired Search displays the Search dialog so that evidence associated with the case can be searched Logon displays the Logon dialog so that you can log on to the SAFE This icon only appears in enterprise applications Logoff logs you off the SAFE This icon only appears after you have logged on to the SAFE Other icons are described in the context where they appear 82 EnCase Forensic Version 6 11 User s Guide Panes Most EnCase work is done from one of the panes in the main display The current display contains four panes containing different data and displays These include the following B Tree pane shows case associated data in a tree format m Table pane presents a tabular data list that varies depending on various selections B View pan
394. oa trortat gt 02500 2 0i 4n P GmRtl xd quR 3 Pe Z n Z tR 46e KzO ExOOT 8 0 tU r WE WOE ung Do WAISN 02600 cb 84 Feu m Rave k zC SE 2Ufp zeQp D 29 Z iB eDsS32 q 1 sQ KIn l u5G a 02700 ZqY Z l68 E GOZ4Vi Z D Hj n E D D x G 6 REE f 3 AV t 6adad OBi 6 lt 1a dekOlpx ki 02800 9 gt q BRUO qODEs Lae RI amp Ugh N ON pUD g t1 qR Q n v f 1 Zp C B v iVmpx e G81Rg 02300 eu amp e 2 DG G 2 N SD pr q 8 2040 a r 3266 DUMZ c1 C y ig D NMYIS 14 1X p 4B x X f 03000 4k SbFI Z P i O q IA f Ve KAxUv G h amp c T D i p AKZIG V Lq H 2fR Q2035 3 2 7 A uae 03100 ri li Y h I 34 Qg Y 8 ui68 SAY WU 3Gq E hD YIl asOij BoFU4 Dy U D E 7 sthiiSAgUii Os e n 03200 s s n z 8933 p R O hW e Ex d D I U 346Xp lo Go vy 3 amp kD EgBn f e 6 ciiOu0 UB Bde S 03300 VjTwURS I rn LgZan ti h n bc toma BRC 6 36 cVxneQle qUagaS amp 58UD z C D D sp y amp xF 00000 Moya pExif II wenn co ce i ha hh vetta 109 110 EnCase Forensic Version 6 11 User s Guide The Hex Tab The Hex tab shows a split view of a file with hexadecimal values on the left and ASCII on the right joooo0 8 FF El 15 FE 45
395. ocated in the lower left quadrant of the four pane display Glossary of Terms 533 Virtual File System VFS The EnCase Virtual File System VFS lets examiners mount computer evidence as a read only offline network drive for examination in Windows Explorer The value of this feature is that it allows examiners multiple examination options including the use of third party tools with evidence served by EnCase Virtual Machine Software that creates a virtual environment on a computer platform so the user can run software Several discrete execution environments reside on a single computer each running an Operating System This allows applications written for one OS to run on a machine with a different OS VMWare A wholly owned subsidiary of EMC Corporation it supplies much of the virtualization software available for x86 compatible computers VMWare software runs on Windows and Linux W Write Blocker A tool software or hardware that prevents writes to a subject device while allowing investigators to safely read from the device CHAPTER 16 Guidance Software E Legal Notification 535 E Support 537 536 EnCase Forensic Version 6 11 User s Guide Legal Notification CEIC EnCase eDiscovery Suite EnCase Enterprise EnCase Enterprise AIRS EnCase Forensic EnCE EnScript FastBloc Guidance Software Neutrino Snapshot and WaveShield are registered trademarks or trademarks owned by Guidance Software in the
396. of the message this is in contrast to cryptography which does not disguise the existence of the message but obscures its content Subject The computer or media that the investigator actually examines Swap File A memory management technique where non contiguous memory is presented to a software process as contiguous memory Memory pages stored in primary storage are written to secondary storage thus freeing faster primary storage for other processes in use A swap file is also called a page file T Table Pane Part of the program user interface located in the upper right quadrant of the four pane display Temp Folder A folder that allows segregation and control of temporary files created in the course of an investigation Also see Export Folder Tree Pane A part of the program user interface located in the upper left quadrant of the four pane display U Unicode An industry standard that enables text and symbols from all the world s writing systems to be consistently represented and manipulated by computers Unicode consists of B A character repertoire E An encoding methodology and set of standard character encoding B A set of code charts for visual reference B Anenumeration of character properties such as upper and lower case B A set of reference data computer files B Rules for normalization decomposition collation and rendering V View Pane A part of the program user interface l
397. of each evidence file segment in MB default 640 minimum 1 maximum 10737418240 g lt Granularity gt Error granularity in sectors default 1 minimum 1 maximum 1024 b lt BlockSize gt Sectors per block for the evidence file default 64 minimum 1 maximum 1024 Compute HASH while acquiring the evidence default TRUE values TRUE or FALSE a lt AlternatePath gt A semicolon delimited list of alternate paths maximum 32768 characters n lt Notes gt Notes maximum 32768 characters f lt Configuration File gt h Path to a configuration file holding variables for the program maximum 32768 characters Help message Required field Working with Evidence 273 Configuration File You can create a configuration file to fill in some or all of the variables The configuration file needs to be in the format Opt ionName Value and can be used in conjunction with command line options All of these options have the same restrictions as their command line counterparts Note that options entered on the command line will override the same option in the configuration file This way users can override a specific setting in the configuration file by entering the appropriate information on the command line Options for the configuration file are as follows EvidencePath Path and file name of the evidence file to be created maxim
398. of the Report pane The report displays in the Report pane Creating a Webmail Report Complete the Webmail Parser 1 Select the folder to see its contents in the Table pane 2 Select a file to report on then select the Report tab of the Report pane The report displays Q 9 a een owe d doma Dus M SE ieu composef 1 htm z Fwd Bank Name jj Quick Address List 20 24finsert gffpilyray150 ctionary Thesaurus Rich Text Editor ON Copy Message to Sert 450 EnCase Forensic Version 6 11 User s Guide Alternative Report Method You can generate a report in the Table pane as well 1 Select the file in the Table pane 2 Click the In Report column to include the item in the report 3 Click the Report panel of the Table pane to view the report irae ngon nens rco Hotmail Kree PONa Pox Name composet tem Ad tonal Fields Subyect Fod Bark Name Account and Routing Numbers txValues2 eite URL URL substingD ndis T URL subsbing ndesValureT ele URL URL substring us 1 var inder OTY A FeO at UB 18 else ARB 77 e AE d nCcoluess U t echarsetes uten URL URL 4 URL v document location href window location mplace URL var wind window open heights widthre izableeno Atiebareno scrolibarrsno statuseno fooibareno menubreno Jocationeno wind closed eite d t charsetis ute URL URL ater T if URL document location href window loc
399. og 405 Bookmark Reports and Reporting 428 Bookmarking an Image 315 Bookmarking Items 358 395 Bookmarking Non English Language Text 469 Bookmarks Overview 395 Booting the Restored Hard Drive 254 Browse for Folder Dialog 159 161 Building a Package 503 Burn 519 C Canceling an Acquisition 209 Case Backup 154 Case File 519 Case File Format 153 Case File Time Zones 169 Case Management 151 152 Case Options Page of the New Case Wizard 166 Case Options Tab 32 Case Processor 485 Case Processor Modules 487 Case Related Features 156 CD DVD Inspector File Support 226 Changing Filter Order 135 Changing Report Size 440 Checksum 519 Choose Devices Page of the Add Device Wizard 187 Choosing Database Sources 257 Cleaning an EDB Database 300 Clearing the Invalid Image Cache 317 Close Case 175 Cluster 519 Code Page 519 Color Tab 35 COM Folder EnScript Code 492 Combining Filters 134 Command Line Options 267 545 EnCase Forensic Version 6 11 User s Guide Completing the After Acquisition Page of the Acquisition Wizard 205 Completing the Choose Devices Page 192 Completing the Destination Page 286 Completing the File Selection Page 285 Completing the Options Page 286 Completing the Options Page of the Acquisition Wizard 208 Completing the Preview Devices Page 192 Completing the Search Page of the Acquisition Wi
400. okmarked as one or more file group bookmarks and the Folder Comment field is disabled When Bookmark Selected Items is cleared only a single file was highlighted in the Table pane and that single file is bookmarked as a notable file Any other selected files are not bookmarked Create new bookmark folder determines whether a new folder is created and whether Folder Name and Folder Comment are displayed Folder Name contains the filename for the new bookmark folder Folder Comment contains the comment describing the bookmarked files that the new folder contains Comment contains a short comment when using this dialog to create a notable file bookmark Destination Folder displays the Bookmarks tree so the destination folder can be selected Creating a Bookmark You can create these types of bookmarks E Highlighted Data E Notes B Folder Structure Notable File B File Group E Log Record EnScripte programs create these types of bookmarks B Snapshot m Datamarks EnCase applications create these types of bookmarks as a result of acquiring a device E Case Time Settings B Search Summary 415 Bookmarking Items Creating a Highlighted Data Bookmark You can select any content displayed in the View pane and bookmark it Content must display in a tab of the View pane ccO X I Case MOOSI CAINEA 95 16 L5 16 CL 16 50 947 FO 90 LESIO To bookmark highlighted content displayed in the View p
401. olbar in Different Modes and Contexts showing 1 Acquisition mode and the rest in EnCase Enterprise 2 before logging in and opening a case 3 after logging in and opening a case 4 with an acquired device selected from the Entries tree and 5 with an entry selected from the Entries table Oo iNew 3 Open C3 Print E Refresh e ijNew LZ Open print 3 Logon 2 Refresh e new 3 Open ig Save Print a Add Device Q Search Logon 3 Logoff ai Refresh o ijNew open lg save amp Print Add Device Q search 3 Logon F Logoff 3 Refresh X close f Acquire o L New 23 Open bal Save lt j Print e Add Device Q Search E Logon CT Logoff a Refresh SS Acquire There is a corresponding menu command for each toolbar icon When the toolbar is wider than the main window the toolbar wraps to another line Some icons are enabled only when they are useful such as Print and Refresh The panes and the tabs in the toolbars also provide context dependent icons for functionality accessed through context dependent right click menus provided in those features Figure 6 A Context dependent Icon and Its Associated Right Click Menu Command where 1 is the context for the right click menu and 2 is the corresponding menu command and toolbar icon The Find command opens the Find dialog where a search string can be defined that searches within the content highlighted in the View pane Navigating the EnCase I
402. ols 523 Options Use the Options dialog to customize the software See the chapter The Options Dialog on page 155 for complete information on this topic 1 Click Tools Options The Options dialog opens C Program Files EnCase6 Export C Program Files EnCase6 Temp C Program Files EnCase6 Index 2 Click on a tab to make changes to settings 3 When you are finished making the changes to tabs click OK CHAPTER 15 Glossary of Terms Glossary of Terms A ASCII ASCII American Standard Code for Information Interchange is a character encoding based on the English alphabet ASCII codes represent text in computers communications equipment and other devices that work with text Most modern character codes have a historical basis in ASCII ASCII was first published as a standard in 1967 and was last updated in 1986 It currently defines codes for 33 non printing mostly obsolete control characters that affect how text is processed plus 95 printable characters B Bookmark Bookmarks let you annotate evidence and analytical artifacts Files folders address ranges within files collections of files or data and even bookmarks themselves can be book marked Burn The process of recording data to an optical disc such as a CD or DVD C Case File A text file containing information specific to one case The file includes pointers to one or more evidence files devices bookm
403. olumn Sort Select Item Space Go to Parent The Show Columns dialog looks like this x Fields RN Name Kf Preview A Hit Text Kf Entry Selected NI File Offset Kf Length Wi Filter M In Report NI File Ext Nf File Type Cancel Note See Table Tab Columns on page 102 for information on all columns To hide columns clear the appropriate check boxes then click OK 124 EnCase Forensic Version 6 11 User s Guide Showing Columns in the Records Tab 1 Select the Records Tab A Entries M Bookmarks Q Search Hits T Additional Fields Sog 2 amp 3 Records Loni a _D A S Single Files 2 Right click in the blank area of the Table pane and select Show Columns Lr Bookmark Data Ctrl B gg Export VI Tag Selected Files Ctrl Shift T E Tag File Ctrl T ES show Columns E Copy Ctrl C Column Sort Select Item Space 3 The columns display in a tree structure Show Columns show Columns 5 08 Nodes OK Common email fields 1 58 Name CE Common phone fields f 2 Filter KC Common internet fields Ej 3 58 In Report CJ e Common SIM fields M 4 58 Search Hits Cac Local mE I 5 B Additional Fields e Entry Fields 6 E Common email Fields CE Other pA 7 3 Common phone fields 8 le Common internet fields 9 ie Common SIM Fields 10 C5 Local fields 11 ie Entry fields 12 Cj Other Navigating the
404. om view It does not delete them from the case 43 Copy Ctrl C BA Show Excluded RT Show Deleted X Delete Delete Delete All Selected Ctrl Delete Exclude Ctrl E Exclude All Selected Ctrl Shift E Ef Export MT Tag File Ctrl T iew Search Hits Bookmark Selected Items Show Columns Column gt Sort b Select Item Space 3 Go to Parent BkSp Note Excluded search hits are indicated by the international Not symbol In the figure below the file setuplog txt is included while those in rows 15 16 and 17 are excluded C 14 setuplog txt 15 L setupact log C 16 setupact log 17 L LAYOUT PNF 128 EnCase Forensic Version 6 11 User s Guide Deleting Items When using Search Hits delete is considered a soft delete which you can undelete until the case is closed If a search hit remains deleted when the case is closed the hit is permanently deleted In other tabs however undelete works only with the last selection deleted Once a file is closed deleted items are permanently removed and cannot be recovered Run then view a keyword search This process is similar to the Exclude Files on page 360 feature View the search hits report in the Table pane before excluding them from the report 1 Select files to exclude then right click the view selecting either Delete or Delete AII Selected 43 Copy Ctrl C X Del
405. onClass e Acquisition details LJ 2 g AlowedClass LABS Rg AppDescriptorClass e Application descriptor LJ 4 Rg ApplicationClass e Application plug in La 2 ArrayClass Use asthe return type of a fu e O 6 Ag ArrayEditClass e Edit an array of values LAN 4 BatchClass e This object creates connectio 8 BookmarkClass A bookmark 9 BookmarkFolderClass Abookmark folder CJ 16 S BookmarkReferenc Bookmark reference Aa gt bool 8 bit boolean Can hold the v C 12 ButtonClass Apush button L3 13 E byte 8 bit unsigned int C 14 g CaseClass Contains global case data C 15 CDCacheltemClass LJ 16 gt char 16 bit unsigned character C 17 4 CheckBoxClass Checkbox of 4 b The Tree pane contains a list of classes Double clicking an entry provides additional detail for the class Hash Analysis A hash function is a way of creating a digital fingerprint from data The function substitutes or transposes data to create a hash value Hash analysis compares case file hash values with known stored hash values The hash value is commonly represented as a string of random looking binary data written in hexadecimal notation If a hash value is calculated for a piece of data and one bit of that data changes a hash function with strong mixing property usually produces a completely different hash value A fundamental property of all hash functions is that if two hashe
406. one of the formats above Error Handling The program checks all values entered to make sure they conform to expectations Any deviation causes the program to exit or prompt for a correct value Additional WinEn Information B Progress Bar While the process is running it uses hash marks across the screen as a status indicator using the full width of the screen as the 10076 mark B Cancel To stop the process while it is running use the CTRL BREAK or CTRL C key combination m WinEn Driver At run time WinEn drops its driver file in the same directory where WinEn is running This driver is named WinEn sys or WinEn64 sys E Changes to target system When WinEn runs on a system the following changes can be expected O When executed WinEn loads into memory on the target system This is unavoidable and will take up approximately 2 8 MB of RAM O Windows Service Control Manager creates registry keys when it loads the WinEn driver These keys are typically stored in HKEY_LOCAL_MACHINE SYSTEM lt ControlSet gt Enum Root LEGACY WIN EN HKEY LOCAL MACHINE SYSTEM lt ControlSet gt Services winen_ O Data is written to the PageFile based on operating system memory use Working with Evidence 275 Renaming WinEn As noted above WinEn leaves remnants on the system where it is run If desired you can rename the WinEn executable so that the remnants are obfuscated Renaming the executable also causes the
407. onjunction with a hash analysis Verify file signatures performs a signature analysis during a search Compute hash value performs a hash analysis during a search Recompute hash value regenerates previously computed hash values Search for Email turns on dialog email search options Recover Deleted accesses deleted email Email Type List provides options for email that can be recovered Verify Signatures performs a signature analysis during a search It determines whether the file extension matches the signature assigned to that file type Analyzing and Searching Files 359 Identify Codepages tries to detect the code page for a file Search for Internet History recovers Web data cached in the Web history file Comprehensive Search searches for Internet history in unallocated space Viewing Record Search Hits Records are virtual files created when email or Internet history searches are performed Searching records is straightforward Click Records when the search finishes Select Set Include Select a record that shows a search hit Select Hits on the Filter pane Foe w m dc Click keyword folders one by one to see search hits The newly created records are now visible Te De tar tou DW Fres Donos jose Tet Sem 360 EnCase Forensic Version 6 11 User s Guide Viewing Search Hits Search hits are organized by each keyword appearing in the Tree pane Search hits within each keyword appear in the Table pane
