SlideShare une entreprise Scribd logo
1  sur  58
Télécharger pour lire hors ligne
Steve Salinas               The Next Evolution in
Product Marketing Manager       Digital Forensics
Forensic Business Unit
June 2011
EnCase© Forensic v7
Agenda
                                                   EnCase© Portable                         v3

• EnCase Forensic
            – v6 Review
            – v7’s New Approach to Forensics
            – v7 Demonstration
            – v7 Housekeeping
• EnCase Portable
            – Product Review
            – Demonstration
7/26/2011                                             Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
The Evolution of v6




7/26/2011               Guidance Software, Inc. 2011, All Rights Reserved
EnCase® Forensic v6: A user-driven                                EnCase© Forensic v7

workflow
            Locate item of           Expand search                Browse results
               interest




• EnCase Forensic v6
            – Examiner must know which functions to run from several locations
            – Associations must be manually identified by the investigator
            – The deeper the analysis, the more data to review
7/26/2011                                                            Guidance Software, Inc. 2011, All Rights Reserved
EnCase® Forensic v7: Let EnCase do the work                             EnCase© Forensic v7

        EnCase Processor
                                           Find item of interest              EnCase automatically
                                                                               finds related items




• Complete common processing and indexing before the examiner looks at the
  case
            – Template-driven, user-configured
            – Not required… Examiner can jump directly into evidence and choose to run later

7/26/2011                                                                  Guidance Software, Inc. 2011, All Rights Reserved
Demonstration
EnCase© Forensic v7
v7 is about a New Approach
• A New Approach to
            –   Navigation
            –   Processing
            –   Searching
            –   Email
            –   Smartphones and Tablets
            –   Reporting
            –   EnScripts
            –   Evidence Management
7/26/2011                                   Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
EnCase Processor
• Recover Folders
            – FAT Volumes
                • Searches through the unallocated clusters of a specific FAT partition for the signature of a
                  deleted folder
                • Rebuilds files and folders that were within that deleted folder
            – NTFS Folders
                • Recovers files and folders from Unallocated Clusters and continues to parse through the
                  current Master File Table (MFT) records for files without parent folders.
            – UFS and EXT2/3 Partitions
                • Parses the MFT to find files listed but that have no parent directory. All of these files are
                  recovered and placed into the gray Lost Files folder
            – Formatted Drives
                • Searches through the drive and recovers folders, subfolders and files from within those
                  folders if the information is still available



7/26/2011                                                                                   Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
EnCase Processor
• File Signature Analysis
            – Performs file signature analysis and notes any
              mismatches, unknown file signatures
• Protected File Analysis
            – Devices searched recursively
            – As compound files found, sent through processor
              functions
            – Passware integration
7/26/2011                                             Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
EnCase Processor
• Hash Analysis
            – Both MD5 and SHA-1 supported
            – Libraries
               • Primary and Secondary
               • Metadata can be added to the hash records
               • useful for matching file size
            – Hash collisions
               • In v6, only the first hash math would be shown
               • In v7 all matching hashes are shown
            – Tagging
               • Add tag to hash value, such as conviction for a CP image that was used to
                 try, prosecute, and convicted
7/26/2011                                                               Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
EnCase Processor
• Expand Compound Files
            – Archives
                 • Up to 15 levels
            – Registry
• Find Email
            –   PST (Microsoft Outlook)
            –   NSF (Lotus Notes)
            –   DBX (Microsoft Outlook Express)
            –   EDB (Microsoft Exchange)
            –   AOL
            –   MBOX
7/26/2011                                           Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
EnCase Processor
• Find Internet Artifacts
            – Comprehensive Option
            – What’s Identified
               •   History: user's browsing history
               •   Cache: locally stored internet information
               •   Cookies: stored website cookie data
               •   Bookmarks: user's bookmarks and favorites
               •   Downloads: collects the downloaded data
• Search for Keywords
            – Enter keywords
            – Processor will search for keyword and store hits
7/26/2011                                                         Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
EnCase Processor
• Index Text
            –   Index engine optimized for forensic tasks
            –   Language specific noise file
            –   Min word length limits what will be index
            –   Unicode indexing
            –   Word breaking
                 •   Integrated Microsoft word-breaking
                 •   Not whitespace delimited
                 •   Most conservative word-breaking
                 •   Allows you to break URLs, for example
7/26/2011                                                      Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
EnCase Processor
•      EnScript Modules
            – System info parser (Windows, Linux, Mac)
                 •   Will run proper script to recover artifacts from the device
            – IM Parser
                 •   Updated to support AOL, MSN, Yahoo latest versions
                 •   Output gets put back into the processor tasks
            – File Carving
                 •   Uses same table as signature analysis table
                 •   Describe header and footer in same table.
                 •   Everything gets indexed, can search carved files
            – Windows Event Log Parser
            – Windows Artifact Parser
                 •   MFT transaction log, recycle bin, link file parsing all in one
            – Unix Login
            – Linux Syslog Parser
            – Personally Identifiable Information
                 •   Credit Cards, phone numbers, email addresses, and SSNs

7/26/2011                                                                               Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
EnCase Processor

• Custom Modules
            – Custom EnScript modules can be added to the
              processor
            – Output can be indexed




7/26/2011                                          Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
EnCase Processor

• Other Capabilities
            – Command Line
            – Process devices individually
               • Separate cases integrated back into a new case
               • Output can be copied to network share or used as local
                 evidence
            – Templates

7/26/2011                                                  Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
Processor Workflow
    If not mounted, continue                    Hash, Signature, and
                                                                           Recover Folders                    Acquire
            processing             Mount           Protected file
                                                                            (Each volume)                     (Device)
                                                      Analysis


        Internet Artifacts
                                                                                                              Device
            Email Threading     Thread DB                 Archive LEF

                                                                          Send to
            Create Thumbnail   Thumbnail LEF                             processing
                                                                        queue when                    Processing Queue
                                                Internet LEF              device is
                 Index         Device Index
                                                                          finished

