Video Transcription

00:00
All right, This is basic, ever metric dead boot forensic acquisition. Using a wireless network
00:07
where this all falls in. We have the elementary controller which were still using there at the top, and we're still over there on the far left hand side and that whole dead booting the system too, at the bottom, drop it all into an F F for image container file. So
00:24
nothing's really changed just the method and how we're doing it.
00:29
All right, So, um,
00:31
we have, ah, have a situation which you should have been thinking this if you watch the last course of it like Brian. Hey, you know, I wireless network around here, we've moved into the late to thousands, and that's great S so you know, I don't don't have wired network or I have a bunch of laptops or something like this.
00:49
So I need to be able to manage my connections collections that way.
00:53
Fantastic Elementary accounts for that, and ton more, but we're going to hear is first off, you're gonna create the latest version of the elementary dead boondoggle. Now, we went through how to do that last week. Not too much to that Every metre makes it easy. Ah, so we have our our dead boondoggle that we created last week here.
01:11
Um, we're gonna put the elementary dead brute dongle into a Windows system, and then we're going to navigate to the slash config folder that might be your d driver. You drive or whatever, depending on on how your system is currently connected.
01:27
And we finally config folder right there,
01:32
pop into that, right? It wasn't too hard at all, was it?
01:38
Okay
01:38
in that config folder, what we're gonna do is we're gonna look for a file named All Underscore D H cp. Underscore, client dot s h
01:48
and we're gonna rename that too. All D h c p underscore client
01:55
dot backs. We're basically gonna create a backup file there,
01:59
or just rename it into a backup file. I don't like to really get rid of things off the dongle if I can help it. So I'm gonna select that file. I'm going to rename it from dot s age to dot B a k. And so my original is air. If I if I want to change this, this tunggal back to something else and then it just
02:17
failed to do that for me, which was unusual.
02:24
All right, there we go.
02:27
Probably said no when I should have said yes. So all we've done is renamed that that client filed there. Nothing too complex. They're pretty standard stuff.
02:37
All right, then we're gonna navigate ourselves to the slash config slash network dash Available folder.
02:44
Let's do that.
02:46
CONFIG And I have the network available folder. Great. Made my way in there.
02:52
So now in the e config network available folder all of my dongle.
02:59
And from there, we're going to copy the wireless. Underscore. D H c p underscore, client dot s H file back over into that config folder. Once we have it over there, we're gonna go ahead and open it up in a tax center. Let's grab that file now.
03:16
All right, here's my wireless teach C p client
03:21
file,
03:24
and I'm gonna copy that
03:29
and drop it into the CONFIG
03:32
folder with a little pace there.
03:35
There it is. Nothing too complicated there.
03:38
And then because I'm a simple guy,
03:42
I'm just gonna open it up
03:44
in an everyday simple note pad. Text editor. Right?
03:49
Wow, that was super fancy of me.
03:52
All right, um, if you're familiar with bash l scripts and the sort, um,
03:58
you know, this is this we got here a little simple. Ah, Shell should have filed. The great part about this is you don't really need to know much. We're only gonna touch a couple of things in here.
04:06
It's gonna be super, super simple.
04:10
So we got everything done. We, uh we found the config folder. We rename that first HCP client file to a backup file. We moved into the network available folder. We copied out the wireless DCP client file indoor CONFIG. Folder, and now we've opened that up in it.

Up Next

Basic Evimetry Deadboot Forensic Acquisition: Wireless Network

This course covers how to edit the configuration of an Evimetry Deadboot dongle so that we can automatically boot a target system to a WIFI network. The course also covers managing the forensic imaging process over a wireless network and what to do if you lose connection to a running Evimetry forensic acquisition from the Evimetry Controller.

Instructed By

Instructor Profile Image
Brian Dykstra
CEO and President of Atlantic Data Forensics
Instructor