408. only mode which occurs when the application is opened on a machine that does not have a dongle or appropriate licenses Additional functionality modules add commands and icons System Menu The system menu organizes commands provided by the EnCase application The system menu appears in the main window The system menu along with the right click context specific menus provides commands to execute application functionality Fie Edit View Tools Help The system menu contains the following commands E File m Edit m View E Tools E Help When clicked the commands in the system menu display the corresponding menu The Edit menu does not display in acquisition mode although the Edit command always displays in the system menu Some of the commands in the menus displayed by the system menu commands are context dependent Context dependent commands appear in the menus but are disabled unless the current application context makes them available 62 EnCase Forensic Version 6 11 User s Guide File Menu The File menu provides commands that manipulate application files and global application settings You can create new case files open existing case files save case files and global settings add devices to cases E B E E print the contents of files E E add raw images to cases u exit the application File Mew Open Ctrl O Save Ctrl S Save As Save All Ctrl Shift S Print Printer Setup
409. ons It is also a great way to show specific information about the type of media in the case Notable File Bookmarks Use notable file bookmarks to bookmark individual files These bookmarks provide a means of focusing the investigator s attention on specific files File Group Bookmarks File group bookmarks annotate a collection of individual files selected as a group Bookmarking a collection of files helps the investigator organize evidence Bookmarking Items 405 Snapshot Bookmarks Snapshot bookmarks include a wide variety of volatile data resulting from running the various EnScript programs In EnCase Forensic the Scan Local Machine program creates snapshot bookmarks The output of the program is always bookmarked After Scan Local Machine is run a bookmark toolbar displays that contains the Home tab and the Snapshot tab The Snapshot tab has a toolbar associated with it This toolbar displays a tab command for each type of snapshot bookmark created by one of the EnScript programs Each type of snapshot bookmark has a Tree pane and Table pane associated with it Each table displays data specific to the class of the system component whose data displayed in the Table pane Snapshot bookmarks include B Machines snapshot on the Home tab E Open ports B Processes B Open files E Network interfaces E Network users B DLLs Log Record Bookmarks These bookmarks are created whenever console and status dialog messages ar
410. onse and comprehensive forensic level analysis of information found anywhere on a computer These products are scalable platforms that integrate seamlessly with existing systems to create an investigative infrastructure LEF EFS Encryption Enhancement 17 WinEn 18 Snapshot to DB Module Set 19 Lotus Notes Local Database Encryption 19 EnCase Examiner Support for Microsoft Vista 19 64 Bit EnCase Servlet 19 Send to HBGary Responder EnScript 20 18 EnCase Forensic Version 6 11 User s Guide LEF EFS Encryption Enhancement There were different scenarios from previous EnCase versions for adding EFS files to a logical evidence L01 case 1 The file is encrypted and the EFS stream is missing from the same folder within the L01 the file cannot be decrypted 2 The file is encrypted and the EFS stream is in the same folder the file can be decrypted except for the remainder of the file if any 3 The file is decrypted and the EFS stream is in the same folder the file will be decrypted twice The file is decrypted and the EFS stream is missing the file remains decrypted 4 The file is decrypted and the EFS stream is in the same folder the file will be decrypted twice All of the above scenarios are now handled gracefully because the EFS stream is added internally WinEn WinEn is a standalone command line utility that captures the physical memory on a live computer running a Windows operating system Windows 2000 or highe
411. ontain controls in addition to tabs The scrollbar exposes these controls as well as tabs when either is hidden Navigating the EnCase Interface 87 Each tab also has a grab handle used to move the tab outside the main window where it appears in a secondary window Once three tabs are removed from the main window the last tab in the main window no longer displays a grab handle because it cannot be removed from the main window Pane Tab Bar and Pane Tab Bar Menu Each pane contains one or more tabs Clicking a tab displays different content in the pane Tabs are organized into a tab bar Tabs may contain sub tabs and these are organized by separate tab toolbars Each tab bar has its own menu The menu displays when you right click the tab bar Figure 11 Pane Tab Bars and their Tab Bar Menus The tab bars have been darkened where the menu can be displayed The tabs have their own menus Tabs were closed on the second tab bar to shorten it LE Cases Auto Fit toggles whether the tab bar displays as a single row with a scrollbar or wrapped to multiple rows when the pane is resized 88 EnCase Forensic Version 6 11 User s Guide Tab Right Click Menu Each tab or sub tab displays the same right click menu This menu manages tabs and provides another way of moving from one tab to another The tab toolbar menu command Auto Fit is also available here Figure 12 The right click menu where 1 indicates that you
412. ontents appear 3 Text Gre Fy Doc H Transcript EJ Picture i4 Name Compose 7 Search Hits No Additional Fields Yes ty yahoo com IMG html BUTTON PAD1 PREFIX html this id html IMG html BUTTON IMAGE PREFIX html this id html IMG i html BUTTON PAD PREFIX html this id html amp IMG imageChooser images k link IMG image You can save or export the report as desired Extracting Email The program s search engine can search various types of email artifacts including attachments See Acquisition Wizard on page 198 Performing a Search on page 357 and Searching for Email on page 369 for additional information The procedures outlined in these sections discuss how to extract and view both email and attachments 372 EnCase Forensic Version 6 11 User s Guide Searching Email This program feature displays all emails and any associated attachments in tree view Once recovered these can be viewed in the Report Doc or Transcript tabs of the Report pane 1 Click Search The Search page of the search wizard appears Select the desired email types and click Start Email Search Options I Search for email Recovered deleted IV Outlook PST v Outlook Express DBX Exchange EDB Lotus NSF AOL v MBOX View search progress in the status bar Clic
413. or E One GB of RAM B Windows 2000 XP Professional or 2003 Server W 55 MB of free hard drive space The program also supports the 64 bit version of Windows Note Intel Itanium processors are not supported Note FastBloc SE supports only the USB interface with the 64 bit version Installing EnCase Forensic 23 Installing the Examiner If you are using Local Processing install the program by inserting the CD into a player and waiting for autostart Do this for each client If are using Terminal Services install the program using the Add Remove programs wizard on the application server Once installation begins a wizard displays EnCase v6 4 Version 6 4 www guidancesoftware com Install Path C Program Files EnCase6 p Note C Program FilesNEnCase6 is the install path default 1 Enteran installation path or accept the default and click Next 2 Read and agree with the EnCase License Agreement and click Next 3 Click Next 24 EnCase Forensic Version 6 11 User s Guide Installation Folder x Guidance SOFTWARE EnCase Version 6 4 www guidancesoftware com To replace some files that are in use the system will need to be rebooted C Reboot Later Reboot Now Gancel 4 Select Reboot Later or Reboot Now and click Finish Installing EnCase Forensic 25 Installed Files During installation the program copies itself and a collection of associated files to the target directory
414. or Hex tab is updated to reflect the new encoding Working with Non English Languages 477 Viewing Non Unicode Files Display a file in any encoding or code page after you define it To view non Unicode files 1 Click Text Styles with the text displayed in the Text or Hex tab of the View pane The Text Styles pane appears in the Filter pane 2 Click the desired non Unicode based text style The displayed text in the Text or Hex tab updates to reflect the new encoding Associating Code Pages Non English language files can be associated with a particular code page A code page list is checked to prevent usage of an unavailable code page if for instance a file is open on one system then reopened on another that does not have the complete set If an original code page is unavailable when a file is opened the code page association is removed While this process is transparent if you do open a case or mount a volume with a missing code page a message listing the missing code pages appears You can associate code pages manually or automatically through Windows identification To manually set the code page 1 Apply a Text Style with the desired code page to the entry 2 Check the code page check box on the EnCase main window To have Windows automatically associate code pages to entries 1 Select the Search button and check the Identify code page option 2 After the search completes the code page column populates 478
415. pecifying and Running an Acquisition The drive is acquired Acquiring Device Configuration Overlays DCO and Host Protected Areas HPA EnCase applications can detect and image DCO and or HPA areas on any ATA 6 or higher level disk drive These areas are detected using LinEn Linux or the FastBloc SE module EnCase applications running in Windows with a hardware write blocker will not detect DCOs or HPAs EnCase applications using B FastBloc SE E LinEn when the Linux distribution used supports Direct ATA mode The application now shows if a DCO area exists in addition to the HPA area on a target drive FastBloc SE is a separately purchased component HPA is a special area located at the end of a disk It is usually configured so the casual observer cannot see it and it can only be accessed by reconfiguring the disk HPA and DCO are extremely similar the difference is the SET MAX ADDRESS bit setting that allows recovery of a removed HPA at reboot When supported EnCase applications see both areas if they coexist on a hard drive For more information see the EnCase Modules Manual Working with Evidence 215 Using a Write Blocker Write blockers prevent inadvertently or intentionally writing to an evidence disk Their use is described in these sections E Windows based Acquisitions with FastBloc Write Blockers B Acquiring in Windows Without FastBloc m Windows based Acquisitions with a non FastBloc Write Blocker FastBloc sup
416. pen or close the hierarchy at the point of the highlighted item To open and close all folders displayed in the Tree pane do one of the following m Right click the folder and choose Expand Contract from the right click menu E Click the Expand Contract icon or 8 With the folder highlighted press the space bar Edit View Tools Help a Export CopyJUnErase Copy Folders Lr Bookmark Data Ctrl B Bookmark Folder Structure Create Hash Set Create Logical Evidence File Analyze EFS Mount as Network Share Expand All Contract All Set Included Folders Num Include Sub Folders Shift Num Include Single Folder Ctrl Num Expand All You can expand all nested folders beneath the highlighted folder with one menu click If the entire Tree pane hierarchy is closed or if one or more folders are open the entire tree can be expanded to display all of the contents Expand Contract Space Contract Al Set Included Folders Num Include Sub Folders Shift Num Include Single Folder Ctrl Num Navigating the EnCase Interface 117 Use the right click Expand All command to show all of the hierarchy Start at the Entries root to open all available folders ooo fe Entries eon 2 Hunter XP EOD C DIE Extend DE AOL Instant Messenger HD Documents and Settings sou All Users oG Application Data SOO Microsoft gt Crypto 3B dss Log Machinekeys gt RSA OE Mach
417. pleting the Options Page of the Acquisition Wizard O Click Finished The acquisition begins If the file is to be saved in the case the CRCs are verified and any after acquisition processing is performed Working with Evidence 209 The thread statuses for the acquisition verification and post processing is displayed as the processes execute Once the processes are complete the results dialog appears While the acquisition is running the acquisition can be cancelled see Cancelling an Acquisition Note The evidence file containing both the content of the device and its associated metadata is saved as determined by the New Evidence File on the After Acquisition page of the Acquisition Wizard Completing the After Acquisition Page of the Acquisition Wizard This page of the Acquisition wizard specifies the actions taken once the content has been acquired but before the acquisition is completed Before you begin Open the Acquisition wizard to the After Acquisition page After Acquisition 7 x Acquire another disk Search Hash and Signature Analysis New Image File C Do not add C Add to Case Replace source device Restart Acquisition Existing Evidence File Back Cancel To define actions after the acquisition 1 If additional disks are to be acquired after this acquisition select Acquire another disk When Acquire another disk is acquired the image associated with that
418. ports AMD 64 bit architecture By replacing the existing IDE and SCSI controller driver with the new Guidance driver only read only requests are sent to the attached hard drives The FastBloc SE Module can be used with devices equipped with the Promise SATA cards m 300 TX4302 m 300 TX4 m 300 DOPLUS There is also support for the AMD Athlon 64 processor and for systems running Microsoft Windows XP 64 bit edition and Microsoft Windows Server 2003 64 bit edition Windows based Acquisitions with FastBloc Write Blockers The following write blockers are supported in EnCase Enterprise v6 0 Figure 25 FastBloc FE 216 EnCase Forensic Version 6 11 User s Guide Figure 26 FastBloc 2 FE v1 Working with Evidence 217 Figure 29 FastBloc 2 LE Computer investigations require a fast reliable means to acquire digital evidence FastBloc Lab Edition LE and FastBloc Field Edition FE hereafter referred to as FastBloc are hardware write blocking devices that enable the safe acquisition of subject media in Windows to an EnCase evidence file Before FastBloc was developed noninvasive acquisitions were exclusively conducted in cumbersome command line environments The hardware versions of FastBloc are not standalone products When attached to a computer and a subject hard drive FastBloc provides investigators with the ability to quickly and safely preview or acquire data in a Windows environment The unit is lightweight self contai
419. ports based on data in any tab in the Tree pane Some of the most commonly created reports contain bookmarks or search hits Creating a report typically involves these steps Select the items to report on whether files bookmarks search hits or other data Select the type of report you want using the tabs in the Tree pane From the Table tab in the View Pane enable the items to show in the report From the Table tab switch to the Report tab Modify the report as needed 9v Qr e S qe ik Export the report to a format viewable outside your EnCase application Examples of different types of reports are discussed in detail in later sections of this chapter Reporting 445 Enabling or Disabling Entries in the Report Before entry data can be inserted in a formal report they must be marked for inclusion C Report E2 Galery 2 Timeline f Disk Code File In File Mame Ext Report Description Type LANI Ly bookmarks htm htm No File Invalid Cluster Arc Web Page 14 Ly bookmarks htm htm No File Invalid Cluster Arc Web Page L3 15 5 bookmarks html html Yes File Deleted Overwritte Web Page Report Single Files Open a case and display its contents in the Table pane 1 Highlight the file to include in the report or check the box next to the record number 542 in the figure Report Galery Timeline pm Disk 4g Code Nane Eite E ed uh M LJ 539
420. prise HE Examples EHG Forensic ig Case Processor g File Mounter Index Case g Scan Local Machine Lag Webmail Parser Include zl To run a script double click it in the table 492 EnCase Forensic Version 6 11 User s Guide Case Processor Use Case Processor to run one or more EnScript modules against an open case To run Case Processor double click the program name A Case Processor wizard appears with the name of the open case Case Processor Kf v6 Hunter XP Forensic CaseProcessor C Program Files EnCase6 Export Ead Enter a Bookmark Folder Name Enter a Folder Comment optional Export Path populates with the default export path a I dpas DES Click Next to display the module selection wizard EnScript Analysis 493 5 Make the desired selections and click Finish Case Processor C LogFile Parser O Active Directory Information Pa C AOL IM Information J App Descriptor Utility C Compromise Assessment Module O Consecutive Sectors O Credit Card Finder E Mail Address Finder O EDS Registry Parser O EXIF Viewer I File Finder O File Report O Find Protected Files HTML Carver 494 EnCase Forensic Version 6 11 User s Guide Case Processor Modules Each module available in Case Processor provides different information Logfile Parser parses specific information from the Logfile Active Directory Information Parser provides
421. propriate subtree or machine and click OK The appropriate IP addresses appear in Machines 5 Review the available modules listed in Case Processor Modules in Forensic EnScript Programs then select the desired modules to run if any from the Modules List EnScript Analysis 491 The Sweep Options page of the Sweep Enterprise wizard appears 6 Ifservlets need to be deployed on the machines to be swept a Click Servlet Options The Servlet Options dialog appears b Click Deploy Servlet You can now change the settings c If the username and password must be updated enter this information in Update Machine s Username Password and click Update d If machines in the subtree to be swept already have servlets deployed should not have servlets deployed or should not be swept enter the IP address of the machine in Machine and click Exclude 7 Ifthe paths to the servlets on your machine must be changed enter or browse to the appropriate paths 8 Click OK Sweep Enterprise runs and the results appear in the Bookmark table on the Bookmark Home panel Forensic EnScript Code To view EnScript programs in the EnScript panel of the Tree pane click View EnScript To view EnScript components in the Filter pane click EnScripts to display the EnScript panel Open a folder from the EnScript object to see available scripts listed in the Table pane 5 Enscript Q Hits T Fitters amp Conditions 4 gt E7 EnScript a Enter