            EnScript Modules
              (Transcript)     Transcript LEF
                                                Module LEF


            EnScript Modules
                               Device Index
                (Device)



7/26/2011                                                                                    Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
Processor – Output Details
            Archive LEF
                          One Archive LEF generated   Evidence Cache - Storage details
                          per Mounted Entry           Primary Device Folder
                                                           EmailThreads.sqlite Email Threading DB
                          One Device Cache
        Device Cache                                       DeviceIndex.L01     Index
                          generated per Primary
                          Device and Archive               I_<GUID>.L01        Internet Artifacts
                                                           Transcript.L01      Transcript Cache
                          One Internet/Thumbs/
      Internet/Thumbs/    Transcript/Module LEF            P_<GUID>.L01        Thumbnail Cache
          Transcript/     generated per Primary
         Module LEF
                          Device                           M_<GUID>.L01        Module Results
                                                           DC_<GUID>.dch       Device Cache
                          One Thread DB generated
            Thread DB     per Primary Device
                                                           E_<GUID>.L01        Email LEFs
                                                           A_<GUID>.L01        Archive LEFs
                          One Index generated per
       Device Index
                                                           SearchHits.bin      Search Hits
                          Primary Device
                                                           Evidence.bin        Device Information

7/26/2011                                                                               Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
EnCase Processor

• Automation for
            – Ease-of-Use
            – Efficiency
            – Accuracy
            – Effectiveness



7/26/2011                       Guidance Software, Inc. 2011, All Rights Reserved
Query Snytax
EnCase© Forensic v7
  Index – Syntax Examples
                                   Syntax                       Example
   Keyword Search                      x            pirate
   Phrase Search                    "x y z"         "shiver me timbers"
   Find any word in a                               pirate OR parrot OR ninja OR ship
   document, either word
   must appear in the                 or
   document
   All words must appear in                         pirate AND parrot AND ninja AND
   document                           and           ship
   Exclude the second search                        pirate NOT ninja
                                      not
   term
   Operators as Keywords       "And", "Or", "Not"   pirates "and" ninjas

7/26/2011                                                     Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
  Index – Syntax Examples
  Proximity                                                          Syntax                                  Example
  First word must occur within specified number of words of the                    w/n                       pirate w/5 treasure
  second
  First word must precede second within specified number of                       pre/n                      pirate pre/5 treasure
  words
  First word must not occur within specified number of words of                   nw/n                       pirate nw/5 ninja
  the second
  First word must not precede second within specified number of                  npre/n                      pirate npre/5 ninja
  words
  Find word within a specified number of words from the beginning             w/n firstword                  pirate w/10 firstword
  of the document
  Find word within a specified number of words from the end of the            w/n lastword                   pirate w/10 lastword
  document
  Find word more than a specified number of words from the                    nw/n firstword                 pirate nw/10 firstword
  beginning of the document
  Find word within a specified number of words at the end of the              w/n lastword                   pirate nw/10 lastword
  document
  Find items containing less than specified number of words              firstword w/n lastword              firstword w/5 lastword
  Find items containing more than a specified number of words           firstword nw/n lastword              firstword nw/5 lastword

7/26/2011                                                                                      Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
  Index Syntax Examples
Fields         Syntax           Example
Message Size   [Message Size]   [Message Size]#1024#
Logical Size   [Logical Size]   [Logical Size]#1024#
Modified
               [Modified]       *See Dates
Created        [Created]        *See Dates
BCC
               [BCC]            [BCC]pirate@piratecompany.com
Subject        [Subject]        [Subject]Landlubbers
Message Size   [Message Size]   [Message Size]#1024#




7/26/2011                             Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
  Index Syntax Examples
Dates
(within a date field)       Syntax                           Example
Year                                                         [Modified]#2010#
                                      [Field]#YYYY#
Day                                                          [Modified]#2010-01-01#
                                  [Field]#YYYY-MM-DD#
Day, Hour, Minute                                            [Modified]#2010-01-01T012:00#
                              [Field]#YYYY-MM-DDTHH:MM#

Day, Hour, Minute, Second                                    [Modified]#2010-01-01T012:00:01#
                             [Field]#YYYY-MM-DDTHH:MM:SS#
Date Range
                             [Field]#YYYY-MM-DD…YYYY-MM- [Modified]#2010-01-01...2010-03-
                                           DD#           01#

                                     [Field]#YYYY…#          [Created]#2010…#
Date Range (Hour Offset)                                   [Modified](#2010-01-01T12:00:01-
                             [Field](#YYYY-MM-DDTHH:MM:SS-
                                                           07:08...2010-03-01#)
                                   HH:SS…YYYY-MM-DD#)
7/26/2011                                                        Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
  Index Syntax Examples
     Wildcards            Syntax                 Example
     single character
                          ?                      pi?ate
     multiple character
                          *                      pirate or nin*
     Stemming
                          ~ <s:variable x y z>   Sail~ <s:sail sail sails sailing sailed>



     Additional           Syntax                 Example
     Case Sensitive       <c>                    <c>"Davey Jones"
     Case Insensitive     <-c>                   <c>"Davey Jones" <-c>pirate
     Numeric Range
                          #x…y#                  #123…456#
                          #...y#                 #...123#
                          #x…#                   #456…#
     Grouping             x OR (y NOT z)         pirate OR (ship NOT ninja)

7/26/2011                                                         Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
Searching Processed Data

• Index query
            – General search
               • gossip
            – Field
               • [Extension]docx
            – Date Search
               • [Written]#...2008#

7/26/2011                             Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
Searching Processed Data

• Index query
            – Proximity search
               • ("Formula Three" w/3 Trucking)
            – Internet
               • *hulu.com
            – Modules
               • “North Korea”

7/26/2011                                         Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
Additional Enhancements

Continue to do what EnCase has
historically done best
            – Broad OS and File system support
            – Increase support for standard encryption products
               • File-based, enterprise, and whole disk
            – Deep analysis of user activity artifacts
               • Registry, logs, system records, etc.

