Windows Forensics
* หากมีข้อมูลข้อผิดพลาดประการใด ขออภัยมา ณ ที่นี้ด้วย รบกวนแจ้ง Admin เพื่อแก้ไขต่อไป
ขอบคุณครับ
#WindowsForensic #ComputerForensics #dfir #forensics #digitalforensics #computerforensic #investigation #cybercrime #fraud
Digital forensic examiners are investigators who are experts in gathering, recovering, analyzing, and presenting data evidence from computers and other digital media related to computer-based .They might work on cases concerning identity theft, electronic fraud,investigation of material found in digital devices ,electronic evidence, often in relation to cyber crimes.
* หากมีข้อมูลข้อผิดพลาดประการใด ขออภัยมา ณ ที่นี้ด้วย รบกวนแจ้ง Admin เพื่อแก้ไขต่อไป
ขอบคุณครับ
#WindowsForensic #ComputerForensics #dfir #forensics #digitalforensics #computerforensic #investigation #cybercrime #fraud
Detecting disk encryption is one of the most critical steps in Digital Forensics. If an investigator shuts down a machine without realizing the disk is encrypted, they risk losing access to the data permanently if the recovery key is unknown.
Based on industry-standard forensic guidelines and the provided evidence, here is the step-by-step process for detecting encryption.
The first step is to check for obvious UI indicators while the system is still running.
File Explorer: Look for a lock icon on the drive letters in "This PC."
Gold Lock: The drive is encrypted and currently locked (requires a key).
Silver/Open Lock: The drive is encrypted but currently unlocked (accessible).
System Tray: Look for icons related to encryption software like VeraCrypt, PGP, or Check Point.
Using built-in OS tools is a "low-footprint" way to confirm encryption status without installing new software.
Open Command Prompt or PowerShell as an Administrator.
Run the command: manage-bde -status
Analysis:
Conversion Status: Look for "Fully Encrypted" vs. "Fully Decrypted."
Percentage Encrypted: Shows if an encryption process is currently in progress.
Encryption Method: Identifies the algorithm (e.g., AES 128 or XTS-AES 256).
Lock Status: Confirms if the volume is Locked or Unlocked.
Standard OS commands may miss third-party encryption (like TrueCrypt or VeraCrypt). Forensic investigators use specialized, non-intrusive tools like Magnet Encrypted Disk Detector (EDD).
Execution: Run EDDv310.exe from a forensic USB drive to avoid altering the host's registry.
Physical Drive Scan: The tool scans physical disk signatures (MBR/GPT) for encryption headers.
Logical Volume Scan: It checks every mounted volume for BitLocker, TrueCrypt, PGP, or VeraCrypt.
Results: If the tool detects encryption, it will red highlight the specific drive and the type of encryption found in red highlight, as seen in your provided screenshots.
If encryption is detected, DO NOT SHUT DOWN THE COMPUTER until you have performed the following:
RAM Capture: Use a tool (like FTK Imager) to capture the volatile memory. Encryption keys are often stored in plain text within the RAM while the drive is mounted.
Search for Recovery Keys: Look for BitLocker Recovery Key.txt files on the desktop, in the user's Microsoft Account, or printed physical documents.
Live Imaging: If the disk is "Unlocked," perform a "Live Image" of the logical volume. This captures the data in its unencrypted state.
Hash Validation: Always calculate the Hash Value (MD5/SHA-256) of your captured image to ensure its integrity for use in court.
Ref: magnetforensics[.]com
* หากมีข้อมูลข้อผิดพลาดประการใด ขออภัยมา ณ ที่นี้ด้วย รบกวนแจ้ง Admin เพื่อแก้ไขต่อไป
ขอบคุณครับ
#WindowsForensic #ComputerForensics #dfir #forensics #digitalforensics #computerforensic #investigation #cybercrime #fraud
A step-by-step guide on how to perform a drive acquisition using dc3dd Photo by Gemini Step 1: Identify the Target Drive Before starting, yo...