422. pt 048825133 Heres one NextPart 001 0006 OlBF33AC 44D403CO0 Content Type text html c 048825222harset iso 8859 1 Content Transfer Encoding quoted printable lt DOCTYPE HTML PUBLIC 048825311 W3C DTD W3 HTML EN gt lt HTML gt lt HEAD gt lt META content 3Dtext html charset 3Diso 83 f 04882540059 1 http equiv 3DContent Type gt lt META content 3D MSHTML 4 72 3110 7 name 3DGENERAT GHO Enterprise E Forensic 0488254890R lt HEAD gt lt BODY bgColor 3Dfffffff lt DIV gt lt FONT color 3D 000000 size 3D2 Heres one Ag Case Process 048825578 lt FONT gt lt DIV gt lt BODY gt lt HTML gt 2 NextPart 001 0006 OlBF33AC 44D403C0 2 N O48825667extPart 000 0005 OlBF33AC 44D403C0 Content Type image jpeg name vll jpg Content T if File Mounter 048825756ransfer Encoding base64 Content Disposition attachment filename vll jpq Iis 4 Index Case Qe Scan tocal Ctri B 048825845AQSkZJRgABAgEASABIAAD 7Q4MUGhvdG9zaG9wIDMuMAA4QklNARKAAAAAAHgACWAAAEg SARAAAACZwJA 43 7 048825934 gMGAIlIfAwUpA wAAQAAASwBLAAAAAAL6QlgASwALQWqXuwAJgIBAQEAGAAB JwSAAQABAAAAAAAAAAAAAA T Bookmark Dat 048826023AAAAAAAARAAAAAAAAAAAAARAAARAAAIAAAAABATEDOAAAAA4 CKINAPOARAAAABAASAAAAAFAAQBIAAAAA SAT C ce 048826112JTQPZAAAAAAAIAAAAAAAAAAA4QEINBAOAAAAA AAEAADhCSUOnEAAAAAAACGABAAAAAAAAAAI4QkINA UA 9 EPON 048826201gALZZmAAEAbGZmAAYAARAAAAAEA LZZmAAEAoZuaAAYAAAAAAAEAMgAAAAEAWgAAAAYAAAAAAAEANQAAAAE 43 Copy O4
423. r The physical memory image captured by WinEn is placed in a standard evidence file along with the user supplied options and information WinEn runs from a command prompt on the computer where you want to capture the memory WinEn has a very small footprint in memory and it is typically run from a removable device such as a thumb drive Although this method makes minor changes to the computer running WinEn this is the most effective way to capture physical memory before shutting down a computer New Features 19 Snapshot to DB Module Set This script takes snapshots of nodes across a network and stores the snapshots in a SOL database It also reads from the database to create reports on the snapshots taken It allows for minimal maintenance on the database so that you can control the amount of data stored Three EnScripts work with the database to perform their tasks B Initialize Database EnScript m Snapshot to DB EnScript m Snapshot DB Reports EnScript Lotus Notes Local Database Encryption EnCase can now decrypt a local Lotus Notes user mailbox NSF file suffix The local mailbox is a replica of the corresponding encrypted mailbox on the Domino server EnCase Examiner Support for Microsoft Vista EnCase Examiner now supports the Windows Vista operating system EnCase must run as an administrator to access the local Vista computer 64 Bit EnCase Servlet EnCase now includes a servlet for the 64 bit versions of Windows XP
424. r icons display depending on their context There is always a corresponding menu command Tools Menu Using EnCase Tools 517 The Tools menu at the top of the display contains commands for various utility programs Qo He 7 amp Index Case Ctrl I Webmail Parser Search Logon Wipe Drive Verify Evidence Files Create Boot Disk Mount as Network Share Client Write block IDE channel Write block USB Firewire SCSI drive 3 Options Next Location Ctrl Down Prev Location Ctrl Up ai Refresh FS 518 EnCase Forensic Version 6 11 User s Guide EnScript Programs Shortcut Submenu The shortcut submenu contains shortcuts to EnScript programs that are designated in the Tools Menu Plugin The Tools Menu program is in the EnScript panel of the Filter pane You can modify it to include additional shortcuts from the tools menu The EnScript Program Shortcuts and the EnScript Program that Provide the Related Command Functionality T a4 EnScript Enterprise EHG Examples z Include C Forensic Lag Tools Menu Plugin Tools Wl Index Case Ctrl I 4 Webmail Parser a Search 3 Logon Wipe Drive Verify Evidence Files J Create Boot Disk X Options a Refresh Wipe Drive Warning This procedure completely erases media and overwrites its contents with a hexadecimal character Invoke Wipe Drive with extr
425. r own notes O Snapshot Data is a mandatory checkbox O Hash Processes is checked by default 3 Click Finish 4 Select then double click the App Descriptor Module to select an output file If there are no folders displayed create a new one Analyzing and Searching Files 381 App Descriptor Utility x Select Output App Descriptor Folder Select Process State gt sj App Descriptors C NOPROFILE Common C NOTFOUND o My App Descriptors C NOTAPPROVED EXE Files C APPROVED 2j SYS Files z b Create App descriptors for every EXE and SYS file Create App descriptors for every ELF binary Group Common app desciptors Cancel Selecting a process state is optional If either the Create App Descriptors for every EXE and SYS file or Create App Descriptors for every ELF Binary option is selected Select Process State options are disabled 5 Execute the selected EnScript program When the script is complete the newly created app descriptors are available 6 Change the display as follows a Click Bookmarks b Double click the new bookmark in the Tree pane c Select Snapshots in the Table pane d Select Snapshots tab Select the Processes tab and the Home tab to view the information 7 Select Include All in the Table pane to view the name hash value and app descriptor data for the files Encryption Support Encryption is the process of converting data into a format that cannot be read
426. raisednoteten jpg Deleted Files Yes 01 07 01 12 01 00AM 01 28 05 08 05 14AM LJ 22 Il Counterfeit finepri Deleted Files Yes 01 07 01 12 06 08AM 01 28 05 08 04 44AM Laz rl Mellon GIF Deleted Files Yes 01 07 01 12 11 58AM 01 28 05 08 04 56AM O 24 gl EAL 1 GIF Deleted Files Yes 01 07 01 12 12 00AM 01 28 05 08 05 18AM LJ 25 a EAL 2 GIF Deleted Files Yes 01 07 01 12 12 10AM 01 28 05 08 05 20AM LJ 26 a _TRONG GIF Deleted Files Yes 01 07 01 12 12 16AM 01 28 05 08 05 32AM LJ 27 il RANK2 JPG Deleted Files Yes 01 07 01 12 25 06AM 01 28 05 08 04 50AM LJ 28 C3 Bits No 01 28 05 08 04 42AM 01 28 05 08 04 40AM 96 EnCase Forensic Version 6 11 User s Guide View Pane The View pane contains tabs that display different views of the entry highlighted in the Table pane The View pane tabs display the content of the entry highlighted in the Table pane in different ways Some of the tabs are more appropriate than others for certain kinds of data Figure 16 Two View panes showing two ways to view the content top the Hex tab and bottom the Text tab where 1 are the tab toolbars 2 is the hexadecimal view in the Hex tab and 3 is the text view of the same object and 4 is the text in the Text tab Notice that the text representations in 3 and 4 are the same E Text ag doc WS Transcript HA Picture E Report FA Console 33 Details GJ outpu
427. rch identity recover and deliver digital information in a forensically sound and cost effective manner Since our founding in 1997 we have moved into network enabled investigations enterprise wide integration with other security technologies This section provides information on our support for you through E Reference manuals and release notes Support portal on the Web including access to downloads 8 Technical Support Department E Customer Service Department E Message Boards B Training B Professional Services Reference Manuals and Release Notes Guidance Software provides printed manuals for all of our product line as well as PDF versions of interim updates and Release Notes describing the new features and problems fixed Read this manual to understand the product and its use Before acquiring live evidence run several test acquisitions and try different processes for examining files 538 EnCase Forensic Version 6 11 User s Guide Technical Support Guidance Software provides a variety of support options including phone e mail online submission forms an up to date knowledge base and a message board technical forum Support is available from Sunday 7 00 PM through Friday 6 00 PM Pacific Time Monday 3 00 AM to Saturday 1 00 PM GMT This excludes public holidays in the United States and the United Kingdom during respective business hours Phone mail support US Contact Info 215 North Marengo Avenue Sui
428. rd graphical indicators mark the devices that are previewed or blocked via Fast Block or another write blocking device A blue triangle in the lower right corner of the device icon indicates a previewed device A blue square around the device icon indicates the device is write blocked by FastBloc In File File Is File Reporti Ext Type ciis Signature Description Filter Mame Deleted La 0 Physical Disk 312500000 Sectors 149GB 32 MA D Volume Sector 0 853 1 7MB FastBloc Previewed Device Previewing the Content of a Device Once devices and evidence files are added to the case file the devices can be previewed before they are acquired Note When a file is initially written to a multi session CD it is assigned an offset When the same file is changed it is written again to the CD as a new file in the new session but with the same offset Any number of revisions of the initial file are assigned the same offset The file and all of its revisions can be viewed Because the offset is used to associate bookmarks to the bookmarked entity bookmarks of content on multi session CDs will remount the first file it encounters with this offset when reopening the case Verify the device containing the content to be previewed was added to the case To preview the content of a device that was added to the currently opened case 1 Onthe Tree pane or Table pane of the main window look at the icon of the device b
429. rd Document Document LJ 42 Der optimistische A 1252 doc Word Document Document C3 43 Q Der optimistische A doc Word Document Document O 44 D FERAE doc 1252 doc Word Document Document LJ 48 byl yo Vala 1282 doc Word Document Document L1 46 UpCase 1252 C 47 E Boot 1252 L3 48 D Dg82 txt 20127 tt Text Document d 4 CHAPTER 13 EnScript Analysis EnScript Analysis 479 Enterprise EnScript Programs 481 EnScript Example Code 499 Packages 505 Send To HBGary Responder EnScript 511 480 EnCase Forensic Version 6 11 User s Guide EnScript Analysis The EnScript language is a scripting language and Application Program Interface API It is designed to operate within the EnCase software environment Although similar to ANSI C and Java not all the functions available in these languages are available The EnScript language uses the same operators and general syntax as C though classes and functions are different Classes and their included functions and variables are found in the EnScript Types panel in the Tree pane Note For general information on a particular element highlight it in the Code panel and press F1 to find the element in the EnScript Types panel EnScript programs allow investigators and programmers to develop utilities to automate and facilitate forensic investigations The programs can be compiled and shared with other investigators A programming background and a
430. re 535 Eegal Notification ndn ede Re DROIT RR ODORE ERIT IR DEDERAT IDEE e Re 536 Esso sesnetst 537 Reference Manuals and Release Notes sse entente trennen trennen 537 Technical Support ettet IRURE ER D AIEO I SATB VR late ives teres 538 C stomier SeTVICO 41 c oue etos et ue ei oeste Toe eoe s e Coe eoe sel Poet AR P eo Tuve eL oeste Dope ve A 543 TTaitutig eise heise eso ti Nili oid oi tnit Hits oisi es cepi bleibt c P i o ote os 543 Professional Services epe aire inepte i p tir e RUE E EH BE Cet Spe isar S itoen rias 544 Index 945 xiii CHAPTER 1 Introduction E Introduction 15 16 EnCase Forensic Version 6 11 User s Guide Introduction Thank you for purchasing your Guidance Software application You now own the world s leading technology for computer and enterprise investigation This application is just one of the many court validated Guidance Software solutions used by government agencies corporate organizations and law enforcement investigators around the world Guidance Software solutions provide an enterprise investigative infrastructure that enables corporations government and law enforcement agencies to conduct effective digital investigations respond promptly to large scale data collection needs and take decisive action in response to external attacks Guidance Software products have changed the landscape by providing complete immediate resp
431. reviews your mounted files and looks for CREDANT encrypted data If it finds this data a logon dialog displays 1 The dialog populates with a known user name and password Server Machine ID and the Shield CREDANT ID SCID CREDANT files are processed and decrypted with no further interaction CredentV5 2 1 163 BlowFish HD xi Credant Mobile Guardian credentials IV Online Username Password Al Server https 10 0 40 68 8081 xapi Offline Server File Path Machine ID tt vm1 Email Credent local Shield CREDANT ID CI TM22CU TN Analyzing and Searching Files 391 The offline dialog is similar The Online check box is blank and the Machine ID and SCID fields are unavailable CredentV5 2 1 163 BlowFish HD LI serate Machine ID Shield GREDATT TD x 99 2 Save the case once a successful decryption is complete The credentials entered in the dialog are stored in Secure Storage eliminating the need to re enter them 392 EnCase Forensic Version 6 11 User s Guide The illustration below shows results of a successful decryption E The Tree pane shows a CREDANT folder m The Table pane contains a list of decrypted files B The Text pane shows contents of a decrypted file Fie Et Mem Took reo bed sme Sree endzone A semen en eee LS x Eines cines lasery STmene Qos 5 code row Uinnis temet Records Cores Secure tone Pietra d Permssons i References LY nesh Propertes boae tene
432. ring Your Linux Distribution 48 Performing Acquisitions with LinEn 50 Hashing the Subject Drive Using LinEn 58 46 EnCase Forensic Version 6 11 User s Guide Introduction The LinEn utility runs on the Linux operating system and facilitates the following functions B Performing drive to drive acquisitions B Performing crossover acquisitions LinEn runs independently of the Linux operating system thus improving acquisition speeds and runs in 32 bit mode rather than 16 bit mode Because Linux provides greater device support LinEn can acquire data from a larger set of devices As with other operating systems to prevent inadvertent disk writes modifications to the operating system need to be made Linux typically has a feature called autofs installed by default This feature automatically mounts and thus writes to any medium attached to the computer Instructions in this chapter describe how to disable this feature to protect the integrity of your evidence Viewing the License for LinEn LinEn must be running and you must be on the LinEn main screen To view the license for LinEn 1 Press L The license displays 2 Press Enter The LinEn main screen displays Using LinEn 47 Creating a LinEn Boot Disc If you want to run LinEn on the subject machine you need to create a LinEn boot disc When you create a LinEn boot disc it is important to choose a Live Linux distribution as these types of distributions are designe
433. rk crossover LinEn B Local devices LinEn disk to disk Evidence files are added through the interface The evidence files involved include those created by a LinEn disk to disk acquisition You can add evidence files initially created for other cases to the currently opened case as well A network crossover acquisition involves both LinEn and the EnCase application LinEn disk to disk acquisitions create evidence files safely in the Linux environment without using a write blocker Dragging and dropping a file results in the file being added as a single file rather than an evidence file When an evidence file is dragged and dropped it is added to the case as an evidence file Doing a Typical Acquisition A typical acquisition consists of local device acquisition using Windows and a FastBloc write blocker 198 EnCase Forensic Version 6 11 User s Guide Acquisition Wizard Use the Acquisition wizard to perform acquisitions Before acquiring a device s content the device must be added to the case using the Add Device wizard The Acquisition wizard captures the specifications for the acquisition The wizard contains the following pages B After Acquisition page Optional Search page E Options page Each is explained in detail below m c 5 omm Working with Evidence 199 After Acquisition Page Use the After Acquisition page of the Acquisition wizard B to ease the acqui
434. rk with the database to perform their tasks O Initialize Database EnScript O Snapshot to DB EnScript O Snapshot DB Reports EnScript Each is discussed in detail below Initializing the Database The Initialize Database EnScript O initializes the database O maintains the database You must run this script first Working with Evidence 261 1 Make sure you set up an ODBC connection properly and note down the information used for that connection 2 Run Initialize Database EnScript The Initialize Database dialog opens Initialize Database PS Database Source Options Maintenance Options Data Source Name SnapshotToDB Enter User Name Not Needed If Using NT Authentication sa Enter Password Not Needed If Using NT Authentication DB Timeout Interval minutes s E v Show Queries in Console Database Name Snap v6 Choosing Database Sources Select the Database Source Options tab to specify connection information for the database Data Source Name This is the name you gave the ODBC connection when you created it Enter User Name Not Needed If Using NT Authentication Specify a user name If you set up the ODBC connection to use NT Authentication it remembers your user name so you do not need to enter it manually Enter Password Not Needed If using NT Authentication Like your user name you must specify a password to gain access to the database If you s
435. rl 1 1 C Documents and Settings jay reidy TS Desktop Hunter XP Ctrl 2 2 C Evidence V6 Hunter XP Forensic Ctrl 3 3 C DOCUME 1 JAYREI 1 TS Desktop HUNTER 1 Ctrl 4 4 C Documents and Settings jay reidy TS My Documents Hunter XP Ctrl 5 2 Browse to or select the case from the recent files list at the bottom of the menu and click Open Note You can also open a case by double clicking the case file in Windows Explorer 176 EnCase Forensic Version 6 11 User s Guide Saving a Case You can save a case B To its current filename and location see Saving a Case on page 176 in this document E With a new filename or a new location see Saving a Case with a New Name or New Location on page 176 in this document B To its current filename and location along with the application s current references conditions and filters see Saving a Case and the Global Application Files on page 176 in this document Saving a Case To save a case 1 Click File Save or click Save on the toolbar The Save dialog appears 2 If you want to use the case name as the file name and use the default path in My Documents click Save 3 You can also navigate to or enter a different filename and path and click Save Saving a Case With a New Name or New Location You can save any case with a new name or save it in a new location 1 Click File Save As The Save dialog appears 2 If you want to use the case name or current file n