7/26/2011                                                   Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
Raising the Bar

• Focus on the user
            – Processor to automate indexing and common tasks
            – Efficient searching for “items of interest”
            – Automated ability to find “related items”




7/26/2011                                          Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
Raising the Bar

• New indexing engine
            – Leverages the powerful new indexing engine used in
              EnCase® eDiscovery
            – Sophisticated searching across data & metadata
            – Versatile query syntax to support basic and
              advanced users


7/26/2011                                            Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
Raising the Bar

• Template driven pre-processing and report
  generation
            – Automate repetitive tasks
            – Facilitate consistent, organizationally-approved best
              practices



7/26/2011                                              Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
Training
• Perfect Time to Learn or Update Skills
            – V7 is a shift in the workflow V6 users are accustomed to
            – All GSI facilities teaching classes in V7 beginning July
              2011
            – Training Partners have access to V7 materials
            – The Training Passport is a cost effective way to learn V7
            – V6 training still available via OnDemand


7/26/2011                                                Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
Training

• EnCase Essential
            – Included with all purchases and upgrades
            – An OnDemand course designed to familiarize a new
              user with the basic use of V7
            – A guide for V6 users to get a feel for the new
              interface.


7/26/2011                                           Guidance Software, Inc. 2011, All Rights Reserved
Pricing Information
EnCase© Forensic v7
 v7 Pricing at a Glance
                                                                                     SMS
Product                                                              License Price   (Software, Maintenance, & Support)
EnCase® Forensic v7                                                  $2995.00*       1 yr @ 20% license price*
                                                                                     2 yr @ 18% license price*
                                                                                     3 yr @ 16% license price*
EnCase® Forensic v6                                                  $896.00*        1 yr SMS: $599.00* (20% retail price)
Upgrade to EnCase® Forensic v7                                                       2 yr SMS: $1078.20*(18% retail price x2)
                                                                                     3 yr SMS: $1437.60*(16% retail price x 3)

EnCase® Forensic Deluxe                                              No Longer Offered
PLSP                                                                 No Longer Offered
EnCase® ProSuite                                                     No Longer Offered
Individual Modules                                                   No Longer Offered
EnCase® Neutrino                                                     Product has been End of Lifed
Customers current on SMS or PLSP received EnCase Forensic v7 at no cost
* International pricing may vary, SMS is required on all upgrades and new licenses



 7/26/2011                                                                                                   Guidance Software, Inc. 2011, All Rights Reserved
EnCase Portable:
Forensic Triage & Data Collection
in the Field
Business Issues - Problems                                                EnCase© Portable                         v3

• Corporate IT
            – One organization, many networks
            – Remote employees infrequently on the network
            – Limited resources
• Law Firms
            – Delay between request for collection and data being collected
            – Rely on outside resources or client self collection
            – Expensive to use these outside resources and risky to rely on self-collection
• Law Enforcement
            – Vast amounts of data to collect
            – Limited resources
            – Trade-offs between casework and collection


7/26/2011                                                                    Guidance Software, Inc. 2011, All Rights Reserved
Business Issues – Impacts                                                 EnCase© Portable                           v3

• Corporate IT
            – Specialists may need travel to remote location to collect data
            – Employees may be forced to send their machine to corporate
            – Downtime for both employees
• Law Firms
            – Time to case resolution
            – Risk
            – High consulting costs (Airfare, meals, hotels, etc.)
• Law Enforcement
            – Case backlog grows
            – Longer time to case resolution
            – Potentially vital data missed
7/26/2011                                                                      Guidance Software, Inc. 2011, All Rights Reserved
Business Issue – Solutions                                                    EnCase© Portable                         v3

• Corporate IT
            –   Non-expert collect using trusted & proven technology
            –   No training needed to collect (basic computer skills only)
            –   Allowing employees to retain their machines
            –   Keeping expert resources focused on core competency (analysis)
• Law Firms
            – Immediate data collection & preservation
            – Reduce cost
            – Collect with internal personnel with little training required
• Law Enforcement
            – Collect data without requiring forensic expert
            – Data not altered during search and collection
            – Option to have immediate access to data

7/26/2011                                                                        Guidance Software, Inc. 2011, All Rights Reserved
EnCase Portable                                     EnCase© Portable                         v3


• Automated forensic triage and collection from a
  USB device, designed for use when
            – Immediate access to evidence is required
            – Field personnel, the users of EnCase Portable, have
              no forensic training and/or experience
            – Large number of computers in the field to triage
            – Ability to review data immediately can provide
              actionable results
7/26/2011                                              Guidance Software, Inc. 2011, All Rights Reserved
Core Capabilities                                 EnCase© Portable                         v3


• Customizable job creation
            – Use keywords and hash values to perform targeted
              collections
            – Memory acquisition
            – Full disk imaging



7/26/2011                                            Guidance Software, Inc. 2011, All Rights Reserved
Core Capabilities                                     EnCase© Portable                            v3


• Multiple operating modes
            – Live mode
            – Boot mode
• Live triage
            – Instantly view images on the target machine
            – Review documents in real-time
• Forensically sound
            – Search and collect while preserving metadata
7/26/2011                                                   Guidance Software, Inc. 2011, All Rights Reserved
Product Overview - Benefits                            EnCase© Portable                         v3

• Benefits
            – Triage suspect computers instantly
            – Preserve digital evidence in the court-vetted EnCase
              evidence file format
            – Triage computers in remote locations without sending
              forensic experts
            – Seamlessly integrate collected data into EnCase®
              Forensic or EnCase® Enterprise for analysis
            – Create a repeatable and defensible triage and collection
              process using non-technical personnel
7/26/2011                                                 Guidance Software, Inc. 2011, All Rights Reserved
Triage Case Studies                                   EnCase© Portable                         v3


