Video Transcription

00:00
All right, This is basic, ever metric dead boot forensic acquisition using a wireless network.
00:07
All right, All we're gonna do here is we're going to edit two lines that CONFIG file the W p a S s I d and the W p a P s k pre shared key file over to whatever our as this i d for our wireless network is and the password for that network
00:27
real simple.
00:28
In this case, I have my same little lynxes wireless router. Here is I had for the last course. It's SS ideas Atlantic D f a ce, you might expect. And the pre shared key Ford is Archibald with the ampersand symbol on your network. Of course,
00:47
this should be changed to whatever your
00:49
SS ideas and whatever your pre shared key is. So let's swap back over to our file here.
00:58
We're going to change that first s s I D line. So it says Atlanta d f.
01:06
And we're gonna change that pre shared key file too.
01:10
Archibald
01:11
and and and percent symbol.
01:15
That is real simple, right?
01:17
All right. We'll go ahead and save that.
01:21
No magic there didn't mess with anything else. Didn't move anything around. Don't have toe
01:27
change anything you know too hard. Um,
01:32
there is tons of information available on the elementary website if you want to get into some of the other conflict files here and how to use him for the things and we will use some of them when we start getting to cloud collections and things like that. But for right now, everything we needed to do there is done
01:48
all right. Pretty simple. So, basically, again, changing the default s s I d and appreciated key over to RS s i d and pre shared key.
02:00
All right, So the final steps we're gonna do here is we save the file. Well, we already did that. And then we're gonna rename that wireless teach C p client
02:09
dot ss age to all day HCP underscore client,
02:14
uh, understood dot ss H, which is, of course, the file that we renamed start with.
02:20
So it's pop over there into that.
02:22
There's our
02:23
wireless client fall. We're gonna rename that
02:27
so it just becomes
02:30
all th e p client dot s h
02:34
All right. And everything is good there. There's the old one all backed up just in case we had to go back and change it for some reason. Back to the woods, to the Wired Network. We could do that. And here's our new wireless capable one set up for our wireless network right there,
02:50
right?
02:52
They said, No riel magic to this.
02:55
All right. Now, before we go ahead and do the acquisition, we need to talk a little bit about our WiFi hardware requirements.

Up Next

Basic Evimetry Deadboot Forensic Acquisition: Wireless Network

This course covers how to edit the configuration of an Evimetry Deadboot dongle so that we can automatically boot a target system to a WIFI network. The course also covers managing the forensic imaging process over a wireless network and what to do if you lose connection to a running Evimetry forensic acquisition from the Evimetry Controller.

Instructed By

Instructor Profile Image
Brian Dykstra
CEO and President of Atlantic Data Forensics
Instructor