436. rl C c New Folder Set Included Folders Num Include Sub Folders Shift Num Include Single Folder Ctrl Num 2 Click New The New Keyword Dialog appears SI x Search expression Code Page Keyword tester Search expression bomb GREP Symbols TwFFFF Unicode character xFF Hex character Name Any character Any number 0 9 Bomb 7 Repeat zero or one time pi A Repeat at least once Case Sensitive Unicode A z A through Z z Repeat zero times GREP Unicode Big Endian XYZ Either X Y or Z X Z Neither X nor Y nor Z JV ANSI Latin 1 urra X Literal character tab Group ab together for ute m n Repeat m to n times alb Either a or b Unicode View 0042 0062 004F 006F 004D Q06D 0042 0062 3 Complete the dialog as described here Search Expression is the actual text being searched Name is the search expression name listed in the folder Case Sensitive searches the keyword only in the exact case specified GREP uses GREP syntax for the search Note Previously the ANSI Latin 1 option was called Active Code Page Since the Active Code Page varied according to the Active Code Page running on the Examiner machine at the time it was replaced by ANSI Latin 1 to insure consistent search results ANSI Latin 1 is the default code page It searches documents using the ANSI Latin 1 code page 346 EnCase Forensic Versio
437. rmat AM or PM is attached as appropriate Profile Name is the owner of the message URL Name is the name of the URL where the message originated URL Host is the name of the URL host where the message originated Browser Cache Type shows the format in which cached data are stored Options include image code HTML and XML Browser Type is the browser where the artifact was viewed such as Internet Explorer or Firefox Last Modification Time is the last time the cache entry was updated Message Codepage is the code page type for reading this cache entry Last Access Time shows the last time the cache entry was retrieved or loaded Expiration is the time when this cache becomes stale and is deleted from the cache Visit Count is number of times this cache entry was accessed by the browser Server Modified is the last time the cached item was modified on the server where it was cached Analyzing and Searching Files 355 Internet History Searching Currently five browsers and two types of Internet history are supported They are B Internet Explorer history and cache Macintosh Internet Explorer history and cache E Safari history and cache E Firefox history and cache B Opera history and cache Note The difference between a regular search and a search of unallocated is that keywords are added internally and marked with a special tag indicating it is for Internet history searching only Comprehensive Internet History Searc
438. rt Sensitive LOLE Application Data a Application No No No LOD Archive C Application Data No No No PHB Code Archive No No No DI Database Code No No No D0 G Document Database No No No o0 G Email Cz Document No No No Hole Font C Email No No No rot meme Font No No No ono n C3 Internet No No No oe EU a Multimedia No No No gt Picture No No No cj Windows No No No s Hunter XPlHunter XP C PS 1659279 LS 1659216 CL 414804 SO 000 FOO LE 1 2 Select a folder from the Tree pane The figure shows Document types selected A list of the file signatures in the case appears in the Table pane iNew Open la Save print e Add Device Q Search J Logon Refresh i Qe EnScript Types 4 X E Table Report ig Code 5 91 4 File Signatures Name Extensions A Seach ERNEA se Fitter L9 1C Application ression eporl ensitive Application Data L 1 43D Meta File 3dmf 3DMF No No Yes LBE Archive og G 64LAN Image File l64 64LAN ID No No Yes pogi Code L3 33 Z 64NET Image File n64 C64 No No Yes gt Database 4 Adobe Encapsulate eps xC5 xDO xD3 xc6 No Yes No Tero o Document 5 4 Adobe FilmStrip File filmstrip RAND Mo No Yes b 9 Email j 6 Adobe Font afm StartFontMetrics No No Yes rero Font Lj 7 Adobe Illustrator ai IPS Adobe No No Yes DL Internet C 8 4 Adobe PDF pdf PDF No Yes Yes eg G Multimedia c Picture og G Ado
439. rted in txt file format You can export all keywords at one time or create a list of selected keywords for transfer 1 Right click a keyword in the Table pane 2 Select Export Complete the dialog Export Tree For Import J XML Formatted Only Checked Rows Start 1 zi Stop Output File Analyzing and Searching Files Fields CO Name LJ Filter LJ In Report C File Ext O File Type O File Category O Signature CO Description O Is Deleted export txt jal 3 Check Export Tree for Import and click OK Note To export a txt file into Excel do not select Export Tree Check XML Formatted to export table rows or the tree structure to an XML formatted file 351 352 EnCase Forensic Version 6 11 User s Guide Searching Entries for Email and Internet Artifacts Records are created when email or Internet history searches are performed EnCase searching can parse areas outside of logical file content unallocated clusters and volume slack for Internet History and add this data to the Records tab for further investigation The Search dialog box features a new checkbox Comprehensive search to support this feature When you select Search for Internet history the Comprehensive Search box is enabled Search Selected items only 829 Entries 0 Records Keyword Search Options Email Search Options C Search entries and records for keywords C Search for email 10 keywords Hash Option
440. s Create a Hash Set Analyzing files by identifying and matching the unique MD5 hash value of each file is an important part of the computer forensics process The hash library feature allows the investigator to import or custom build a library of hash sets enabling the expedient identification of any file matches in the examined evidence Computer forensics analysts often create different hash sets of known illegal or unapproved images hacker tools or non compliant software to quickly isolate any files in an investigation that are included in that set Hash sets once created are kept indefinitely and added to on a case by case basis Adding new files as time goes by saves time and effort in subsequent investigations Note When creating hash sets to identify suspect software such as non licensed software steganography or counterfeiting utilities it is important that the investigator carefully construct sets to prevent false positives Analyzing and Searching Files 341 1 Open the case and click Search The search dialog appears x Selected entries only B500 Fies Selected records oni I Records r Keyword Search Options gt f Emal Search Options Search each entry for keywords V Search for email Search each record for keywords Recovered deleted Selected keywords only P keywords IV Outlook PST R Search file slack v Outlook Express DBX Use intialzed size IV Exchange EDB Undelete fi
441. s BOG Anne 10 0241 cao Bees OTE mamen i o donna Fd OCC Erted Fies Credant i OC meon aog ase Pres tec tret Does Report I Conie I deisi Out C Lok C Codepage C 086 Gecrypted me successfully Good Jobt poe Cap 4535 AS OG VE arse Red E CQ T axis POY 4 peo G6 Ofisant c voint teg JAyty piot mias Eo YS MERO eie poje dN ANGE PIEH JPAD Wb Ae gu 2 36 y A OKO VOUS PV aH 18d e seSagfeo Wind 269 168 o Grd D atl 90 B2 0 KiS D A OAE BtgindtEA INE qadEwONT GeOB25_ E Ax ceci IDZA RMY KC bartiseul 745 iryCadpw P DOM COO Nue sL f Glires Tr aD traoo renee Tjon come oes A ount Orok C cedeoage Lione 0 THO TRO w Si SoUcjs VY I p SOE EMOT iNOS A S OE VR AMS Ris AA Ca qr el PEN HW saneta o0 OAS S as etort indt cuvolenr Fea Agi poet ei elo Y NES SO it exse uina Sparte P D sis gu Ey AS END iga Sav maa 20 Ormae 182 e seSoagrbo m ine 269 1581 s dvd cSpuetsyhAB2 O 565 Ca BA B n EA IE qm tEsUri BeGbC 1 08 Ax oes elo z5 20 RMy KC pieu aS uc G pw P n oC M Tm f if oft Ay Sreten al 5 MI qm L emat IQAWINGE 10 0 34 1 r Credantlenerypted notepad be PS 2245 15 2245 C 1711 50000 FOO LE Analyzing and Searching Files 393 Supported Encryption Algorithms EnCase s CREDANT decryption feature supports these encryption algorithms E AES128 E AES256 m 3DES m Rijndael 128
442. s Windows 312 399 989 149GB ASPI 854 1 7MB Windows 4 005 856 1 9GB ASPI 312 500 000 149GB ASPI 4 005 888 1 9GB Working with Evidence 191 Devices Tree organizes the device definitions to be added to a case Devices Root Object contains the default folders that reflect the types of devices defined at this point in the Add Device see Adding a Device on page 192 process Right click menu commands for this object determine m Which objects appear in the Sources tree B Which entries display in the Table pane when the object is selected Local Drives Object contains the current collection of child instances of the Local Drives device type entries on the Table pane Right click menu commands for this object determine E Which objects appear in the Sources tree E Which entries display in the Table pane when the object is selected Table Pane displays the children of the currently selected object in the Sources tree as entries in the table Right click menu commands for this object let you E Toggle the Read File System Column value B Copy an entry for use elsewhere as the copied entry cannot be pasted into the table m Select an entry B Edit an entry B Navigate to the parent object of the object containing the entry Device Selection Column contains a check box for each row To add a device click its checkbox then click Next Read File System Column If this setting not selected the file system is read i
443. s C Compute hash value Additional Options C Verify file signatures Identify codepages Search For internet history Comprehensive Search Note Selecting Comprehensive Search increases the time it takes to complete the search To create a record 1 Click Search A search dialog appears 2 Select options and click Start 3 Select Search for Internet History and Comprehensive Search to search for Internet history including searching file slack and unallocated space 4 When the search finishes click View Cases Sub Tabs Records Finding history and cache results may require moving down the tree several levels Analyzing and Searching Files 353 Newly created records display in the Table pane The Tree pane shows the type of record and the Table pane shows the files within that record If there are additional details regarding a file selected in the Table pane click Additional Fields in the Tree pane to see that information lol xl File Edit View Tools Help iNew Open gl Save Print Add Device Q Search 3 Logon 3 Refresh E cases Keywords X E Table JReport E Gallery Disk iy code Girone Te Entries U Bookmarks Q Search Hits 43Records f Devices Name Fiter la geach PS RS Centon a V Secure Storage Keywords C 1 O wueis 1 tgz e 88211 03 31 02 06 16 46AM Xd Home Additional Fields G 2
444. s was acquired Logical Size displays the byte size of the file Initialized Size is the size of the file when it is opened This applies only to NTFS file systems 104 EnCase Forensic Version 6 11 User s Guide Physical Size is the cluster size occupied by the file that is the physical disk space used by the file Given a cluster size of 4096 bytes the physical size of any file with a logical size less than 4096 bytes has a physical size of 4096 bytes A file with just one more byte 4097 bytes for example requires two clusters or 8 192 bytes of physical disk space The 4095 byte difference in the second cluster is called slack space Starting Extent shows the starting cluster of every file in the case The format displayed is evidence file number logical drive letter cluster number For example a starting extent of 1D224803 means that the file is on the second evidence file counting begins at zero on the logical D drive at cluster 224803 File Extents lists the number of extents a fragmented file occupies on a drive To view extents click the column value of the file being examined and select the Details tab of the Report pane You can also select the file in Table pane then select the File Extents sub tab above the Tree pane Permissions displays security settings of a file or folder TRUE indicates a security setting is applied To view security settings select the entry and click on the Details tab in the lower pane
445. s B Go to Parent BkSp console Ej Control Panel BOO accessibility HoE Appearance EQ Colors z oO o Logical oG Current E Size Do cursors C 8 CI NrUsER DAT ntuser dat LOG ntuser ini To view or mount registry files 1 Navigate to the registry file you want to view or mount 2 Continue with step 2 of Viewing File Structure The file structure of the registry file displays and component files or layers in the compound volume folder can be opened and displayed in the view of your choice Viewing File Content 301 Viewing OLE Files OLE is Microsoft s Object Linking and Embedding technology used in the Microsoft Office suite of products For example OLE allows an Excel spreadsheet to be seamlessly embedded into a Word document Microsoft Office documents that use this technology are layered compound files A Home Bookmarks Search Hits 5 Records Devices 2E Secure Storage Keywords a f Report i Galery Timeline fZ Disk 4g Code 5 TT z bone ree pies Wm a m SD Single Filesi Bone Di ddo 43 Copy Ctrl C a Export Copy UnErase Lr Bookmark Data Ctrl B View File Structure x This file has a Exchange Database signature Continue parsing Send To Analyze EFS J Calculate unallocated space Show Columns dor sema 3 do 13 d doc Cancel Column gt Gorg Compound Volume Sort gt
446. s according to the same function are different then the two inputs are different in some way On the other hand matching hash values strongly suggests the equality of the two inputs Analyzing and Searching Files 339 File Hashing Hashing creates a digital fingerprint of a file This fingerprint is used to identify files whose contents are known to be of no interest such as operating system files and the more common application EnCase uses an MD5 hashing algorithm and that value is stored in the evidence files The MD5 algorithm uses a 128 bit value This raises the possibility of two files having the same value to one in 3 40282 x 10 Any mounted drive partition or file can be hashed The hash value produced can be validated and used in the program By building a library of hash values the application checks for the presence of data with a hash value contained in the hash library The hash value is determined by the file s contents It is independent of the file s name so the file s hash value is calculated by the program and identified as matching a value in the hash library even if the file s name has changed Hash a New Case When a case is initially created it is not hashed Before comparing the case s data with a library of known or notable files hash the case The Table pane display may look like this Hash e Value Mame 4 gj HashSearchscreen 5 lal buttonsearch bmp 6 HashFinished Searc 7
447. s 16 bit words When Unicode fonts are selected 8 bit character sets and 7 bit ASCII characters do not display correctly Use an 8 bit font such as Courier New for English text To properly display the characters in certain code pages you should only select a Unicode display font Characters that are not supported by the font or code page display as a default character typically either a dot or a square Modify this character when using text styles in the Text and Hex tabs of the View pane Text Styles The display of non English language content is controlled by both the type face of the content and the text style applied to the content A text style applies various attributed to fonts including B Line wrapping B Line length m Replacement character E Reading direction B Font color E Class of encoding B Specific encoding Text styles are applied in the Text Hex and Transcript panes See Viewing Non Unicode Files and Viewing Unicode Files for more information You can create and edit text styles See Creating and Defining a New Text Style for more information Text styles are global therefore they are not associated with a specific case but rather can be applied to any case after they are defined 462 EnCase Forensic Version 6 11 User s Guide New Text Styles Dialog This dialog is used to define text styles that can be applied to text displayed in the Text Transcript or Hex tabs of the View pane This dialog consists
448. s are set by the email messages Outlook calendar entries created written and modified dates are set by the calendar applications Viewing File Content 311 Home t Entries Bookmarks Q Search Hits Z3Records Devices VD SecureStorage Keywords LL Heme PE M i Report E Gallery Timeline fZ Disk ig Code SOM e Entries gt B og E zs Dbx Files s Gzip Tar Evidence XR 1d Thumbs db Logic extend NE Logical Filter In File File 3 Singe Files gt Size Report Ext Type uu E BACKUP PST Ga Copy Ctrl C af Export View File Structure xj Copy UnErase This file has a PST signature Continue parsing LL Bookmark Data Ctri B IV Calculate unallocated space Create Hash Set IV Find deleted content evrom tai Send To c Analyze EFS ES show Columns Column b SoG PST Test File pst Sort gt eoo ie PST Hei Select Item Space ro e idi s 5 Go to Parent BkSp Ll lessage store To 9 name to id map BDO Root Folder BG Search Root OG SPAM Search Folder 2 Top of Personal Folders FA 1st Floor Kitchen Sink 2 Avaya Phones 2 DC reboots complete Deleted Items G Domain Controllers upd HOWE To view or mount an MS Outlook email 1 Navigate to the pst file you want to view or mount 2 Asneeded select Calculate unallocated space then select Find deleted content 3 Contin
449. s function in the background Analyzing and Searching Files 329 File Signatures with Suffixes A shadow directory is a directory type containing symbolic links that point to real files in a directory tree This is useful for maintaining source code for different machine architectures You create a shadow directory containing links to the real source which you usually mount from a remote machine The Vista operating environment uses shadow directories and EnCase software s ability to suffix a file signature takes these directories into account Extension suffixes are created by adding an underscore and asterisk to the end of the extension The figure shows such a TrueType extension and suffix ttf Edit True Type Font 31 xl Search expression Extensions Extensions delimiter ttf tbl ktF Viewing the File Signature Directory A File Signature table lists signatures the EnCase software recognizes The table is organized into data types such as B database B email B Internet 330 EnCase Forensic Version 6 11 User s Guide To view the table 1 Select View gt File Signatures from the menu bar A directory of file categories appears New O3 Open pj save c Prit Se Add Device Q Search 3 Logon Refresh i E cases Sy EnScrip4 gt x Report ig Code I 00 S File Signatures Name Extensions S peach In GREP Case Filter OO Application expression Repo