• Parolee Home Visit
            – During visit, triage solution used to review images,
              internet history on parolee’s computer
            – Real-time feedback signals probation officer if
              parolee has violated terms of parole



7/26/2011                                                Guidance Software, Inc. 2011, All Rights Reserved
Triage Case Studies                                 EnCase© Portable                         v3


• Border Crossing
            – Person of interest attempts to enter/leave territory
            – Agent uses Triage solution to search computer,
              looking for known terrorist websites, watch list
              names, etc.
            – In minutes agent can detect if person should be
              detained for further questioning

7/26/2011                                              Guidance Software, Inc. 2011, All Rights Reserved
Triage Case Studies                                 EnCase© Portable                         v3


• Cyber-bullying at a University
            – Security Team uses triage solution to search
              computer for Twitter, Facebook logs for evidence of
              cyber-bullying
            – Discovering evidence, action against student is taken



7/26/2011                                              Guidance Software, Inc. 2011, All Rights Reserved
What’s the Takeaway                                  EnCase© Portable                         v3


• Effective Triage can
            – Provide real-time feedback for first responders
            – Help target activities of on-site investigations
            – Assist in identifying suspects and victims
            – Uncover related misdoings
            – Provide forensic specialists with direction and focus
              for investigation
7/26/2011                                               Guidance Software, Inc. 2011, All Rights Reserved
How EnCase Portable Works              EnCase© Portable                         v3

                  1. Configured device given to field
                     agents
                  2. Field agents triage target
                     computers
                  3. Collected evidence sent back to
                     experts for analysis in EnCase




7/26/2011                                 Guidance Software, Inc. 2011, All Rights Reserved
EnCase Portable                                      EnCase© Portable                         v3


• With EnCase Portable
            – Enable first responders to perform triage in a matter
              of minutes
            – Review evidence immediately
            – Utilize proven capabilities of EnCase
            – Store data in forensically sounds Logical Evidence
              File or E01 Formats
            – Fully integrated with EnCase
7/26/2011                                               Guidance Software, Inc. 2011, All Rights Reserved
Advancing the art of Field
Triage and Acquisition
Portable v3 – New Capabilities    EnCase© Portable                         v3


• New Portable
  Management App
            – Create/Edit Jobs
            – Device Management
            – Prepare Storage
            – Manage Evidence


7/26/2011                            Guidance Software, Inc. 2011, All Rights Reserved
Portable v3 – New Capabilities     EnCase© Portable                         v3


• In-Field Job
  Creation
            – Right from EnCase
              Portable
            – No installation of
              EnCase required
            – Jobs can be shared
              after created
7/26/2011                             Guidance Software, Inc. 2011, All Rights Reserved
Portable v3 – New Capabilities          EnCase© Portable                         v3


• New module support
            – System Info Parser
            – Windows Artifact Parser
            – IM Parser
            – Log Parsers (Windows,
              Unix, Linux)


7/26/2011                                  Guidance Software, Inc. 2011, All Rights Reserved
Pricing Information
v3 Pricing at a Glance                                                                             EnCase© Portable                          v3

 Offering                                           License Price                    SMS Price
                                                                                     (Software, Maintenance, and Support)
EnCase® Portable - Single                          $1,175.00*
EnCase® Portable 3-Pack                            $3,299.00*
EnCase® Portable 5-Pack                            $5,245.00*                               1 yr @ 20% license price*
                                                                                            2 yr @ 18% license price*
EnCase® Portable 10-Pack                           $9,990.00*
                                                                                            3 yr @ 16% license price*
EnCase® Portable 1-year Term                       $695.00*
EnCase® Portable 2-year Term                       $1,195.00*
EnCase® Portable 3-year Term                       $2,085.00*



 Customers with current EnCase Portable SMS will receive v3 at no cost
 * International pricing may vary, SMS is required on all EnCase Portable licenses


 7/26/2011                                                                                              Guidance Software, Inc. 2011, All Rights Reserved
EnCase© Forensic v7
Learn More
                                                                  EnCase© Portable                         v3
• EnCase Forensic v7
       http://www.guidancesoftware.com/encase-forensic-v7-whats-new.htm
• EnCase Portable v3
       http://www.guidancesoftware.com/encase-portable.htm
• Follow Us
            –   Facebook: facebook.com/guidancesoftware
            –   Twitter: twitter.com/encase
            –   My Twitter: @Steve_at_EnCase
            –   v7 Twitter HashTag: #EF7
• Get the news from Guidance Software
  http://www.guidancesoftware.com/newsroom.htm
7/26/2011                                                            Guidance Software, Inc. 2011, All Rights Reserved
Encase V7 Presented by Guidance Software   august 2011

Contenu connexe

Tendances

Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsMayank Chaudhari
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh tManesh T
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigationOnline
 
Lecture 9 and 10 comp forensics 09 10-18 file system
Lecture 9 and 10 comp forensics 09 10-18 file systemLecture 9 and 10 comp forensics 09 10-18 file system
Lecture 9 and 10 comp forensics 09 10-18 file systemAlchemist095
 
Accessing Forensic Images
Accessing Forensic ImagesAccessing Forensic Images
Accessing Forensic ImagesCTIN
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenesprimeteacher32
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics OverviewYansi Keim
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hackingAmbuj Kumar
 
Anti forensic
Anti forensicAnti forensic
Anti forensicMilap Oza
 
Memory forensics
Memory forensicsMemory forensics
Memory forensicsSunil Kumar
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationSam Bowne
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collectionFakrul Alam
 

Tendances (20)

Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensics
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigation
 
Forensics Analysis and Validation
Forensics Analysis and Validation  Forensics Analysis and Validation
Forensics Analysis and Validation
 
Lecture 9 and 10 comp forensics 09 10-18 file system
Lecture 9 and 10 comp forensics 09 10-18 file systemLecture 9 and 10 comp forensics 09 10-18 file system
Lecture 9 and 10 comp forensics 09 10-18 file system
 
