Encase Overview.

Slides:



Advertisements
Similar presentations
Collaboration Model for Law Enforcement X-Ways Investigator (investigator version of X-Ways Forensics)
Advertisements

Operating Systems. Operating System (OS) The software that manages the sharing of the resources of a computer. Examples of Operating Systems ◦ Windows.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
File System Analysis.
© 2008 Kroll Ontrack Inc.| Ontrack PowerControls 5.1 The ultimate “power tool” for SharePoint administrators.
Guide to Computer Forensics and Investigations Fourth Edition
Digital Forensics Module 11 CS /26/2004Module 112 Outline of Module #11 Overview of Windows file systems Overview of ProDiscover Overview of UNIX.
Computer & Network Forensics
Microsoft Visio is diagramming software for Microsoft Windows. It uses vector graphics to create diagrams. The 2007 Standard and Professional editions.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 8 Macintosh and Linux Boot Processes and File Systems.
Encase Overview. What is Encase EnCase Forensic is the industry standard in computer forensic investigation technology. Encase is a single tool, capable.
© 2009 Kroll Ontrack Inc.| Ontrack PowerControls 6.0 for SharePoint™ A Better Way to Search and Restore.
Using Microsoft Outlook: Basics. Objectives Guided Tour of Outlook –Identification –Views Basics –Contacts –Folders –Web Access Q&A.
Sleuthkit/Autopsy Kevin Krause.
1 Outlook Lesson 1 Outlook Basics and Microsoft Office 2010 Introductory Pasewark & Pasewark.
F9-Common Forensic Analysis Techniques Dr. John P. Abraham Professor UTPA.
Software GCSE ICT.
COMPUTER FORENSIC EXAMINATION IN AUSTRALIAN Wanwimol Panpeng
Microsoft Outlook 2007 Basics Distance Learning (860) 343 – 5756 Chapman 633/632 Middlesex Community College Visit
1 InStar Studio Product Release December The AMS InStar Studio release results in a move to a more powerful and scalable platform for huge future.
Module 9 Configuring Messaging Policy and Compliance.
Dušan Mikulaj, Marek Laššák, Institute of Forensic Science, Slovakia – Bratislava Comparison of open source and commercial software in forensic informatics.
Workbench Overview Dwight Deugo Nesa Matic
EBSCOhost 2.0 GOLD/GALILEO ANNUAL USERS GROUP CONFERENCE August 1, 2008.
Timeline Analysis Geoff Black, EnCE, SnortCP Senior Forensic Consultant Professional Services Division Guidance Software, Inc.
Guide to Computer Forensics and Investigations Fourth Edition
Fourth R Inc. 1 WELCOME TO MICROSOFT OFFICE OUTLOOK 2003 INTRODUCTORY COURSE.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Module 7 Planning and Deploying Messaging Compliance.
Microsoft Outlook 2010 Instructor: Julie Thorngren
Selective and Intelligent Imaging Using Digital Evidence Bags.
© Paradigm Publishing, Inc. 4-1 Chapter 4 System Software Chapter 4 System Software.
EnCase  Starting a New Case  Adding a Device  Creating a Boot Disk  Keyword Search  Bookmarking  File Signatures  Exporting Files/Report  File.
Overview Using Plugins Developing Plugins Basic Examples / Demo Outlook Overview Using Plugins Developing Plugins Basic Examples / Demo Outlook Plugin.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael Jones2Digital Forensic Investigations.
Lesson 17 Mail Merge. Overview Create a main document. Create a data source. Insert merge fields into a main document. Perform a mail merge. Use data.
Solution to convert DBX file to PST file. INDEX  Introduction to DBX file.  Introduction to PST file.  Need to convert DBX file to PST file.  Solution.
Analysing Image Files Michael Jones. Overview Images and images Binary, octal, hexadecimal File headers and footers Example (image) files Looking for.
OST to PST Converter Convert OST into PST, MSG, EML, MBOX and DBX migrate s.com/2016/01/23/convert-ost-to-pst-format.
Tammy Clark, Chief Information Security Officer
Unit 4 – Technology literacy
EnCase Computer Forensics
SEARCHING, VIEWING AND BOOKMARKING
John Metz and Jeff Potts Michigan’s A. E. R. Annual Conference 2017
Discovering Computers 2012: Chapter 8
Processing Evidence Files
Using E-Business Suite Attachments
Advanced Computer Forensics
How to Do CD/DVD Data Recovery
Module 4: Managing Access to Resources
Microsoft Outlook By: Phuong Nguyen.
Chapter 12: File System Implementation
Microsoft® Outlook® 2010 Training
Guide to Computer Forensics and Investigations Fifth Edition
ClamXav Antivirus Scanner: A Free Tool for Your Mac OS X
Introduction to Basic Interface of
Chapter 5 EnCase Concepts.
Knut Kröger & Reiner Creutzburg
Welcome To: Outlook Day 1
Computer Forensics Discovery and recovery of digital evidence
MIGRATION.
EndNote by: fatimah alotaibi.
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
Digital Forensics Dr. Bhavani Thuraisingham
Computer Forensics Lab 1 INFORMATION TECHNOLOGY DEPARTMENT LEBANESE FRENCH UNIVERSITY (LFU) COURSE CODE: IT402CF 1.
Learning the Basics of Microsoft Word 2010 for Microsoft Windows
Using Microsoft Outlook: Outlook Support Number
Presentation transcript:

Encase Overview

What is Encase EnCase Forensic is the industry standard in computer forensic investigation technology. Encase is a single tool, capable of conducting large-scale and complex investigations from beginning to end. By Guidance Software, Inc. Version 6.10

Who Can use Encase Law enforcement officers Government investigators Corporate investigators Consultants

Features Acquire data in a forensically sound manner using software with an unparalleled record in courts worldwide. Investigate and analyze multiple platforms — Windows, Linux, AIX, OS X, Solaris and more — using a single tool. Save days, if not weeks, of analysis time by automating complex and routine tasks with prebuilt EnScript® modules, such as Initialized Case and Event Log analysis. Find information despite efforts to hide, cloak or delete.

Features Easily manage large volumes of computer evidence, viewing all relevant files, including "deleted" files, file slack and unallocated space. Transfer evidence files directly to law enforcement or legal representatives as necessary. Review options allow non-investigators, such as attorneys, to review evidence with ease. Reporting options enable quick report preparation

How Encase works

File systems supported by EnCase software: FAT12/16/32, NTFS, EXT2/3 (Linux), Reiser (Linux), UFS (Sun Solaris), AIX Journaling File System (JFS and jfs) LVM8, FFS (OpenBSD, NetBSD and FreeBSD), Palm, HFS, HFS+ (Macintosh), CDFS, ISO 9660, UDF, DVD, ad TiVo® 1 and TiVo 2 file systems

Encase Interface:

Encase Interface: System menu Toolbar Window containing panes Status line

Case Management (1) An evidence case includes: an evidence file a case file EnCase® program configuration files

Case Management (2) The case file contains : pointers to one or more evidence files or previewed devices bookmarks search results sorts hash analysis results signature analysis reports

Working with Evidence EnCase applications support: EnCase Evidence Files (E01): includes contents of an acquired device, investigative metadata and the device-level hash value. Logical Evidence Files (LEF/L01): created from files seen in a preview or existing evidence file. Raw images Single files, including directories

Working with Evidence Preview a device Add a device Acquire a device Hashing a device Restore: physical or logical

Viewing Files Encase Supports viewing the following files: Text (ASCII and Unicode) Hexadecimal Doc, native formats for Oracle Outside In 8.2.2 technology supported formats Transcript, extracted content with formatting and noise suppressed Various image file formats

View Compound Files Outlook Express (DBX) Outlook (PST) Exchange 2000/2003 (EDB) Lotus Notes (NSF) for versions 4, 5, and 6 Mac DMG Format Mac PAX Format JungUm and Hangul 97 and 2000 Korean Office documents Zip files such as ZIP, GZIP, and TAR files Thumbs.db files Others not specified

Reporting

Project Information Project: Analyze one of evidence files and write an report. Choose one evidence file in C:\EvidenceFiles folder. Find User Manual in C:\Encase folder Lab Location: 4.101 Time: Make an appointment with TA by email to na061000@utdallas.edu

Question?