450. s included appear in the Table pane If the Include All icon is not green the data associated with that item does not appear in the Table pane Including All is distinct from highlighting in that Including All displays all the items in the branch from the selected entry to the leaf entries while highlighting displays only items contained in the highlighted item In the Tree pane including all is distinct from selecting because including all affects the contents of the table pane while selecting does not Initially Set Include displays the entries and objects in the Table pane in a hierarchical order Sorting columns in the table destroys this order which cannot be recovered except to cycle the Set Include Use the status line to see the parent for a particular entry in the table 120 EnCase Forensic Version 6 11 User s Guide Figure 23 Comparing Highlighting and Set Include where the contents of 1 the highlighted entry in the Tree pane as 2 it appears in the Table pane and where the content of the 3 Set Include entry that enables the rest of the Set Include entries in the subtree as 4 it displays in the Table pane Include propagates down the tree from 3 the entry initially included to the parallel entries
451. s the content of the bookmark as characters that conform to the format of a DOS directory entry Win95 Info File Record displays the content of the bookmark as characters that conform to the INFO data structure definition Win2000 Info File Record displays the content of the bookmark as characters that conform to the INFO2 data structure definition GUID displays the content of the bookmark as strings that conform to the Windows Globally Unique Identifier GUID format SID displays the content of the bookmark in the Security Identifier SID format Styles Use these text styles when working with non English languages For more information see Working with non English Languages on page 457 elsewhere in this document Bookmarking Items 411 Add Note Bookmark Dialog Use the Add Note Bookmark dialog to enter the note or text contained in a note bookmark A note bookmark can contain up to 1000 characters You can format the bookmark content as a whole A note bookmark can annotate another existing bookmark or add descriptions of events you want to include in a report Add Note Bookmark x Notes Babble Case 467 IV Show in report Formatting Increase font size points Iv Bold Italic Increase text indent 1 4 inch 0 Cancel Notes contains up to 1000 characters Show in report when checked the content of the note bookmark appears in the Report tab of the Table pane Formatting contains th
452. se Forensic Version 6 11 User s Guide The New Keyword dialog appears 2 Dothe following on the New Keyword dialog a Click GREP and enter the GREP expression into Search Expression to create a GREP search b Use the Character Map to create the search string if your keyboard is not mapped to the appropriate non English key mapping If mapping is correct enter the desired Search Expression c Make any other selections as desired d Doone of the following to test the keywords If you use another code page other than the currently selected one click Code Page and proceed to Step 3 Click Keyword Tester then execute Step 4 to test a keyword 3 Click OK The dialog closes 4 Dothe following a Select the desired code pages from the Code Page list b Click Keyword Tester to test the keyword otherwise click OK 5 Testthe keyword using the instructions in Testing a Non English Language Keyword section and click OK The dialog closes Working with Non English Languages 473 Testing a Non English Keyword Open the New Keyword dialog and define the tested keyword Search expression Code Page Keyword tester Keyword Code Page Motpae yrpo Name Code al aaen 28 Cyrillic KOI8 U 21868 C4 E4J CE EEJ C1 E1 D0 FOjCE EEycs 99 Cyrillic Mac 0007 E5 20 D3 F3 D2 F2 D0 F0 CE EE zj 31 I Cyrillic Windows 1251 32 g Estonian ISO 28603 Test data 33 S Ext Alpha Lowercase 2
453. se with the Case Time Settings dialog Case Time Settings i xj IV Account for seasonal Daylight Saving Time IV Convert all dates to correspond to one time zone Time Zone GMT Casablanca Monrovia Reykjavik GMT Greenwich Mean Time Dublin Edinburgh Lisbon London GMT 01 00 Amsterdam Berlin Bern Rome Stockholm Vienna GMT 01 00 Belgrade Bratislava Budapest Ljubljana Prague GMT 01 00 Brussels Copenhagen Madrid Paris GMT 01 00 Sarajevo Skopje Warsaw Zagreb GMT 01 00 West Central Africa GMT 02 00 Amman GMT 02 00 Athens Bucharest Istanbul GMT 02 00 Beirut GMT 02 00 Cairo GMT 02 00 Harare Pretoria GMT 02 00 Helsinki Kyiv Riga Sofia Tallinn Vilnius Lenin Daylight Setting Standard C Daylight Cancel The features of the Case Time Settings dialog are Account for Seasonal Daylight Savings Time applies DST rules as defined by the registry settings If you want to use the new 2007 DST rules ensure your machine is patched Convert All Dates to Correspond to One Time Zone enables the Daylight Setting and the Time Zone list This allows you to convert all times to match one time zone Daylight Setting is disabled unless Convert All Dates to Correspond to One Time Zone is checked Use the option buttons to select Standard or Daylight Savings time adjustments Time Zone List is also disabled unless Convert All Dates to Correspond to One Time Zone
454. sensseeeseseeeeeeeseseaes 153 la ING EG 153 Case File Format e scettr n tire te ten a detto ita vi esee ug tees ederent 154 CSC ipM P PE0 155 TheXOptions Dialog net et tete rese eid eden e diae tU M CD a 155 Case Related Feat fes dec ee pee ere o eeu e D i i given ase era ig dpades 157 Logon Wizard 5 sse Ee ERR t see Het etust tied eerte eerta 158 Logon Wizard Users Page eee Eee seti tese tili e tui eset 159 Users Right Click Menu eee ete eie reete HI e eere hotte rides 159 Browse for Folder Dialog sse tenete nennen 160 SAFE Page of the Logon Wizard tenete nennen 161 SAFE Right Clck Menu eee eue nre HER He Toei t ELE Ee EEEE ETETE 161 Browse or Folder Dialog cies em eene Re rises pte e n ep eerie titi eode 162 Edit SABE Dialoge EUR ROT HI IDE RE IS IU EI REDE SE rp eene deae 163 New Case Wizard siosio ro etie e REDE EH een Gr HIR RE ITE iei e ees staves 166 Role Page of the New Case Wizard sse tenente 167 Case Options Page of the New Case Wizard sse 168 BAA DEVICER M 168 SING A CASE XX M 169 Modifying Case Related Settings sss tenen nnne 169 TimeZone Seting Siei einen dase iane aA si tase R EREE aE E ne R TEAS iE E eee Sten Taaie 170 Case Fil Time ZONES iiber ei oido i aan priore a e ei ERR Ge HEREIN 171 Evidence File Time ZONES nacidos iaaio aan aaan e tidie tb
455. seseeeeeeeett enne nene 250 Recovering Folders from a Formatted Drive sss 250 Recovering Paron arei 250 Adding Partitions ee etti reve e ene ie i e REEE OEE et Pe ve eee e bag 251 Deleting Partitions sss aic estet pene ag ede M eO Ed etu ali d aere Seed odo 253 Restoring BVIdencex teo decernit etenietdrate te titre Dra tidi Data tn dite a 254 Physical vs Logical Restoration tenent eene nene 254 Preparing the Target Medi ii epit ese rentes E E E E prodire m re sr E 254 Physical Restore ed astu petet ete rang etuneti a AGT e ER tumet dat ape te ed ones 255 Logical R stOre esit tt aei dde d eee Gt bie ore di Ee e hier deed n 258 Booting the Restored Hard Drive c cccccscessssesseseessceeeneteesesesesnsnsnesescssseesecesessseseeseseeenenenesesesnsnenenes 258 Contents If the Restored Disk Does Not Boot ssssssseeeeeereenenennen nennen nennen 259 Snapshot to DB Module S bire prore eee tree tette tione tita te bono to tete itti eei TS 260 Imtializing the Database rte redet ere HU etoile de fuese tree nido isdeale 260 Choosing Database Sources sse eene tenente tenente 261 Maintaining the Database se teinededene tinere engrais eben ferie 262 Updating the Database rene fere eb esee ente Deseo dile tere ken E ai 263 Specifying Database Comten acsi gcse ieie aeeie aE tenente nennen tenent 265 Generating Reports on the Database cccccc
456. shdd2 Linux Disk5 devvhdd Linux 234375120 Sectors 3 7deu hdd3 Linux Size 111 8GB dev sdal Linux 00 0C FAT32X 40965750 19 5GB 00 0C FAT32X 61432560 29 3GB 00 0C FAT32X 65529135 31 2GB Disk9 dev sda Linux 64000 Sectors Size 31 2MB 80 04 FAT16 64448 31 5MB 3 Select Acquire The Acquire screen displays 4 Choose the physical drive or logical partition you wish to acquire Using LinEn 53 The Acquire Device drive dialog displays Path and file name eg Folden Name For the data elements requested by the Acquire dialog either accept the default or enter a value or choose one of the alternatives as described in Specifying and Running an Acquisition Press Enter The Acquire Device dialog requests additional data values until all data elements have been entered or selected Then the Creating File dialog displays When the acquisition is complete click OK The LinEn main window displays The subject has been acquired and is stored on the storage drive Connect the storage drive to investigator s machine Add the EnCase evidence file using the Sessions Sources page of the Add Device Wizard as described in Completing the Sessions Sources Page 54 EnCase Forensic Version 6 11 User s Guide Acquiring Device Configuration Overlays DCO and Host Protected Areas HPA EnCase applications can detect and image DCO and or HPA areas on any ATA 6 or higher level disk drive These areas are detected using LinE
457. side the pane Panes are resizable Physical Disk Emulator PDE The EnCase Physical Disk Emulator lets examiners mount computer evidence as a local drive for examination in Windows Explorer This feature allows examiners many options in their examinations including the use of third party tools with evidence served by EnCase Glossary of Terms 531 Port A virtual data connection that can be used by programs to exchange data directly instead of going through a file or other temporary storage location The most common of these are TCP and UDP ports used to exchange data between computers on the Internet R Redundant Array of Independent Disks RAID A data storage scheme using multiple hard drives to share or replicate data among the drives Depending on the configuration of the RAID typically referred to as the RAID level the benefits of RAID are B increased data integrity B fault tolerance B throughput or capacity compared to single drives Regular Expression A string that describes or matches a set of strings according to certain syntax rules Many text editors and utilities use egular expressions to search and manipulate bodies of text based on certain patterns Many programming languages support regular expressions for string manipulation Also see GREP Root The base of a file system s directory structure or the parent directory of a given directory 532 EnCase Forensic Version 6 11 User s Guide
458. signature of a deleted folder when the signature matches EnCase applications can rebuild files and folders that were within that deleted folder Se EnScript Types x E3Home T Bookmarks 3 Search Hits 34 af File Extents Permissions Referenc lt 4 too te Entries a Hopf Jeff s 1 2g lt a Lo E Export GHD Oost Id Copy Folders Lr Bookmark Data Ctrl B 4 Bookmark Folder Structure v v Copy UnErase Activate Single Files Create Hash Set Create Logical Evidence File d Acquire Restore Hash Analyze EFS Note that in the figure the C drive device is selected in the background display Recovering NTFS Folders EnCase applications can recover NTFS files and folders from Unallocated Clusters and continue to parse through the current Master File Table MFT records for files without parent folders This is particularly useful when a drive has been reformatted or the MFT is corrupted Recovered files are placed in the gray Recovered Folders virtual folder in the root of the NTFS partition To recover folders on an NTFS partition 1 Right click on the volume and select Recover Folders 2 The Recover Folders message box opens to confirm that you want to scan the volume for folders 3 Click OK to begin the search for NTFS folders or Cancel to cancel the request Working with Evidence 249 4 The application begins searching for MFT records in the Unal
459. sition of subsequent disks B to enable search hash and signature analysis to launch automatically after the acquisition is completed B to determine what happens to the new image E to restart a cancelled acquisition After Acquisition sting Evidence File 200 EnCase Forensic Version 6 11 User s Guide Acquire another disk enables the investigator to work through a series of acquisitions typically floppy disk content without adding a new device for each acquisition When Acquire another disk is checked E Replace source device is disabled B Search Hash and Signature Analysis is enabled Search Hash and Signature Analysis opens the Search page of the Acquisition wizard where search hash and signature analysis are defined after clicking Next New Image File Group controls in this group determine how the newly acquired image is saved The default is Replace source drive Do not add excludes the newly acquired image from the currently opened case Add to Case adds the newly acquired image in the case file associated with the device where the image was taken Replace a source device adds the newly acquired image to the case and removes the previewed device where the acquisition was made Restart Acquisition restarts a cancelled acquisition If the acquisition was interrupted but not cancelled that acquisition cannot be restarted When you check Restart Acquisition Existing Evidence File and its associated browse
460. slu4ENLpZuJHOCuajiuHaCUDJbtsaSDprA513CfwVfno q7PQhfjl 0488276256qWrry anlhuheljuCIl zFCurfNBBFhfLj4t 8xhLYSua lClpIDHyXaj8 X qVJxtatrcSXSdsmSI 1e3 85U 048827714rvhEieEfllZuSVboOpfXH7o4tCkx kuxcn7UBW4gWeXDvNwSASTRzjEdlqYzGQBibDVJolLdg HiUTcYUGsUnlEF 4 amp Case 1 Jeff s 1 2q C Unallocated Clusters PS 1171147 LS 1171084 CL 145825 SO 495 FO 48825839 LE 1 Ctrl C Ctrl G Ctrl A Ctr F Bookmar Comment a Cancel Data Type Destination Folder bel Types LIJ Bookmarks EHG Picture LE Picture LE Base64 Encoded Picture LEJ ULE Encoded Picture Integers Dates Windows Styles Case 1 Jeff s 1 2g C Unallocated Clusters To view Base64 and UUE encoded files 1 Highlight the file in the Table pane so that the content of the file appears in the Text tab of the View pane 2 Highlight the first character right click and click Bookmark Data 318 EnCase Forensic Version 6 11 User s Guide The Bookmark Data dialog appears 3 In Data Type select either Base64 Encoded Picture or UUE Encoded Picture The picture displays in the Contents pane NTFS Compressed Files EnCase decompresses views and searches NTFS compressed files in real time or in an on the fly manner by detecting a compressed file then automatically preparing it for analysis The investigator can view uncompressed file data in the Disk tab of the Tab
461. software com Specifications and information contained in this manual are furnished for informational use only and are subject to change at any time without notice Contents CHAPTER 1 Introduction Trt od UctOnmY deo S Dose Les ett dieere tM eft Etude o A iUe CHAPTER 2 New Features Snapshot to DB Module Set tenentem Lotus Notes Local Database Encryption tenentes EnCase Examiner Support for Microsoft Vista ccccesesessssssesssceseceeeeeneesesesesnensnesesssesceseeeeesneneseseseanens 64 Bit EnCase Servlet iuncta eap t ht ierat ed p e robe ted dud E Send to HBGary Responder EnScript ccsccscsssescssssssssstesesesesesnsenessscsceceeeeesesesesesesesnesneseassseceeseeensseeeees CHAPTER 3 Installing EnCase Forensic The EnCase Installer eter dite iesietebeid aep pied eben ebrii Ea EAT RAEE Saati is Minimum Requirements eis iesi eissii er inienn i eia ea nne n Se a EE E EA E EES E EEn aaeei Installing the Examiner endete rete ee eere irre E E e eret eee e E Installed Files era Seen ei ee ro ERR EE HERR RERO Uninstalling the Examiner ei renei iria PERE EEE nenne enne eren Rernstalling the Examiner eee ete me tee tein e e pe e eese e e ehe eee Installing Security Keys acce cemere ee ete a rated vetas ir ode dei teres Troubleshooting Security Keys enseli eremo e e eaa a oaa aE poete nie dosi iro d ide Obtains Updates ccs btiseeteitettintetiitre bati Betreiber slit i es Configuring Your EnCase Application
462. sole The LinEn Main Screen displays 3 Select Mode then select Direct ATA Mode The disk running in ATA mode can now be acquired 4 Continue the drive to drive acquisition with Step 3 of Doing a Drive toDrive Acquisition Using LinEn Using LinEn 55 Mode Selection LinEn starts up in BIOS mode A disk acquired in this mode reports only disk size seen by the BIOS As a result no data contained in a DCO are seen or reported The Mode selection in LinEn provides a solution Notice Disk1 in the figure It shows a disk size of 26 8 GB If this is acquired now only that quantity of data is identified The Linux distribution in use must support Direct ATA mode for this function to work To test for the presence of a DCO 1 Start LinEn in the normal manner on a computer that supports Direct ATA The main screen shows a Mode button 2 Enter M to select Mode A second screen displays offering three acquisition selections E BIOS m ATA E Cancel 3 Enter A to select ATA Mode 56 EnCase Forensic Version 6 11 User s Guide If a DCO is present on the disk the original LinEn screen reports the correct disk size and the correct number of sectors Disk1 in the following illustration shows the true disk size 75 5 GB ee ao pe Acquire the disk according to protocol Doing a Crossover Cable Preview or Acquisition You have a LinEn boot disk The investigator has identified the subject drive to be acquired
463. sscsssssesssesseesnetesesesesnsnsnesessssscececeeeenenesesesesnsnensnenessseeees 266 Using the Snapshot DB Reports Dialog ssssseeeeeeneneneeerne eene eene 268 WINEN ar A 270 IR nning WIDE eee dit nd ie ate eer d e cse tiom torre ee et tein na set da eel eb eds 271 Command Line OpOonS ziiitee edere ne di eti ee tei e eese tag 272 Conf tat oni File ste e eet eet tosta a geb uie Fuge v v tie epo 273 Configuratiori File INOteS v5 eror tere it pto i aed ea e eene 274 Prompt fOr D H PM 274 Error Handling eer etaient tae iple edid tees eU DERE R EFI ru ge 274 Additional WinEn Information sese nennen tenes 274 CHAPTER 8 Viewing File Content 277 Viewing Files 286 coli AS uoa medinm Oe ee HUM bon en etes rib ri eid 278 Copying and Unerasing Files and Folders essere 279 Copy and Unerase Features sse eene nennen enne nnne 279 Copy UnExrase Wizard aese e ee PRESA Hire etre ioi eee 280 File Selection Page of the Copy UnErase Wizard essen 281 Options Page of the Copy UnErase Wizard essen 283 Destination Page of the Copy UnErase Wizard 285 Copy Folders Dialog zte uet te rH ROO RAE REID UH RE 286 Copying and Unerasing Files entes cosa d eda muere ERO REEL ERE ETETEA 288 Completing the File Selection Page sse nennen 289 Completing the Options Pag s rossini eiris i aar aiT EE