Accessing Forensic Images
Accessing Forensic ImagesAccessing Forensic Images
Accessing Forensic Images
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hacking
 
Anti forensic
Anti forensicAnti forensic
Anti forensic
 
Memory forensics
Memory forensicsMemory forensics
Memory forensics
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collection
 
Ntfs forensics
Ntfs forensicsNtfs forensics
Ntfs forensics
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 

En vedette

EnCase Enterprise Basic File Collection
EnCase Enterprise Basic File Collection EnCase Enterprise Basic File Collection
EnCase Enterprise Basic File Collection Damir Delija
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007CTIN
 
Sleuth kit by echavarro - HABEMUSHACKING
Sleuth kit by echavarro - HABEMUSHACKINGSleuth kit by echavarro - HABEMUSHACKING
Sleuth kit by echavarro - HABEMUSHACKINGEduardo Chavarro
 
Level1 Part8 End Of The Day
Level1 Part8 End Of The DayLevel1 Part8 End Of The Day
Level1 Part8 End Of The DayCTIN
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public InvestigationsCTIN
 
Nra
NraNra
NraCTIN
 
Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)Shuvo Sarker
 
Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...Mark Matienzo
 
Windows nt istallation
Windows nt istallationWindows nt istallation
Windows nt istallationHarleen Johal
 
Files and Folders in Windows 7
Files and Folders in Windows 7Files and Folders in Windows 7
Files and Folders in Windows 7RIAH ENCARNACION
 
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...OWASP Turkiye
 
Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionSeccuris Inc.
 
Social Media for Investigations Tools
Social Media for Investigations ToolsSocial Media for Investigations Tools
Social Media for Investigations ToolsMandy Jenkins
 

En vedette (20)

EnCase Enterprise Basic File Collection
EnCase Enterprise Basic File Collection EnCase Enterprise Basic File Collection
EnCase Enterprise Basic File Collection
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
 
Windows 7-cheat-sheet
Windows 7-cheat-sheetWindows 7-cheat-sheet
Windows 7-cheat-sheet
 
Citrix
CitrixCitrix
Citrix
 
Sleuth kit by echavarro - HABEMUSHACKING
Sleuth kit by echavarro - HABEMUSHACKINGSleuth kit by echavarro - HABEMUSHACKING
Sleuth kit by echavarro - HABEMUSHACKING
 
Level1 Part8 End Of The Day
Level1 Part8 End Of The DayLevel1 Part8 End Of The Day
Level1 Part8 End Of The Day
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public Investigations
 
Nra
NraNra
Nra
 
Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)
 
Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...
 
Windows nt istallation
Windows nt istallationWindows nt istallation
Windows nt istallation
 
Files and Folders in Windows 7
Files and Folders in Windows 7Files and Folders in Windows 7
Files and Folders in Windows 7
 
Disk forensics
Disk forensicsDisk forensics
Disk forensics
 
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
 
Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and prevention
 
Social Media for Investigations Tools
Social Media for Investigations ToolsSocial Media for Investigations Tools
Social Media for Investigations Tools
 
NTFS Forensics
NTFS Forensics NTFS Forensics
NTFS Forensics
 
Capturing forensics image
Capturing forensics imageCapturing forensics image
Capturing forensics image
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 

Similaire à Encase V7 Presented by Guidance Software august 2011

11/10/2011 ASDFED Indy Chapter Meeting - EnCase v7 - New Features and Functio...
11/10/2011 ASDFED Indy Chapter Meeting - EnCase v7 - New Features and Functio...11/10/2011 ASDFED Indy Chapter Meeting - EnCase v7 - New Features and Functio...
11/10/2011 ASDFED Indy Chapter Meeting - EnCase v7 - New Features and Functio...Rob Zirnstein
 
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...Novell
 
Membase Meetup - San Diego
Membase Meetup - San DiegoMembase Meetup - San Diego
Membase Meetup - San DiegoMembase
 
Autopsy 3.0 - Open Source Digital Forensics Conference
Autopsy 3.0 - Open Source Digital Forensics ConferenceAutopsy 3.0 - Open Source Digital Forensics Conference
Autopsy 3.0 - Open Source Digital Forensics ConferenceBasis Technology
 
OpenSearchLab and the Lucene Ecosystem
OpenSearchLab and the Lucene EcosystemOpenSearchLab and the Lucene Ecosystem
OpenSearchLab and the Lucene EcosystemGrant Ingersoll
 
Malicious File for Exploiting Forensic Software
Malicious File for Exploiting Forensic SoftwareMalicious File for Exploiting Forensic Software
Malicious File for Exploiting Forensic SoftwareTakahiro Haruyama
 
Eprints digital library software.final
 Eprints digital library software.final Eprints digital library software.final
Eprints digital library software.finalwakat norlyn
 
Advance linux presentation_0702011
Advance linux presentation_0702011Advance linux presentation_0702011
Advance linux presentation_0702011Aravindan Arun
 
Cloud storage slides
Cloud storage slidesCloud storage slides
Cloud storage slidesEvan Powell
 
eprints digital library software
eprints digital library softwareeprints digital library software
eprints digital library softwaresonia naomi bandao
 
Eprints digital library software.final
 Eprints digital library software.final Eprints digital library software.final
Eprints digital library software.finalNORLYN WAKAT
 
E-GEN/iCAN
E-GEN/iCANE-GEN/iCAN
E-GEN/iCANteddi22
 
Using Jenkins as Native Packages Factory - Jenkins User Conference Paris 2012
Using Jenkins as Native Packages Factory - Jenkins User Conference Paris 2012Using Jenkins as Native Packages Factory - Jenkins User Conference Paris 2012
Using Jenkins as Native Packages Factory - Jenkins User Conference Paris 2012Henri Gomez
 
