Time
36 minutes
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:01
All right, this is introduction. Ever met tree the controller.
00:07
So,
00:08
um, full in here is your traditional reading and preserving each and every block on your hard drive. Great method, full forensic image, bit stream image. Would you like to call it that? That's it. There's also an option for allocated on Lee. This is a partial physical image of the volume
00:27
metadata the file system metadata
00:30
and then uses the allocation bit map metadata to preserve on Lee. The allocated areas where this really comes into play is if I have a situation. Say, um uh, Discovery matter where I'm gonna collect a bunch of data and we know going into this,
00:46
you know, uh, recovery of deleted items or artifacts on these drives are just not gonna be an issue
00:53
We're simply trying to preserve, You know, the data that people have on their computers right now. Well, if everybody has one terabyte drives, it's unlikely those hard drives are full of data. Right? Um, it's actually more likely that most the drives unused or unallocated.
01:10
So by using an allocated on Lee, I can collect just
01:14
the parts of the hard drive that actually have data on them, which will end up being much, much smaller forensic images, much faster collection things like this.
01:25
It's not perfect for every case. It's just a flexible way of doing things. There's also an allocated room ranger in what allocated remainder does it preserves the allocated data first and then goes back and makes an image of the UN allocated areas Maur of, ah, sort of. You know,
01:44
I need to get quick access to the allocated data, and I also wanna have the remainder sort of stuff.
01:49
Um, they also have a non linear partial. We're gonna want to talk a little bit more about that, actually view that, but it preserves volume, metadata, file system, meditate again and then file content by category and priority. So basically, what I'm saying here is going to let us
02:07
make a forensic image that on Lee has thesis certain types of files in it
02:12
that were interested in so say maybe I have Ah
02:15
oh, an intellectual property case or something like that, where I need to preserve data, you know, somebody took these documents or something like that. So I want to preserve the data on this computer. But I'm really only interested in a very narrow scope of data. So maybe all my office documents and pdf files and just for good measure, let me grab the
02:34
the log files and registry off this computer
02:37
I can actually select. Do, uh, just the follow types that I want doing this nonlinear partial will show you that The interface for that and then, ah, elementary has a interesting live access feature. So I can live access a drive via shared virtual disc.
02:53
Mostly. That's an option for law enforcement when they're trying to preview drives and things like this
03:00
prior to acquisition, um, in a commercial setting, we don't typically use this a whole lot, although it does come into play every once in a while, and we will definitely be talking about doing it in the future course.
03:13
All right. Pop him back over to our controller.
03:16
All right. So, like I said, we would do a full linear here, which is our intent. But like I said, I want to show you that really cool, nonlinear, partial feature, um, would nor the rest of for a minute. So if I if I'm just collecting those file types when I hit next. I have choices here
03:35
as to what types of files I can collect. So
03:38
Windows access traces might be really useful from on a Mac. You know, Mac application trace that could collect just registry information. I could, like, just log files. I could select log files. And I'm interested all the Microsoft Office documents, you know, and maybe page file with that or something like that.
03:57
So I have options here. I can also
04:00
edit this particular set of setting. So there's ah, a yam Oh, file which is yet another mark up language in my in the source folder from I ever met Tree for this, I could go in there and edit. I could create, um,
04:15
my own specific customer acquisition settings and things like this where I go on this case, we
04:21
we want to make sure that everybody is doing the same way. So I distribute a single yeah mo file that had all my my, uh, my file types in there and go ahead and do that. Um, a lots of flexibility there. We will definitely do one of these in a future acquisition. In future course.
04:38
It's a interesting and unusual way to do acquisitions. But as I've said before, you never kind of know what kind of case you get yourselves into. Um, you know what? Your requirements are at the time, and elementary is very flex will let you make a lot of choices there.
04:54
All right, So
04:56
our choice today, however, is a full linear acquisition of this. My compression choices here. Ah, I have snappy lz four inflate all that sort of stuff I want to leave with snappy, which is a very fast compression algorithm, and we've talked about the advantages of that.
05:11
And then I have choices for my hashing algorithm by default that set the shot one.
05:15
I consented to MD five hash or 26 or Blake Thio or whatever it might be,
05:21
Um,
05:23
and
05:25
the way Elementary does it is what we call block map hashing. So it's not the normal, linear hasher thinking about. We're going. That's a second while it's actually acquiring. But right now I've got basically everything I need set up. So I got my case number. My evidence number of my examiner name a little bit of description here where my father is going to the type
05:44
of ah of acquisition I want to do. So it's a full linear
05:46
what? The entire drive, my compression algorithm, my compression choice and my hash algorithm.
05:53
I hit OK
05:55
and up here at the top of the screen, we start to see that the image is being collected and
06:01
I have a system that's being collected on
06:05
type of acquisition. Going status is that it's running. We can actually see a real time progress bar there. We've got current elapsed time of the acquisition, which hasn't been going for a long at this point.
06:18
Um, the amount of data processed at this point. So it's it's roughly got 600 Meg of my 7.5 gate drive, the speed at which is collecting Now. This is not fair to ever met tree, because this is, of course, a USB drive, uh, thumb drive, which is not exactly the fastest acquisition media. So it's
06:38
it's gonna be a rather slow acquisition,
06:40
and then the time remaining estimated time remaining in that acquisition. Um, sometimes this number come bounce dramatically, but based upon the amount of free space on the drive in this case, I have a really really thumb drive with riel was at least four gig of data on it. And things like this real files, that sort of thing.
06:59
Um,
07:00
that
07:01
you are
07:02
part of this because, you know, I don't believe in testing blank triumphs and things like that, even for show you should try and try and test your stuff with real data. Over here, we have the images tab just next to that, and we can see that my controller, which is on my desktop here,
07:19
is writing a file out. And it's when it was created and all that sort of stuff to some basic information about it.
07:27
Um, not not too much interesting there. As I click on these, you can see the same information in the lower window here,
07:33
Um, as well as
07:35
that's so while it's going along and doing, it's bitten. It says it should be about three and 1/2 minutes to finish this. We will pop back over here

Up Next

Introduction to Evimetry: the Controller

This course is our first in a series introducing Evimetry for forensic data acquisitions. We start with the Evimetry Windows Controller interface and perform a basic full linear (bit-for-bit) acquisition directly from the Controller.

Instructed By

Instructor Profile Image
Brian Dykstra
CEO and President of Atlanta Data Forensics
Instructor