464. ssions UNIX LY OLK Folders Containing Attachments y Yahoo Web Mail Pages LY Hotmail Web Mail Pages LY Netscape Web Mail Pages LY Hotmail Pages LY Yahoo Mail Pages LY Deleted Files LF Files after n date LY Files before n date LYF Filter ANY after n date Y Filter ANY before n date LY Find Mixed Types Y Find files between any dates LY Unique Files by Hash Right click on a filter to open a sub menu j Edit Source gt Run Sf Edit Enter a Mew Insert X Delete Delete E Export Import Rename F2 i New Folder Use New to create filters based on set conditions that are menu selectable Created filters reside in an initialization file C Program Files V EnCase6 Config filters ini Filters are saved globally within the EnCase program 130 EnCase Forensic Version 6 11 User s Guide Creating a Filter New filters of your own creation can be added to the list Display the Filter list in the Filter pane then create a new filter 1 Right click topmost Filter icon A sub menu appears E 4 EnScript T Filters KE Conditions Display 2 Queries A Text Styles E T Fire y gi x Export Y Import FT LJ New Folder LT Expand Contract Space LY Expand All LY Contract All Y Hotmail Web Mail Pages f Netscape Web Mail Pages f OLK Folders Containing Attachments f Search File Permissio
465. t Mi Lock E Codepage RJ 1 40659 1 0o08 00 oO OO Ol OO OO OO OO 10 OO OO Ol OO OO OO 10 OO OO OO 28 O1 OO OO 28 01 OO lo a p v v v6 6668 iai Saa l 02700 00 0 0 00 OC 29 00 OO OO OO Ol OO AO OO SE OO 00 OO 00 OO OB 29 00 00 OO OO teres j DQenpeeeeegeeee 05401 00 AE 9B FB 75 C6 0l 82 77 AE 9B FB 75 C6 01 82 77 AE 9B FB 75 C6 01 OB Dw amp O uE DweO uE DweO uE 08174 AO 6 1 72 C7 01 00 00 00 OO 00 00 00 OO OO 00 00 OO OO OO 00 00 00 OO OO 10 t oQrQeeeeeeeeeeeeeeeeeeeei 10800 00 00 00 26 Ol 7B 00 35 00 32 00 38 00 46 00 38 00 32 00 38 00 31 00 2D OO 46 6 5 2 8 F 8 2 8 1 F j13500 46 00 45 00 42 00 2D 00 34 00 42 00 38 00 37 00 2D 00 38 00 38 00 42 00 43 00 F E B 4 B 8 7 8 8 E C 1622D 00 39 00 45 00 46 00 41 00 33 00 39 00 34 00 32 00 38 00 33 00 36 00 33 00 7D 9 E F A 3 9 4 2 8 3 6 37 18900 00 00 OC 29 00 00 00 00 Ol 00 68 00 52 00 OO O0 00 00 OB 29 00 00 00 00 Ol 00 D Qe Sie wie 21682 77 AE 9B FB 75 C6 0l 82 77 AE 9B FB 75 C6 0l 82 77 AE 9B FB 75 C6 01 OB 74 AO DTwe amp Q uE DweO uE DweO uE t 2436F 51 72 C7 01 00 O0 OO 00 o0 OO OO O0 OO OO OO O0 OO 00 00 OO OO 00 O0 10 OO OO jo rGeees eee tmm mmn j27000 00 08 O02 7B OO 35 00 32 00 38 00 46 00 38 00 7E 00 31 00 00 00 00 00 OO OO OO 5 2 8 F Beetle nnn 229700 00 00 00 00 00 00 10 OO 00 00 O2 00 00 OO ee E Tex amp lHex hno WE Transcript E Picture E Report 7 console 33 details GP Output E Lock C
466. t and designate an output location and file name in the Output File field TTT 6 6hhhlX Export Tree For Import Fields A Name Only Checked Rows S Preview Start AM Hit Text 14 Entry Selected Stop LJ File Offset 14 LJ Length Active Rows O Filter 1 J In Report Output File C Documents and Settings jay reidy TS3Desktoplexpc 5 eme A delimited text file is created Save the reports in accordance with local policy Quick Entry Report Often a quick report containing information regarding one particular file in a case is needed Start by opening a case that has bookmarked files then locating the file you want to report on 1 Select the file to use to generate a report E Table C Report E Gallery Timeline Disk 4 Code Name Hon NX Description d LANI Kk bookmarks htm htm Mo File Invalid Cluster Arc Web Page LJ 14 Ly bookmarks htm htm No File Invalid Cluster Arc Web Page ie 5 bookmarks html html Yes File Deleted Overwritte Web Page 2 In the View pane click Report 454 EnCase Forensic Version 6 11 User s Guide A short report displays Table Ez Gallery 2 Timeline pisk 9 Code Bookmarks Page 1 Search Summary Hits First Searched Last Searched Search Text 7722 11 09 06 12 32 14AM 11 09 06 12 33 08AM DOS 249 11 09 06 12 32 14AM 11 09 06 12 33 08AM Bomb Case Time Settings Account for seasonal Daylight
467. t corrupt and unusable The next section discusses these tests Viewing File Content 305 Testing an EDB File This section describes how to determine whether the EDB database is in a usable state Acquire the EDB database including the entire bin and mdbdata folders prior to running these checks Make sure all codepages are installed on your computer The mdbdata folder contains the public and private databases and the transactional logs which are most important when cleaning a database The BIN folder contains eseutil exe 1 Run eseutil exe from WindowsStart5 Run 2 Use the eseutil exe command line tool to check the consistency of the state field as follows O file location eseutil mh filepath privl edb O file location eseutil mh filepath publ edb If the EDB file is in an inconsistent state first try to recover as follows O c Exchange BIN Eseutil exe r E Click Yes to run the repair Note that the three character log file base name represents the first log file Files are sequentially named with E log being the first log file Run a check step 2 on the resulting EDB file If the file is still in an inconsistent state attempt to repair the EDB file This may result in the loss of some data currently in the log files Run the repair as follows O c Exchange BIN Eseutil exe p For additional information on the Eseutil
468. t pane Text styles are defined globally on the Text Styles tab When defined these text styles are not associated with a case In the Filter pane you can B Create text styles B Edit text styles E Apply text styles to content in the View pane 460 EnCase Forensic Version 6 11 User s Guide The Options Dialog Font Tab This Options tab contains a list of EnCase interface elements that you configure to support non English languages Each of the listed elements has font settings associated with it Double clicking an element opens the Font dialog where you select the associated settings Ce 0o Case Options Global NAS Colors Fonts EnScript Storage Paths Enterprise Default Fonts S Status Bar and Tabs Iz Dialog Boxes Ez Trees Ez Tables Ez Report Title Ez Report Fixed Iz File viewers Ez Script Editor Default Fonts contains the list of interface elements to be configured Double clicking on these interface elements opens the Font dialog Selecting a Unicode font enables non English language text to display in these interface elements Working with Non English Languages 461 Unicode Fonts Specific fonts in the Fonts dialog are installed in Windows If no Unicode fonts are installed on your computer see Install the Universal Font for Unicode at http office microsoft com en us help HP052558401033 aspx http office microsoft com en us help HP052558401033 aspx Unicode interprets fonts a
469. t the defaults in the Add Raw Image dialog or change them as desired then click OK A Disk Image object appears in the Entries tree which is on the Cases gt Entries gt Home tree pane Working with Evidence 235 Remote Acquisition Setting up the remote acquisition Examiner side 1 Start by adding the machine you want to acquire just as you would any other Enterprise node Add Device Vlin2k3 x32 Cube251 MKR Win2k3SP2 x32 Cube251D Robby Win2k3 x32 Cube251M TBE WiinVistaEnterprise x32 Cube251C Tiktok FreeBSD 6 2 Cube251C Erasmus MacOS X Cube251C Voltron Win2k3SP2 x64 Cube251C Gnut WinXPSP2 Cube251C Bishop WinZkNODE Cube251D R202 SlackWare 12Node Cube25 1D Gort MacOS 9 Cube251D KITT alo 2 Click Next 3 After you choose the machine select the devices you want to acquire Choose Devices as F sa SEVEN OF NINE 10 0 36 39 C SEVEN OF NINE 10 0 36 39 E 976 773 168 465 868 E SEVEN_OF_NINE 10 0 86 39 3 976 773 168 465 868 E GEVEN OF NINE 10 0 36 39 4 976 773 168 465 8GB SEVEN OF NINE 10 0 36 39 5 976 773 168 465 868 i SEVEN_OF_NINE 10 0 36 39 6 976 773 168 465 8GB 4 Click Next 236 EnCase Forensic Version 6 11 User s Guide 5 Right click the device you want to acquire then click Acquire Ea Export X Close Delete Copy UnErase Copy Folders Lr Bookmark Data Ctrl B Bookmark Folder
470. tal number of bytes that comprise the file or files being created Path contains the path and filename within the file system of the investigator s machine of the file or files created Replace first character of FAT deleted files with determines which character is used to replace the first character in the filename of deleted files in the FAT file system Split files above contains the maximum length not exceeding 2000 MB of any file created by the copy and unerase operation When the total number of bytes comprising an output file exceeds this value the additional output is directed to and continued in a new file Copy only selected files inside each folder If individual files were selected within a folder or folders this setting determines if only the files or all the files in the folder will be copied and unerased Show Errors When selected the application does not query the user when errors occur This allows unattended execution of the copy and unerase operation 288 EnCase Forensic Version 6 11 User s Guide Copying and Unerasing Files FAN occi COME pese To copy and unerase a file 1 Inthe Tree pane highlight the folder containing the file or files to be unerased The Table pane displays the contents of the folder 2 In the Table pane highlight the file or select the files you want to unerase Viewing File Content 289 3 Right click on the highlighted file and click Copy UnErase The File Selection page of
471. te 250 Pasadena CA 91101 Phone 1 626 229 9191 Option 4 Fax 626 229 9199 UK Contact Info Thames Central 5th Floor Hatfield Road Slough Berkshire UK SL1 1QE Phone 44 0 1753552252 Option 4 Fax 44 0 1753552232 Toll Free Numbers Germany 0 800 181 4625 China 10 800 130 0976 Australia 1 800 750 639 Hong Kong 800 96 4635 New Zealand 0 800 45 0523 Japan 00 531 13 0890 Online support Guidance Software offers a Support Portal to our registered users providing technical forums a knowledge base a bug tracking database and an Online Request form The Portal gives you access to all support related issues in one site This includes B User product Beta Testing and foreign language forums message boards E Knowledge Base 8 Bug Tracker B Technical Services Request Form Guidance Software 539 E Downloads of previous software versions drivers etc B Other Useful Links Although technical support is available by e mail you will receive more thorough quicker service when you use the online Technical Support Request Form https support guidancesoftware com node 381 Note that all fields are mandatory and filling them out completely reduces the amount of time it takes to resolve an issue If you do not have access to the Support Portal please use the Support Portal registration form https support guidancesoftware com forum register php do signup ucl al ee rec Ts lo ws jme lh L
472. te a font with the listed case element The font can be defined in terms of m Font B Font style E Size B Script The script attribute enables you to select the character set used 38 EnCase Forensic Version 6 11 User s Guide EnScript Tab This tab enables you to specify the location of the include files library used by EnScript programs Options Case Options Global NAS Colors Fonts EnScript Storage Paths Enterprise Include Path include Include Path displays the path and name of the folder that contains the include files library Installing EnCase Forensic 39 Storage Paths Tab The storage paths tab captures paths used for several files used by the EnCase application Options 0l Storage Paths Index Folder C Documents and Settingsijay reidy TS Desktopi Index el Record Cache Folder C Documents and Settings jay reidy TSYDesktopiParseCache a Case Backup C Documents and Settings jay reidy TSYDesktopYBackup Kl INI Files Name writable f Keyword C Documents and Settings jay reidy TS Desktop A Text Style C Documents and Settings jay reidy TS Desktop f File Signature C Documents and Settings jay reidy TS Desktop 5f File Type C Documents and Settings jay reidy TS Desktop 5f File Viewer C Documents and Settings jay reidy TS Desktop Ey Security ID C Documents and Settings jay reidy TS Desktop Sf Package C Documents and Settings jay reidy T
473. ten date oo Mie Entries y ag a 1 s Dbx Files s Gzip Tar Evidence amp Log Extend MB Thumbs db gt I Extend 3 Thumbs98 db oo E Thumbnail Cache Volume V2 OO Re ENG m O 4 8g Thumbs db m In File File File Name Filter Ext sd em Signature 3 14 By Secure SDS 1E SS UpCase 1 Thumbs98 db 1 dh Davadew Matahase Database 17 Thumbs98 db encr a Copy Arke 1E Thumbs Xp db gf Export ase Database 15 Q Thumbs_2k db aH ase Database 2C 35 MFT Allocation Bitmap Copy UnErase 021 BI unallocated Clusters L Bookmark Data Ctrl B L ico iestructure eee This File has a Structured signature Continue parsing Send To Calculate unallocated space Analyze EFS Column Sort Select Iter LT Goto Parent Show Columns m Space i E Table Report E Galery gt Timeline Disk ig Code i In File File File ra gte Report Ext Type Category O 1 D mate Zips willam SchimmellschimOS jpg JPEG Picture r G 2 D matt Zips william Schimmelischim01 jpg JPEG Picture 3 bal D matt Zips william SchimmellDolphin jpg JPEG Picture i Dmattizips william Schimmel DCOTE jpg JPEG Picture Lan ul D matt Zips
474. that was inside the selected partition Booting the Restored Hard Drive After the restore operation has finished with no errors remove the target hard drive from the storage system and place it into a test system Switch the power on Depending on what operating system the subject ran the test system should boot up exactly as the subject computer There are quite a few difficulties that can occur at this stage of the investigation The most common is that the clone of the subject drive will not boot Before trying anything else check the restored disk using FDISK and verify it is set as an Active drive If not set the drive as Active using the FDISK utility and it should boot Working with Evidence 259 To boot the restored hard drive 1 Ensure the intended restoration drive is at least as large as the original from which the image was taken Install a sterile restoration drive to your forensic machine using a connection other than IDE 0 Note EnCase cannot restore a physical drive to IDE 0 Create but do not format a single partition on the restoration drive Using Report pane note the disk geometry of the forensic image of the drive you are restoring from so the physical geometry used is correct Restore the forensic image of the physical drive to the restoration drive using the Restore Drive setting To make the restored drive active in Windows right click My Computer and select Manage gt Disk Management and then
475. the language is read right to left Gh me coats Na Click OK if you are using a code other than Unicode Big Endian encoding Otherwise select the Code Page tab 6 Click Unicode Big Endian then click OK A new text style is created and defined If you are going to use a non Unicode encoding 1 Click Other 2 Select an encoding from the Code Page list 3 Click OK Working with Non English Languages 471 Creating Non English Keywords Creating non English keywords is the first step to take before searching non English language content New Bookmark Data sf Export Import Add Keyword List 43 Copy Tree New Folder Expand Contract Expand All Contract All Set Included Folders Num Include Sub Folders Shift Num Include Single Folder Ctri Num New Keyword E Croatian Mac E Cyrillic 00S E Cyrillic S0 Cyrillic KOI8 R I Cyrillic KOI8 U Iz Cyrillic Mac Iz Cyrillic Windows Ez Estonian 50 E Ext Alpha Lowercase Ez French Canadian DO3 Iz German 145 New Keyword Search expression Code Page Kepwordtester 28 5 Cyrillic KO18 U 0 S Cyrillic Mac M E Cyrillic Windows I2 Estonian ISO 33 Ext Alpha Lowercase M French Canadian DOS To create a non English language keyword 1 Right click and select New from the root of the Keywords tree 472 EnCa
476. the storage computer In Windows 98 click Start and select All Programs Accessories gt System Tools DriveSpace Launch DriveSpace Select the FAT16 partition containing the compressed 000 file Select Advance Mount Select DRVSPACE 000 and then click OK noting the drive letter assigned to it The Compressed Volume File 000 from the previous drive is now seen as folders and files in a new logical volume Acquire this new volume Create the evidence file and add to your case You can now view the compressed drive 232 EnCase Forensic Version 6 11 User s Guide Acquiring Firefox Cache in Records This feature parses Mozilla Firefox cache data The parser correctly extracts all available information by reading map files that contain information about a cache entry and where it is located When you select Search for Internet History from the Search dialog the EnCase program searches for specific files and attempts to parse them as Mozilla Firefox cache files When the search is complete these columns are shown in the Table pane E Name m Filter B In Report B Search Hits B Additional Fields E Message Size B Creation Time m Profile Name m URL Name m URL Host E Browser Cache Type E Browser Type B Last Modification Time m Message Code Page B Last Access Time B Expiration B Visit Count B Server Modified Working with Evidence 233 Reacquiring Evidence When you have a raw evidence file which orig
477. then select Copy Folders The Copy Folder dialog appears 4 Modify the settings on this dialog as desired For more information see Copy Folders Dialog on page 286 The copy operation begins As it runs the thread status line provides an indication of progress When the thread completes a results dialog appears The results are saved in the appropriate folder in the file system Note The thread status line provides an indication of progress You can terminate processing at the thread status line File Viewers Occasionally an investigator finds file types that EnCase applications do not have the built in capabilities to view or you might want to view a file type using a third party tool or program In either situation you must B Add a file viewer to your EnCase application See Adding a File Viewer to your EnCase Application on page 294 E Associate the file viewer s file types with the viewer See Associating the File Viewer s File Types with the Viewer on page 295 File Viewer Features EnCase applications provide the following file viewer features E New File Viewers Dialog E View File Type Dialog Viewing File Content 293 New File Viewer Dialog Use the New File Viewer dialog to add file viewers to your EnCase application New File Viewer x Name File Yiewer1 Maximize View Window Application Path Command Line trie Cancel Name is the name of the file viewer Maximize View Dialog