CH # 1 preliminaries
CH # 1 preliminariesCH # 1 preliminaries
CH # 1 preliminariesMunawar Ahmed
 
Configure, Pack and Distribute: An RPM Creation Workshop
Configure, Pack and Distribute: An RPM Creation WorkshopConfigure, Pack and Distribute: An RPM Creation Workshop
Configure, Pack and Distribute: An RPM Creation WorkshopNovell
 
Novell Open Enterprise Server Architecture
Novell Open Enterprise Server ArchitectureNovell Open Enterprise Server Architecture
Novell Open Enterprise Server ArchitectureNovell
 

Similaire à Encase V7 Presented by Guidance Software august 2011 (20)

11/10/2011 ASDFED Indy Chapter Meeting - EnCase v7 - New Features and Functio...
11/10/2011 ASDFED Indy Chapter Meeting - EnCase v7 - New Features and Functio...11/10/2011 ASDFED Indy Chapter Meeting - EnCase v7 - New Features and Functio...
11/10/2011 ASDFED Indy Chapter Meeting - EnCase v7 - New Features and Functio...
 
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...
 
Membase Meetup - San Diego
Membase Meetup - San DiegoMembase Meetup - San Diego
Membase Meetup - San Diego
 
Autopsy 3.0 - Open Source Digital Forensics Conference
Autopsy 3.0 - Open Source Digital Forensics ConferenceAutopsy 3.0 - Open Source Digital Forensics Conference
Autopsy 3.0 - Open Source Digital Forensics Conference
 
nessus
nessusnessus
nessus
 
OpenSearchLab and the Lucene Ecosystem
OpenSearchLab and the Lucene EcosystemOpenSearchLab and the Lucene Ecosystem
OpenSearchLab and the Lucene Ecosystem
 
Malicious File for Exploiting Forensic Software
Malicious File for Exploiting Forensic SoftwareMalicious File for Exploiting Forensic Software
Malicious File for Exploiting Forensic Software
 
Eprints digital library software.final
 Eprints digital library software.final Eprints digital library software.final
Eprints digital library software.final
 
A Mayo Clinic Big Data Implementation
A Mayo Clinic Big Data ImplementationA Mayo Clinic Big Data Implementation
A Mayo Clinic Big Data Implementation
 
Advance linux presentation_0702011
Advance linux presentation_0702011Advance linux presentation_0702011
Advance linux presentation_0702011
 
Cloud storage slides
Cloud storage slidesCloud storage slides
Cloud storage slides
 
eprints digital library software
eprints digital library softwareeprints digital library software
eprints digital library software
 
Eprints digital library software.final
 Eprints digital library software.final Eprints digital library software.final
Eprints digital library software.final
 
Sylvain Bellemare Resume
Sylvain Bellemare ResumeSylvain Bellemare Resume
Sylvain Bellemare Resume
 
E-GEN/iCAN
E-GEN/iCANE-GEN/iCAN
E-GEN/iCAN
 
Using Jenkins as Native Packages Factory - Jenkins User Conference Paris 2012
Using Jenkins as Native Packages Factory - Jenkins User Conference Paris 2012Using Jenkins as Native Packages Factory - Jenkins User Conference Paris 2012
Using Jenkins as Native Packages Factory - Jenkins User Conference Paris 2012
 
CH # 1 preliminaries
CH # 1 preliminariesCH # 1 preliminaries
CH # 1 preliminaries
 
Openstorage Openstack
Openstorage OpenstackOpenstorage Openstack
Openstorage Openstack
 
Configure, Pack and Distribute: An RPM Creation Workshop
Configure, Pack and Distribute: An RPM Creation WorkshopConfigure, Pack and Distribute: An RPM Creation Workshop
Configure, Pack and Distribute: An RPM Creation Workshop
 
Novell Open Enterprise Server Architecture
Novell Open Enterprise Server ArchitectureNovell Open Enterprise Server Architecture
Novell Open Enterprise Server Architecture
 

Plus de CTIN

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drivesCTIN
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source ForensicsCTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3CTIN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3CTIN
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaCTIN
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4CTIN
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicCTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsCTIN
 
Vista Forensics
Vista ForensicsVista Forensics
Vista ForensicsCTIN
 
Mac Forensics
Mac ForensicsMac Forensics
Mac ForensicsCTIN
 
Live Forensics
Live ForensicsLive Forensics
Live ForensicsCTIN
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Edrm
EdrmEdrm
EdrmCTIN
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassCTIN
 
CyberCrime
CyberCrimeCyberCrime
CyberCrimeCTIN
 
Search Warrants
Search WarrantsSearch Warrants
Search WarrantsCTIN
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector ConcernsCTIN
 
Raidprep
RaidprepRaidprep
RaidprepCTIN
 
Networking Overview
Networking OverviewNetworking Overview
Networking OverviewCTIN
 
M Compevid
M CompevidM Compevid
M CompevidCTIN
 

Plus de CTIN (20)

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Edrm
EdrmEdrm
Edrm
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 
Raidprep
RaidprepRaidprep
Raidprep
 
Networking Overview
Networking OverviewNetworking Overview
Networking Overview
 
M Compevid
M CompevidM Compevid
M Compevid
 

Dernier

H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Dernier (20)

H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Encase V7 Presented by Guidance Software august 2011

