All right. Welcome to handling bit locker and fire all file vault to encrypted drives with elementary and mount image Pro. That's gonna be a lot of fun.
All right, So, um,
it is really commonplace nowadays to run into fully encrypted disks. For one, all all new Macs are shipping with foul ball to encryption turned on by default eso they're all gonna be encrypted on, then. You know, in most business environment, you have lots and lots of windows computers
and people are starting to take advantage of the bit locker encryption build into those. Either because regulations or their increasing security or they
huge mobile workforce. And there's also a lot of Microsoft surface is out there that are also ah, gonna be bit Lockard just just by default. A zey come from the factory. Um, so you're gonna you know, you're gonna do this on a professional basis. You're gonna need to be prepared
in house to to deal with
with full disk encryption.
Uh, the questions always gives way. How do I know if it's scripted?
Ask someone right now. Not everything's a technical solution. We can just go. Hey, is your disk encrypted? Uh, Yeah, we encrypt everything here. Great. Good to know. Um, if the target system is live, you can perform some easy checks on it on a Windows system. We just type in their bit locker at the search bar,
and we go to manage bit locker.
Alternatively, you can do open dis management. Look at that. Um, and it will show you whether it's Ah, it's bit locker or not. So if I do this right here on my system, because it seems like a fun time.
So if I just do that very same thing, I type bit locker in the
thing there immediately managed bit locker pops up
and look at that right there. Local disk. CeBIT locker is on. Great. All right, well, that's an easy, easy task. What was the other one I gave it? Said open disk management. Sure. Disk
managements. Can I get to that for the prompt?
No, I can't. But that's OK, cause I know where they hide it.
system. You're down here to administrator tools,
and now it's computer management. No wonder I I messed that up.
but under disk management, asi I knew I was right there. somewhere. Computer management. If we take a look at our Dr C here, we see that it's NT fs bit locker encrypted. So to really simple ways to show it. And it shows down here in the in the lower pain. Also, that it's a bit locker encrypted volume, so
simple, easy ways to figure out whether you're
system is bit locker encrypted, Billy said. First of all, just just asked someone,
you know, good, I t folks, we'll know whether they're encrypted or not
and be able to provide that information
on an apple. It's a little bit different. Um, you go to, ah, the Apple menu system preferences, security and privacy. And then there's a file vault tab at the top of that security and privacy section that will show you whether it is fall vote encrypted.
That Apple menu is in the top left corner of your screen and the finder.
I just click a little apple come down. There's also command line options for doing that, but you know who wants to do that? Like online Blue?
Um, so desiccation not familiar with that, Uh, I said right there in the top left hand corner on the picture of the left. You click a little apple there, you can see system preferences. You click on system preferences going to open up a pain with a bunch of different system preferences. Units like the security and privacy one that we can see here on the right.
And then, of course, you know your tab over You've got file vault there, and it will tell you that
Volvo has turned on on this Macintosh hard drive, and the recovery key has been set
that it's all encrypted up. So nice and simple easy ways to find out.
Um, I said most newer Macs are gonna all be filed, all encrypted, so it's pretty much a standard.
All right, um, what about the forensic images themselves? If I had a forensic image of a hard drive, um, you know what? I need to figure out if they're encrypted? Well, one I could just try and mount it. If it doesn't mount. Probably get some sort of air. And yet, But you can also look for the file signatures
for this. So the signature looking for the beginning of a bit locker encrypted of volume is this Dash
f ve Dash F s dash on that sends for full volume encryption file system. Right? I'll be right there. Big letters, right at the beginning of your bit locker. Encrypted volume. Boom. You know, I know I've got an encrypted disk on a Mac. It's a little bit different. The signature is, uh,
n C R D s A or this big hex value here, 65 e 63 70 blob above the ball
that would be found in the beginning of a file vault encrypted volume to let you know that's there, you know? And you can do that through a hex editor. Ah, you know, you could do that. F t k amateur. Just anything that would show you the raw disk there. You'd be able, Teoh quickly identify whether they're encrypted.
And of course, you wouldn't be able to see any, you know, asking text sort of content that made any sense. So
another dead giveaway that you're dealing with some encryption there.
All right, so one of the things that's important here is you know, when I'm collecting this disk and it's and I found out that it's encrypted, I want to make sure that I get the bit locker recovery key for this. If I'm dealing with Windows system,
it's on a windows system. I just simply open up. Ah, Windows system coming. Admin command prompt. Gotta be an admin. Kracman prompt
on at that command. Prompt. I type in manage dash Bt space Dash protectors.
The first disk there, the suitable volume. So in this case, you know, we're assuming it's the C drive
space dash. Get that Will go ahead and throw up some some interface there that will have a We're looking for a 48 digit eso. It's, ah, eight sets of six digits. Separated by dash is kind of like my example here. The 1123 We're looking for this big
string number of 48 digits here, and that's gonna be our bit locker recovery key
they were gonna use to unlock are encrypted Bill locker volume later on on and, you know, let's let's actually do right here. Oh, I'm gonna share my whole crazy bit locker key with everybody. You guys excited, right?
Totally. Hacks or me.
Bummer. Brian only uses the training computer.
All right, so
dash, protect doors.
C colon big C corn dash, get.
Look at that 48 digit
key right there. Numerical password, all that type of stuff.
And that's our bit locker key.
Fun, huh? Not hard to do it all. You want to copy that out? That's definitely something that you're gonna want to store in your evidence. Documentation is, you know, any passwords or keys like that s o that down the road, especially, Ah, you know, civil litigation, criminal cases, things like this where, you know, it could be
years from the time you collect the data to the time you actually end up using it for
depositions, trials, whatever. It might be really important to make sure that you store those with your evidence documentation so that, you know, somewhere down the road, maybe three or four of investigators or examiners removed from you, they'll still have access that data.
Um, for a Mac file vault to encrypted, all you need is the admin password. Which is why I got Billy Eyeless. You're doing that
because this is one of those areas where I'm just back somehow for hold of frustration that I have with Apple for some of the things that they dio That's the easiest thing ever. Just I just need the admin password for the system, and I can go ahead and unlock my follow wall. Teoh encrypted Dis so
much, much simpler on a Mac.
The Evimetry Filesystem Bridge: Making Your AFF4 Forensic Images Available
In this free course we will cover the Evimetry Filesystem Bridge and do a quick ...
Certificate of Completion Offered
Basic Evimetry Deadboot Forensic Acquisition: Wired and Local
This course covers using the creating an Evimetry Deadboot dongle to create a forensic image from ...
1 CEU/CPE Hours Available
Certificate of Completion Offered