478. ther files Examples of compound files include email messages and their attachments or zip files and the files they contain Viewing compound files expose their file structure EnCase Enterprise can view the structure of these types of compound files 8 Outlook Express DBX E Outlook PST E Exchange 2000 2003 EDB B Lotus Notes NSF for versions 4 5 and 6 m Mac DMG Format B Mac PAX Format JungUm Korean Office documents E Zip files such as ZIP GZIP and TAR files E Thumbs db files B Others not specified Viewing File Content 279 Some audio files video files and certain graphic file formats are not immediately viewable however investigators can associate third party viewers to examine these files properly Copying and Unerasing Files and Folders EnCase Software recovers and unerases files on a byte per byte basis This feature is called Copy UnErase Use the unerase function to view deleted files within Windows Deleted files on a FAT volume have a hex VxE5 character at the beginning EnCase applications allow you to replace this character with one of your choice The underscore _ character is used by default The Copy UnErase wizard provides settings for unerasing the file and the character used to replace the deleted file character Copy and Unerase Features EnCase applications provide the following Copy and Unerase Features E Copy Unerase Wizard E Copy Folders Dialog Note The Copy Unerase functionalit
479. top Sector dialog appears 5 Accept the default or enter the desired Stop Sector and then click OK The Hash Results dialog appears Working with Evidence 241 6 If you want the hash result to be written to a file click Yes If the hash value is to be saved to a file the Save Hash Value to a File dialog appears otherwise the LinEn Main Screen appears 7 Enter the path and filename of the file that will contain the hash value and then click OK The hash value is saved and the LinEn Main Screen appears A hash value is calculated for the selected sectors of the selected file If desired this hash value is saved to a file Hashing the Subject Drive Once Previewed or Acquired If you want to hash a device without leaving the Windows operating system you can hash directly from EnCase The device must be previewed or acquired 1 On the Entries tab on the Tree pane right click the device you want to hash 2 Select Hash La X Start Sector Stop Sector J 2503871 Cancel 3 Enter the following a Supply a Start Sector or accept the default which is the first sector of the device b Supply a Stop Sector or accept the default value which is the last sector of the device 4 Click OK OOOO LL LS Status Completed M Console Start 05 24 07 09 09 13AM Stop 05 24 07 09 09 30AM M Note Time 0 00 17 Name Jeff s 1 2g V Log Record Start Sector 0 Stop Sector 2 503 871 Hash Value 8CBEGBEBCFC58
480. tput C Lock E coder Name These tabs keep track of B currently running threads E local variables Locals at the current breakpoint B library dependencies B breakpoint locations associated with the EnScript program You can set breakpoints within your code EnScript stops when it reaches a breakpoint during runtime Use the right click menu to set a breakpoint Siisol Namelienflass Tisti x9 Toggle Breakpoint Dm Toggle Bookmark Ctrl Shift X E kJ Next Bookmark Ctrl Shift N se er EnScript Analysis If you prefer you can set breakpoints by left clicking on the line number of the code Table Pane Ej Table E Report i Gallery 9 Timeline f Disk 3 Case Processor gt v6 StepMOM Rg NSF Parser 3 v6 Adv Ke 4 P X 1144 void Main CaseClass c ES 1145 1146 ifi c 1147 CLog Fatali You must have an open case 1148 A1150 NameListClass List ers TyDialo ialogbox ty Stream StreamClass Strm rebuild RebuildClass rebld 5 dialogbox FolderName MFT record Attrib vw Ei pni Z 501 Once you set a Breakpoint the Start Debugging button runs the EnScript program which will stop at the Breakpoint While stopped you can analyze the runtime information in the new tabs in the View Pane View Pane i E Console T petsis Z Threads EalLocale Breakpoints CF Dependencies GP Output C Lock E Codepsoe E 4 38378 4P Name T Value 4g t
481. trsu ii oisi tinte ne tite ie mete a s a RE ne la Lipsio bei Ip ir a EU 378 Manually Create App D sciptof i heremieten i nennen nennen 378 Create an App Descriptor with an EnScript Program ccccccsesessssessseseeseeeeeseteteesesesnsneenesesesnenenes 380 Encryption Support Leur ete vein EEEE IS ore eee HY dee eer er desi Een esa 381 NSF Encrypt ow SUpport erenn M 382 Recovering NSF Passwords eese EEEE EEA EE E 383 Disk Encryption SUpport iee reani er te ren e rena ie eren ge tre ie Po E eee E bioustoreraeeraee 384 SateBoot Seti piss kets itetve denote oi bera eden ee bue sete re E ee e e Y areas RUE 385 Exporting a Machine Profile from the SafeBoot Server cccccsssscssssseestetesesesesnsnesesessseeceseeeeseseeeees 386 ANuthentiCatiori dte es EAEE EE E ettet tete udis i ti s mtulie tuoi eet 387 SafeBoot Encryption Support Disk Encryption sse 387 Supported SafeBoot Encryption Algorithms sssssseeseeeeeeeenen nennen 390 CREDANT Encryption Support File Based Encryption ssseesssseeeeeee 390 Supported Encryption Algorithms sse tenete nene nnne 393 CREDANT Encryption Support Offline Scenario sse 393 EnCase Forensic Version 6 11 User s Guide Contents Enabling the Forensic Administrator Role on the CREDANT Server sss 395 S MIME Encryption Support sssseeseeeeeeeeeeneeennenenenenentt
482. ts are now in the hash library Viewing Hash Search Results When files in a case are hashed they are compared to the library then the hash set and hash category columns populate After rebuilding your library and hashing the case files view the results in the Table pane 1 Select View gt Hash Sets from the main menu A list of all hash sets appears in the Table pane EE Tabe Report iy Code In Report v3 Experimental No Known Nf 2 BMP Files I know about No Pictures Category Name Filter If a file with the same hash value is contained in the hash library its columns are populated Analyzing and Searching Files 343 Keyword Searches EnCase applications provide a powerful search engine to locate information anywhere on physical and logical media in a current open case Global keywords can be used in any case or they can be made case specific and used only within the existing case A keyword in a search is an expression used to find words within a case that match the keyword entries The EnCase search engine accepts a number of options and is particularly powerful searching regular expressions with a GREP formatted keyword Note In addition to GREP the search can be limited by making it case sensitive and selecting particular codepages Codepages are alphabet sets of a variety of Latin and non Latin character sets such as Arabic Cyrillic and Thai The keywords included in th
483. ts generated from the entries in the folder This dialog works with any folder in any Tree or Table pane When the folder is the root folder of a tree default formatting is provided in the Format field You can also use this dialog to customize the report generated for the folder content Each folder in a tree has its own report Each folder defines its own report Edit Bookmark Folder X Mame IV Showinreport V Show Pictures Comment Format lt lt Fields Tables Comment Comment Bookmark Index O 3S File Extents Index FullPath O 38 Permissions Comment O 33 References Bookmark Type Preview Comment Page Break Show Picture Entry Selected File Offset Length Name Filkor zi Cancel Show in report check this box to display folder content in the report Show Pictures check this box to display pictures in the folder in the report Comment contains text describing the bookmarked content Format contains labels provided by the application or entered manually and the fields selected in the Fields list The label Comment appears in the report Square brackets contain a field The is a literal as in another label Everything other than fields are labels Fields contains the list of fields you can include in the report This list varies from entry to entry Tables determines whether the listed detail tables display individually in the report Using a Folder to Org
484. u must associate that viewer s file types 3d App Descriptors b Archive Files t e Cases 35 Encryption Keys EnScript Types l File Viewers ay EnScripts Z Eile Signatures L A File Types JC al File Types E File Viewers Loc Mal A News Mj Hash Sets BODOG Code Keywords LODE Archi EP Export M ODE I tess 4 Machine Profiles oue Comr Import Ww Packages OB Datal L New Folder Proj DO Docu B HD Inter Expand Contract Space ed Lom Misc Expand All A Text Styles oic Multir Contract All J Cases Sub Tabs DB Pictur c Table Pane d x1 Wind Set Included Folders Num View Pane Include Sub Folders Shift Num Filter Pane Include Single Folder Ctrl Num BA Show Name T b Next Tab Ctrl Tab Description Borges C Auto Fit Reset view Extensions r bor Iv Picture Viewer C EnCase j File Viewers C Windows 5 f Installed Viewer gt gt Cancel al Report ay Code Name Filter moa Exterfions Viewer Picture 1 O Mail EnCase 2 Code EnCase 3 O Archive EnCase 4 E Communication EnCase 5 C3 Database EnCase 6 Document EnCase 7 Internet EnCase 8 Misc EnCase 9 C5 Multimedia EnCase 10 Picture EnCase 11 windows EnCase O 12 A Borges 1 Display the File Viewers tree in the Tree pane 296 EnCase Forensic Version
485. ual position in the main window View Ej App Descriptors 3 Archive Files gy Cases LA Encryption Keys 4 EnScript Sr EnScript Types Z File Signatures Al File Types File Viewers Hash Sets Keywords Machine Profiles Packages Projects SAFEs Text Styles 3 v E a A ai SAFEs Sub Tabs Table Pane View Pane Filter Pane Close Tab Ctrl F4 Show Name Previous Tab Ctrl Shift Tab Next Tab Ctrl Tab Auto Fit Reset view Navigating the EnCase Interface 67 68 EnCase Forensic Version 6 11 User s Guide App Descriptors displays the App Descriptor tabs in the tree pane which includes the App Descriptor Home and App Descriptors Hash Properties tabs By default these tabs are not displayed Archive Files displays the Archive File tab in the tree pane This tab does not display by default Cases displays the Cases tabs in the tree pane which includes the Cases Home Cases Entries Cases Bookmarks Cases Search Hits Cases Records Cases Devices Cases Secure Storage and Cases Keywords tabs These tabs display by default Use this command if you previously closed the Cases tab Encryption Keys displays the Encryption Keys tab in the tree pane This tab displays by default Use this command if you previously closed the Encryption Key tab EnScript displays the EnScript tab in the tree pane This tab does not display by default When this tab displays the EnScript tab in the Filters pane is clos
486. ue with step 2 of Viewing File Structure The file structure of the email file displays and component files or layers in the compound volume folder can be opened and displayed in the view of your choice Notice that the icon for the compound email file looks like a volume after it was mounted Viewing Macintosh pax Files You can parse Macintosh pax files formatted with the cpio file format can be parsed using View File Structure 1 Navigate to the pax file you want to view or mount 2 Asneeded select Calculate unallocated space then select Find deleted content 312 EnCase Forensic Version 6 11 User s Guide Continue with step 2 of Viewing File Structure The file structure of the email PAX file displays and component files or layers in the compound volume folder can be opened and displayed in the view of your choice Notice that the icon for the compound email file looks like a disk drive and no compound volume indicator is added to the icon after it is parsed Viewing Windows Thumbs db Viewing File Content 313 EnCase applications support parsing the Windows thumbs db cache for images Once mounted the thumbnail cache volume and the version appear V2 thumbnails are in bitmap format whereas later versions are modified pngs The Root Entry folder contains E the catalog file of cached thumbnail names E their full path B the cached images themselves Thumbs db also contains a record of the image s Last Writ
487. uired Once evidence is acquired or added to a case it can be analyzed In this section we focus on previewing acquiring and adding digital evidence to the case Types of Entries Entries include evidence and other file types containing digital evidence that are added to a case There are four classes of evidence containing files that EnCase applications support m EnCase Evidence Files E01 B Logical Evidence Files LEF L01 m Raw images E Single files including directories These files are acquired or added to a case Before digital evidence can be added to a case it is previewed EnCase Evidence Files EnCase evidence files E01 contain the contents of an acquired device and provide the basis for later analysis Encase evidence files integrate investigative metadata the device level hash value and the content of an acquired device This integration simplifies evidence handling and investigative efforts by keeping the device level hash value and content together and by simplifying the effort required to verify that the evidence has not changed since it was collected from a subject device Dragging and dropping an E01 file anywhere on the EnCase interface adds it to the currently opened case Working with Evidence 181 Logical Evidence Files Logical Evidence Files LEF L01 are created from files seen in a preview or existing evidence file They are typically created after an analysis finds some noteworthy evidence W
488. ulish 266 2 Bookmark the desired passages see Bookmarking Items on page 401 364 EnCase Forensic Version 6 11 User s Guide Click Bookmarks on the Table tab of the Table Pane A preview of the bookmark appears A Tabie Report EZ Gallery 2 Timeline i Code Bookmark Type O 1 Q Search Summary O 2 Q Case Time Setti LJ 8 2 Logs C 4 Highlighted Data F 9F 9 B D B amp C J1 AJ 7 D F X Arabic Unicode File ist Hn Right click the desired bookmark and select Encode Preview Preview Comment BI Encode Preview Summary Bookmark Rename F2 SS show Columns Column Sort Select Item Space The Table tab displays the Unicode in its proper form E Table E Report Ez Gallery Timeline 2 Code Bookmark Preview Comment Type t Q Search Summary Q Case Time Setti 2j Logs Bj 2B oa CJ 4 E Highlighted Data all gt gt Mall gull s Sold ILS asl Jacl uliamiledl 9 ale Arabic Unicode File IKT w Analyzing and Searching Files 365 Indexing Text indexing allows you to quickly query the transcript of entries Creating an index builds a list of words from the contents of an evidence file These entries contain pointers to their occurrence in the file There are two steps B Generating an Index B Searching an Index Generating an Index creates index files associated
489. um 4 W iai More Rows Shift Num Select Item Space To increase the number of images displayed per row in the gallery tab E Right click on any image in the Gallery tab then click More Columns Viewing File Content 321 Clearing the Invalid Image Cache The program includes built in crash protection which prevents corrupted graphic images from appearing in Gallery or Picture view The corrupt images are stored in a cache so that EnCase recognizes them the next time they are accessed and does not attempt to display them These images are cached at the case level so that the images do not attempt to display in that case file again Before you can clear the cache the Cases tree displays in the Cases tab of the Tree pane You can clear the cache only if a corrupt image is encountered 1 Right click on the Cases root object in the Cases Tree 2 Click Clear invalid image cache Lotus Notes Local Encryption Support EnCase can decrypt a local Lotus Notes user mailbox NSF file suffix The local mailbox is a replica of the corresponding encrypted mailbox on the Domino server Each Domino server user has a corresponding NSF file representing that user s mailbox in 8 3 format The default path is bomino Installation Folder gt Data Mail lt user gt nsf The Lotus Notes client is set up to use the local mailbox Synchronization between the local and server mailboxes occurs according to a replication schedule determined by t
490. um 32768 characters Compress Level of compression 0 none 1 fast 2 best Examiner Examiner s name maximum 64 characters EvidenceName Name of the evidence within the evidence file maximum 50 characters CaseNumber Case number related to the evidence maximum 64 characters EvidenceNumber Evidence number maximum 64 characters MaxFileSize Maximum file size of each evidence file segment in MB minimum 1 maximum 10737418240 Granularity Error granularity in sectors minimum 1 maximum 1024 BlockSize Sectors per block for the evidence file minimum 1 maximum 1024 Hash Compute HASH while acquiring the evidence TRUE or FALSE AlternatePath A semicolon delimited list of alternate paths maximum 32768 characters Notes Notes maximum 32768 characters Required field 274 EnCase Forensic Version 6 11 User s Guide Configuration File Notes E You can use the pound sign as a comment delimiter Anything after a pound sign on a line is ignored E Empty lines in the configuration file are ignored B Options in the configuration file are not case sensitive E White space before or after the option and before or after the value is ignored White space in the middle of an option is retained such as a space between an examiner s first and last name Prompt for Value The console asks for any required values Please enter a value for the option lt option gt if they are not provided in
491. v ue kd e EE uid 446 Changing Report Size io sene heit ise eee etitm Hee rede itle eire erit 447 Viewing a Bookmark Report nnne nennen nnne tenens 447 Email Report iz isses RA sedi mieoe tee onte UN eerta tpe EH ect 448 Internet Report eci esee eoe epe ie nd d Ro ee HUS e D E AE S DREE 449 Creating a Webmail Report sane eene Re GR RE RE PUR oe IERI EH ert ete 449 Alternative Report Method airsan ii eee eie e ed eter Hn D Do eiae 450 Search Hits RepoRts e eese es Edi EEEE EE Ea lee tes L aa E A OEEO EEE EE S TE 451 QUICK Entry Reports eneo ai ae mete RUD ERE e ERR HR UU 453 Creating an Additional Fields Report ssssssssssssssseeeeeeene eene 454 o rojasiar s Mr jveja M 455 Creating a Report Using Case Processor c ccscssssssssseseseseeeneneseseesescsesesescecsesesesesensnsseseseseseneseneneseeeees 456 CHAPTER 12 Working with Non English Languages 457 Working with Non English Languages sseessssseeeeeeeeeenneee enne nnne 458 Non English Language Features tete roter ertet ee n tonos tent aR stances 459 The Options Dialog Font Tab sse nnne nennen 460 Uriicode Fonts etie oreet tete miii n ede i mie e o ties EET 461 TOXU SEV OS Tm 461 New Text Styles Dialog riius ieties tieepiene tires pen inet rte i tibiis 462 New Text Styles Dialog Attributes Tab 462 New Text Styles Dialog Code Page Tab ene 464 Configuring Non English Language