  • 1.
  • 2. Steve Salinas The Next Evolution in Product Marketing Manager Digital Forensics Forensic Business Unit June 2011
  • 3. EnCase© Forensic v7 Agenda EnCase© Portable v3 • EnCase Forensic – v6 Review – v7’s New Approach to Forensics – v7 Demonstration – v7 Housekeeping • EnCase Portable – Product Review – Demonstration 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 4. EnCase© Forensic v7 The Evolution of v6 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 5. EnCase® Forensic v6: A user-driven EnCase© Forensic v7 workflow Locate item of Expand search Browse results interest • EnCase Forensic v6 – Examiner must know which functions to run from several locations – Associations must be manually identified by the investigator – The deeper the analysis, the more data to review 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 6. EnCase® Forensic v7: Let EnCase do the work EnCase© Forensic v7 EnCase Processor Find item of interest EnCase automatically finds related items • Complete common processing and indexing before the examiner looks at the case – Template-driven, user-configured – Not required… Examiner can jump directly into evidence and choose to run later 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 8. EnCase© Forensic v7 v7 is about a New Approach • A New Approach to – Navigation – Processing – Searching – Email – Smartphones and Tablets – Reporting – EnScripts – Evidence Management 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 9. EnCase© Forensic v7 EnCase Processor • Recover Folders – FAT Volumes • Searches through the unallocated clusters of a specific FAT partition for the signature of a deleted folder • Rebuilds files and folders that were within that deleted folder – NTFS Folders • Recovers files and folders from Unallocated Clusters and continues to parse through the current Master File Table (MFT) records for files without parent folders. – UFS and EXT2/3 Partitions • Parses the MFT to find files listed but that have no parent directory. All of these files are recovered and placed into the gray Lost Files folder – Formatted Drives • Searches through the drive and recovers folders, subfolders and files from within those folders if the information is still available 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 10. EnCase© Forensic v7 EnCase Processor • File Signature Analysis – Performs file signature analysis and notes any mismatches, unknown file signatures • Protected File Analysis – Devices searched recursively – As compound files found, sent through processor functions – Passware integration 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 11. EnCase© Forensic v7 EnCase Processor • Hash Analysis – Both MD5 and SHA-1 supported – Libraries • Primary and Secondary • Metadata can be added to the hash records • useful for matching file size – Hash collisions • In v6, only the first hash math would be shown • In v7 all matching hashes are shown – Tagging • Add tag to hash value, such as conviction for a CP image that was used to try, prosecute, and convicted 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 12. EnCase© Forensic v7 EnCase Processor • Expand Compound Files – Archives • Up to 15 levels – Registry • Find Email – PST (Microsoft Outlook) – NSF (Lotus Notes) – DBX (Microsoft Outlook Express) – EDB (Microsoft Exchange) – AOL – MBOX 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 13. EnCase© Forensic v7 EnCase Processor • Find Internet Artifacts – Comprehensive Option – What’s Identified • History: user's browsing history • Cache: locally stored internet information • Cookies: stored website cookie data • Bookmarks: user's bookmarks and favorites • Downloads: collects the downloaded data • Search for Keywords – Enter keywords – Processor will search for keyword and store hits 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 14. EnCase© Forensic v7 EnCase Processor • Index Text – Index engine optimized for forensic tasks – Language specific noise file – Min word length limits what will be index – Unicode indexing – Word breaking • Integrated Microsoft word-breaking • Not whitespace delimited • Most conservative word-breaking • Allows you to break URLs, for example 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 15. EnCase© Forensic v7 EnCase Processor • EnScript Modules – System info parser (Windows, Linux, Mac) • Will run proper script to recover artifacts from the device – IM Parser • Updated to support AOL, MSN, Yahoo latest versions • Output gets put back into the processor tasks – File Carving • Uses same table as signature analysis table • Describe header and footer in same table. • Everything gets indexed, can search carved files – Windows Event Log Parser – Windows Artifact Parser • MFT transaction log, recycle bin, link file parsing all in one – Unix Login – Linux Syslog Parser – Personally Identifiable Information • Credit Cards, phone numbers, email addresses, and SSNs 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 16. EnCase© Forensic v7 EnCase Processor • Custom Modules – Custom EnScript modules can be added to the processor – Output can be indexed 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 17. EnCase© Forensic v7 EnCase Processor • Other Capabilities – Command Line – Process devices individually • Separate cases integrated back into a new case • Output can be copied to network share or used as local evidence – Templates 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 18. EnCase© Forensic v7 Processor Workflow If not mounted, continue Hash, Signature, and Recover Folders Acquire processing Mount Protected file (Each volume) (Device) Analysis Internet Artifacts Device Email Threading Thread DB Archive LEF Send to Create Thumbnail Thumbnail LEF processing queue when Processing Queue Internet LEF device is Index Device Index finished EnScript Modules (Transcript) Transcript LEF Module LEF EnScript Modules Device Index (Device) 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 19. EnCase© Forensic v7 Processor – Output Details Archive LEF One Archive LEF generated Evidence Cache - Storage details per Mounted Entry Primary Device Folder EmailThreads.sqlite Email Threading DB One Device Cache Device Cache DeviceIndex.L01 Index generated per Primary Device and Archive I_<GUID>.L01 Internet Artifacts Transcript.L01 Transcript Cache One Internet/Thumbs/ Internet/Thumbs/ Transcript/Module LEF P_<GUID>.L01 Thumbnail Cache Transcript/ generated per Primary Module LEF Device M_<GUID>.L01 Module Results DC_<GUID>.dch Device Cache One Thread DB generated Thread DB per Primary Device E_<GUID>.L01 Email LEFs A_<GUID>.L01 Archive LEFs One Index generated per Device Index SearchHits.bin Search Hits Primary Device Evidence.bin Device Information 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 20. EnCase© Forensic v7 EnCase Processor • Automation for – Ease-of-Use – Efficiency – Accuracy – Effectiveness 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 22. EnCase© Forensic v7 Index – Syntax Examples Syntax Example Keyword