492. ves a short explanation of the entry also indicated by the icon to the left of the file name Is Deleted displays TRUE if the file is deleted but not emptied from the Recycle Bin Last Accessed displays the date of the last activity of the file A file does not have to be altered for the Last Accessed date to change only accessed Any activity such as viewing dragging or even right clicking may change the Last Accessed date The last accessed date may also change if the file is accessed by a program such as a virus checker File Created is a record of when a particular file was created at that location If a file is edited and changed on January 3 then copied to a floppy diskette on January 15 and that floppy diskette is acquired on January 28 the entry shows that the file on the floppy disk was created after it was last written to or accessed Last Written displays the last date and time a file was opened edited and then saved If a file is opened then closed but not altered the Last Written date does not change Entry Modified refers to the file entry pointer and its information such as file size If a file was changed but its size not altered the Entry Modified date does not change File Deleted shows the deletion time and date If an entry in an INFO2 file on an NTFS volume has a deleted date TRUE appears in the Is Deleted column File Acquired displays the date and time the evidence file in which the selected file reside
493. w Excluded EVf Show Excluded Excluded files reappear in Table and Report view 362 EnCase Forensic Version 6 11 User s Guide Deleting Items When using Search Hits delete is considered a soft delete which you can undelete until the case is closed If a search hit remains deleted when the case is closed the hit is permanently deleted In other tabs however undelete works only with the last selection deleted Once a file is closed deleted items are permanently removed and cannot be recovered Run then view a keyword search This process is similar to Exclude Files on page 360 View the search hits report in the Table pane before excluding them from the report 1 Select files to exclude then right click the view 2 Select either Delete or Delete AII Selected 43 Copy Ctrl C X Delete Delete Delete All Selected Ctrl Delete af Export EVI Tag Selected Files Ctrl Shift T B TagFile Ctrl T Miew Search Hits Bookmark Selected Items CI Show Excluded CI Show Deleted Exclude Ctrl E Exclude All Selected Ctrl Shift E SS Show Columns Column Sort d Select Item Space 5 Go to Parent BkSp Selecting the latter displays the Exclude All Selected dialog x Start From C Root Folder 2 items Current Folder 2 items Cancel 3 Select the appropriate option and click OK The selected files are temporarily deleted Note Viewing the report s
494. wiase 357 Viewing Record Search Elts e de e eed ocn dist ie iU cote datos 359 Viewing Seateh FAS e M 360 Excl deFil s oe ne toes ene ee dti e eO EE EA sore toe cei dried 360 Show Excluded Elesin ute one eie DIR pet ee tete hash Meat Pre suena 361 Deleting Items stone e Ee De er etg Bee eod ire ri eee Ted 362 Show Deleted Files s iei e Ee esee lee i e e Assesses 363 Encode Preview 5o pee ANE eee cls Ae pee teneret dte ed unite 363 Turning On Encode Preview sse EAE R L tenente nnne 363 Indexing iatis sesesiites tenes ittedienes iere teer Dre E E e o Y bo vnus eae teris eure etud 365 Querying an Index Using a Condition cccccccccscseessnetesesesssnsnsnesessssseeceseeenenesceseseeeneenesesesesnenenes 366 Generating arin Ox sc seco ecd RETE IIT Ee etre EAE HOD ER EET EE EEES ER 367 Searching for Emailed ae RR et ERREUR T GER IDEE Hoe aai oai EIER 369 Web Mail Parser voi X 370 Extracting Email 45a denitro e ee e HA RON RERO II e Ne eee He inire 371 Searching Email ect e e es rath duce bt gua oei S P cba tes cuba Paget TIPO ET pee EP IHE 372 Searching Selected Items aote eme tee ione e e een a Uie n ee eerie en shades 373 Viewing Attachments ote tende digest Hen Ede e ARR ta TE Ope re HA WAR dass ea eeu 374 EXPO CO t MSE eie e enorit eroe pud diei orbe id ipid ea ei epe ipid iso Hoe ios 375 Exporting to msg aiite tete aime oto ipit ip ie Retrait id Eti redet efie 376 App Deserrpto
495. will be faster in acquisition tests a 12MB m500 took four minutes to preview and 16 minutes to acquire However after the first keyword search on a previewed device all other processes accessing the evidence file will be fast as the entire evidence file is cached in memory Acquiring Non local Drives The acquisition of non local drives involves LinEn which acquires these drives by performing a network crossover acquisition When you use the LinEn utility to acquire a disk through a disk to disk acquisition the resulting EnCase evidence file must be added to the case using the Add Device Wizard When to use a Crossover Cable Use a crossover cable when acquiring from a laptop RAIDs or drives not recognized by the host machine You can also use the crossover cable to preview Performing a Crossover Cable Preview or Acquisition You have a LinEn boot disk The investigator identifies the subject drive to be acquired 1 Boot the subject machine from the LinEn boot disk 2 Connect the forensic machine to the subject machine using a crossover cable 3 In Linux ensure that the subject machine has an IP address assigned and a NIC card loaded appropriately V a Type ifconfig eth0 b If no IP address is assigned assign one by typing ifconfig ethO 10 0 0 1 netmask 255 0 0 0 c Check the IP address assignment again by typing ifconfig eth0 4 Navigate to the folder where LinEn resides and type 1inen in the console The
496. with evidence files Index creation can be time consuming depending on the amount of evidence you are indexing and the capabilities of your computer hardware Evidence file size and thus the resultant index size is an important consideration when building an index Attempts to index extremely large evidence files can have a serious impact on a computer s resources Note For quicker index files select a limited number of files for indexing Querying an Index provides the means to search for terms in the generated index Querying an evidence file s index for terms locates terms more quickly than keyword searching The index is queried using several conditions accessed in the Conditions tab 366 EnCase Forensic Version 6 11 User s Guide Querying an Index Using a Condition You can query the index using a condition B A Case must be created with Evidence files added B The evidence file must already have an index generated 1 Display the Conditions tab of your interface and expand the Index Conditions folder by clicking the next to the folder a EnScript T Filters iz Queries A Text Sty 4 gt B Conditions HHO Files Email Examinations EHG Index Conditions _ Files Containing Index Terms Recommended ts Files Containing Index Terms Case Sensitive f Files Containing Index Terms GREP slower f Files Containing Index Terms Within 5 Words fE Files Containing Index Terms Ordered within 5 Words
497. xchange E Outlook Express email MS Outlook email E Windows Thumbs db B American Online ART Files m Hangul Korean Office documents B Macintosh PAX files Note In addition the File Mounter EnScript program allows the examiner to select a file type DBX GZip PST Tar Thumbs db or Zip provided they have a valid signature and mount them automatically Viewing File Structure Once files are part of the case they can be viewed in various output formats Viewing the structure of a compound file reveals which files comprise it Before you begin 1 Opena case 2 Enable single files 3 The Entries tree on the Entries tab and Entries table are displayed 298 EnCase Forensic Version 6 11 User s Guide 4 Drag and drop the files to be viewed into the Entities table in the Table pane LIII 00000000000 E Fe o we h ee itm corem ee ee er x ome aC Eilts Lem iiem Deme com To view a compound file 1 Navigate to the compound file to be viewed as it appears in the Table pane 2 Right click the compound file to be viewed and click View File Structure The View File Structure message box appears 3 Click Yes The compound file is replaced in the Tree pane and Table pane with a folder and a compound volume icon The file structure of the compound file displays and component files display in the view of your choice Viewing Registry Files Viewing File Content 299
498. y Table Pane 3 Gallery Timeline f Disk 4g Code Filter Description O 1 5 Hunter Pics Ink Link Windows File Archive 2 amp Removable Disk C Mo Ink Link Windows File Archive 3 e Sabrina Dewercs Ink Mo Ink Link Windows File Archive 4 amp 9 session log Ink Mo Ink Link Windows File Archive 5 e download Ink Mo Ink Link Windows File Archive O 6 amp 9 Hunter log Ink Mo Ink Link Windows File Archive 7 amp 9 X Drive txt Ink No Ink Link Windows File Archive G 8 e Sample Pictures Ink No Ink Link Windows File Archive 9 e Q309521 log Ink No Ink Link Windows File Archive 10 Sa WINDOWS Ink No Ink Link Windows File Archive 11 amp 101 0174 IMG JPG No Ink Link Windows File Archive O 12 ca 103 0396 IMG JPG No Ink Link Windows File Archive 13 amp Christina Detsiwt Ink No Ink Link Windows File Archive 14 Desktop ini No ini Initialization Windows File Hidden System Ar 15 amp X Drive txt 2 Ink No Ink Link Windows File Archive 16 amp Special Interests No Ink Link Windows File Archive 17 amp 101 0184 IMG JPG Mo Ink Link Windows File Archive 18 amp Sabrina and Christi Mo Ink Link Windows File Archive LJ 19 amp Chaser1191 Ink Mo Ink Link Windows File Archive 20 amp 9 receive Ink Mo Ink Lin
499. y default Node to Client operates similarly to the Client to Node SAFE mode except that the node attempts the direct connection to the client It is used when you desire direct data transfer between the node and the client and there is NATing or a firewall prohibiting the node from sending data directly to the local IP default port of the client Once you check this option the Client return address configuration box becomes available to enter the NATed IP address and custom port e g 192 168 4 1 1545 The Client return address box is disabled unless this option is selected Case Management 165 Priority determines the priority of connection for this SAFE O Low means the connection to this SAFE will be reconnected after all other connections of normal or high priority O Normal means the connection to this SAFE will be reconnected after all other connections of high priority and before those connections of low priority O High means the connection to this SAFE will be reconnected before all other connections of medium or low priority 166 EnCase Forensic Version 6 11 User s Guide New Case Wizard The New Case wizard captures role and case settings A case is associated with a specific role Roles are established by the administrator The New Case wizard consists of two pages E Role page E Case Options page L S Access Subnet A Case Options C Program Files EnCase6 Export C Program Files EnCase6
500. y displays the Gallery tab in the table pane It displays by default Timeline displays the Timeline tab in the table pane It displays by default Disk displays the Disk tab in the table pane It displays by default Code displays the Code tab in the table pane It displays by default Navigating the EnCase Interface 73 The View Pane and its Tab Bar and View Menu The View Pane menus display a command for each of the tabs on the table pane tab bar The View pane contains several tabs depending on the tab currently selected in the table pane The tab bar also includes controls that appear in the View pane menu View El App Descriptors 3b Archive Files t3 Cases 35 Encryption Keys M EnScript Se EnScript Types Z File Signatures Al File Types El File viewers Yi Hash Sets Keywords y Machine Profiles i E Text amp lHex Pno WA transcript Eb Picture Report CI Console 33 Details G Output C Lock Y Codepage MM 20 26233 SAFEs Sub Tabs Table Pane View Pane u E x er Filter Pane e Close Tab Ctrl F4 Show Name Previous Tab Ctrl Shift Tab Next Tab Ctrl Tab anscript m Report Tm onsole E amp d Ln b tr Ej amp 0 Auto Fit Reset view RAOL Li Co 20 26233 74 EnCase Forensic Version 6 11 User s Guide View Pane Menu The View Pane command on the View menu displays the View Pane menu The View Pane menu contains commands corresponding to th
501. y does not preserve folder structure while Copy Folders functionality does 280 EnCase Forensic Version 6 11 User s Guide Copy UnErase Wizard Use the Copy UnErase wizard to specify what files are unerased how they are unerased and where the files are saved after they are unerased The Copy UnErase wizard consists of B File Selection page B Options page E Destination page Viewing File Content 281 File Selection Page of the Copy UnErase Wizard The File Selection page of the Copy UnErase wizard indicates whether a single file or a set of selected files are being copied and unerased In addition the character that will be used to replace the character that FAT volumes use to indicate deleted files is set here Copy UnErase o E Alliselected Ales C Merge inte ane File 282 EnCase Forensic Version 6 11 User s Guide From contains the settings that determine if one file or several files will be copied and unerased Highlighted File If no files are selected in the Table pane choose this setting because at least one file is always highlighted on the Table pane The highlighted file will be copied and unerased All selected files When several files are selected in the Table pane use this setting When you choose this setting you have the option to copy and unerase the highlighted file or the selected files To contains settings to determine how many files will be output which is only relevant when several files
502. y of these cables can be used as a hard disk cable B IDE Cable m USB Cable B Firewire B SATA m SCSI Using LinEn 51 Figure 3 Setups for Drive to drive acquisitions with 1 the forensic machine running LinEn from the LinEn Boot Disk connected to the subject hard drive 2 the forensic machine booted to Linux and running LinEn connected to the subject hard drive 3 subject machine running LinEn from the LinEn Boot Disk connected to the target hard drive 9 Doing a Drive to Drive Acquisition Using LinEn Once LinEn is set up run LinEn choose Acquire then select the drive to be acquired and the storage path Optionally provide additional metadata Configure LinEn as described in LinEn Setup and verify that autofs is disabled unchecked The investigator has identified the subject drive to be acquired and the storage drive that will hold the acquired evidence file 52 EnCase Forensic Version 6 11 User s Guide 1 Ifthe FAT32 storage partition to be acquired has not been mounted mount the FAT32 storage partition 2 Navigate to the folder where LinEn resides and type linen in the console to run LinEn The LinEn Main Screen displays Code Type Sectors Disk0 dev hda Linux 78165360 Sectors Size 37 3GB 7devvhdal Linux 82 Linux Swap 1020096 498 1HMB deu hda2 Linux 83 Linux EXT2 20972448 10 0GB deu hda3 Linux 83 Linux EXT2 9766512 4 7GB PAPA T EC Linux oc FAT32X 46406304 22 1GB devvhddi Linux dev
503. you will redefine selection and processing as your analysis requirements evolve during the investigation Figure 8 Panes in the Analysis Cycle where 1 container entries selected in the Tree pane determine the contained entries that appear in the Table pane 2 contained entries selected in the Table pane determine the contents that appear in the View pane 3 optionally filters searches and processing defined in the Filters pane narrow the contents or results of the analysis that appear in the View pane 4 results of the current analysis cycle and 5 subsequent refinements of the analysis I The tree pane provides you with the starting point of the analysis This is where you select the container entries such as devices and folders that contain the evidence you want to examine The Table pane presents the contents of the entries selected in the Tree pane You can refine entries to be examined here The Filters pane gives you the means to search filter and automate the examination of the entries selected for examination in the Tree and Table panes This narrows and focuses your analysis effort The Filter pane provides tabs that enable you to view analytical results in places other than the View pane The View pane provides various tools that help you explore and see the results of the analysis If the results of the analysis are sufficient for your purposes the analysis can move on to other aspects of the inv
504. zard 206 Completing the Sessions Sources Page 191 Completing the Sources Page 190 Compound File 519 Compound Files 489 Comprehensive Internet History Search 350 Computer Forensics 520 Concurrent Case Management 152 Conditions 138 Configuration File 269 Configuration File Notes 270 Configuring Interface Elements to Display Non English Characters 460 Configuring Non English Language Support 459 Configuring the Keyboard for a Specific Non English Language 461 Configuring Your EnCase Application 30 Configuring Your Linux Distribution 47 Connection 520 Contract All 117 Copy 148 Copy and Unerase Features 275 Copy Folders Dialog 282 288 Copy UnErase 64 Copy UnErase Wizard 276 Copying a Table Entry into a Folder 425 426 Copying and Unerasing Bookmarks 286 Copying and Unerasing Files 284 Copying and Unerasing Files and Folders 275 Copying Folders 287 Create a Hash Set 336 Create an App Descriptor with an EnScript Program 374 Create License Dialog 501 Create Logical Evidence File Wizard 239 Creating a Bookmark 407 415 Creating a Datamark as a Bookmark 415 Creating a File Group Bookmark 412 Creating a Filter 130 Guidance Software Creating a Folder Information Structure Bookmark 410 Creating a Highlighted Data Bookmark 408 Creating a License 503 Creating a LinEn Boot Disc 46 514 Creating a Log Record Bookmark 41
505. ze analytic processes applied to the entries shown in the Table tab Conditions 2 Queries 44 gt E F Filters iy Search File Permissions Windows F Search File Permissions UNIX Y OLK Folders Containing Attachments Yahoo Web Mail Pages Y Hotmail Web Mail Pages Y Netscape Web Mail Pages Y Hotmail Pages Y Yahoo Mail Pages Y Deleted Files YF Files after n date Y Files before n date YF Filter ANY after n date Y Filter ANY before n date Y Find Mixed Types Y Find files between any dates LY Unique Files by Hash 94 EnCase Forensic Version 6 11 User s Guide Filtering Effects in Table Pane When a filter is run a query icon appears on the main menu bar and the filter results show in the Table pane A Query E Tabte Z Report E Gallery Timeline f Disk 1 Code Nane ux id udin d m CJ 1 baa oRTRAIT JPG Yes O4 30 0004 19 38PM 01 28 05 D8 05 08AM CJ 2 baal _KSHIFT 3PG Yes 04 30 00 04 19 46PM 01 28 05 08 05 02AM 3 bl microprinting jpg Yes 04 30 00 04 19 48PM 01 28 05 08 04 58AM CJ 4 baal _UMBERS IPG Yes 04 30 00 04 19 54PM 01 28 05 08 05 04AM CJ 5 linesmoire jpg Yes 04 30 00 04 19 56PM 01 28 05 08 04 52AM CJ 6 ll _EAL 1PG Yes 04 30 00 04 20 00PM_ 01 28 05 08 05 24AM CJ 7 al fedreserveandtrea Yes 01 06 01 11 49 58PM 01 28 05 08 04 46AM CJ 8 G portraits jpg Yes 01

Download Pdf Manuals

image

Related Search

Related Contents

Nokia Treasure Tag Mini (WS-10) Bedienungsanleitung  Descargue el manual de instrucciones  MANUAL DE usuario, CAMPUS VIRTUAL  Enfriador de Vinos  Bedienungsanleitung  ガードッグ・バイスガード BS001取扱説明書  Manual de Instalação CENTRAL NXT  仕 様 書 - 富山県技術専門学院  Manual de instrucciones  

Copyright © All rights reserved.
Failed to retrieve file