Search x pirate Phrase Search "x y z" "shiver me timbers" Find any word in a pirate OR parrot OR ninja OR ship document, either word must appear in the or document All words must appear in pirate AND parrot AND ninja AND document and ship Exclude the second search pirate NOT ninja not term Operators as Keywords "And", "Or", "Not" pirates "and" ninjas 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 23. EnCase© Forensic v7 Index – Syntax Examples Proximity Syntax Example First word must occur within specified number of words of the w/n pirate w/5 treasure second First word must precede second within specified number of pre/n pirate pre/5 treasure words First word must not occur within specified number of words of nw/n pirate nw/5 ninja the second First word must not precede second within specified number of npre/n pirate npre/5 ninja words Find word within a specified number of words from the beginning w/n firstword pirate w/10 firstword of the document Find word within a specified number of words from the end of the w/n lastword pirate w/10 lastword document Find word more than a specified number of words from the nw/n firstword pirate nw/10 firstword beginning of the document Find word within a specified number of words at the end of the w/n lastword pirate nw/10 lastword document Find items containing less than specified number of words firstword w/n lastword firstword w/5 lastword Find items containing more than a specified number of words firstword nw/n lastword firstword nw/5 lastword 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 24. EnCase© Forensic v7 Index Syntax Examples Fields Syntax Example Message Size [Message Size] [Message Size]#1024# Logical Size [Logical Size] [Logical Size]#1024# Modified [Modified] *See Dates Created [Created] *See Dates BCC [BCC] [BCC]pirate@piratecompany.com Subject [Subject] [Subject]Landlubbers Message Size [Message Size] [Message Size]#1024# 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 25. EnCase© Forensic v7 Index Syntax Examples Dates (within a date field) Syntax Example Year [Modified]#2010# [Field]#YYYY# Day [Modified]#2010-01-01# [Field]#YYYY-MM-DD# Day, Hour, Minute [Modified]#2010-01-01T012:00# [Field]#YYYY-MM-DDTHH:MM# Day, Hour, Minute, Second [Modified]#2010-01-01T012:00:01# [Field]#YYYY-MM-DDTHH:MM:SS# Date Range [Field]#YYYY-MM-DD…YYYY-MM- [Modified]#2010-01-01...2010-03- DD# 01# [Field]#YYYY…# [Created]#2010…# Date Range (Hour Offset) [Modified](#2010-01-01T12:00:01- [Field](#YYYY-MM-DDTHH:MM:SS- 07:08...2010-03-01#) HH:SS…YYYY-MM-DD#) 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 26. EnCase© Forensic v7 Index Syntax Examples Wildcards Syntax Example single character ? pi?ate multiple character * pirate or nin* Stemming ~ <s:variable x y z> Sail~ <s:sail sail sails sailing sailed> Additional Syntax Example Case Sensitive <c> <c>"Davey Jones" Case Insensitive <-c> <c>"Davey Jones" <-c>pirate Numeric Range #x…y# #123…456# #...y# #...123# #x…# #456…# Grouping x OR (y NOT z) pirate OR (ship NOT ninja) 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 27. EnCase© Forensic v7 Searching Processed Data • Index query – General search • gossip – Field • [Extension]docx – Date Search • [Written]#...2008# 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 28. EnCase© Forensic v7 Searching Processed Data • Index query – Proximity search • ("Formula Three" w/3 Trucking) – Internet • *hulu.com – Modules • “North Korea” 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 29. EnCase© Forensic v7 Additional Enhancements Continue to do what EnCase has historically done best – Broad OS and File system support – Increase support for standard encryption products • File-based, enterprise, and whole disk – Deep analysis of user activity artifacts • Registry, logs, system records, etc. 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 30. EnCase© Forensic v7 Raising the Bar • Focus on the user – Processor to automate indexing and common tasks – Efficient searching for “items of interest” – Automated ability to find “related items” 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 31. EnCase© Forensic v7 Raising the Bar • New indexing engine – Leverages the powerful new indexing engine used in EnCase® eDiscovery – Sophisticated searching across data & metadata – Versatile query syntax to support basic and advanced users 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 32. EnCase© Forensic v7 Raising the Bar • Template driven pre-processing and report generation – Automate repetitive tasks – Facilitate consistent, organizationally-approved best practices 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 33. EnCase© Forensic v7 Training • Perfect Time to Learn or Update Skills – V7 is a shift in the workflow V6 users are accustomed to – All GSI facilities teaching classes in V7 beginning July 2011 – Training Partners have access to V7 materials – The Training Passport is a cost effective way to learn V7 – V6 training still available via OnDemand 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 34. EnCase© Forensic v7 Training • EnCase Essential – Included with all purchases and upgrades – An OnDemand course designed to familiarize a new user with the basic use of V7 – A guide for V6 users to get a feel for the new interface. 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 36. EnCase© Forensic v7 v7 Pricing at a Glance SMS Product License Price (Software, Maintenance, & Support) EnCase® Forensic v7 $2995.00* 1 yr @ 20% license price* 2 yr @ 18% license price* 3 yr @ 16% license price* EnCase® Forensic v6 $896.00* 1 yr SMS: $599.00* (20% retail price) Upgrade to EnCase® Forensic v7 2 yr SMS: $1078.20*(18% retail price x2) 3 yr SMS: $1437.60*(16% retail price x 3) EnCase® Forensic Deluxe No Longer Offered PLSP No Longer Offered EnCase® ProSuite No Longer Offered Individual Modules No Longer Offered EnCase® Neutrino Product has been End of Lifed Customers current on SMS or PLSP received EnCase Forensic v7 at no cost * International pricing may vary, SMS is required on all upgrades and new licenses 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 37. EnCase Portable: Forensic Triage & Data Collection in the Field
  • 38. Business Issues - Problems EnCase© Portable v3 • Corporate IT – One organization, many networks – Remote employees infrequently on the network – Limited resources • Law Firms – Delay between request for collection and data being collected – Rely on outside resources or client self collection – Expensive to use these outside resources and risky to rely on self-collection • Law Enforcement – Vast amounts of data to collect – Limited resources – Trade-offs between casework and collection 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 39. Business Issues – Impacts EnCase© Portable v3 • Corporate IT – Specialists may need travel to remote location to collect data – Employees may be forced to send their machine to corporate – Downtime for both employees • Law Firms – Time to case resolution – Risk – High consulting costs (Airfare, meals, hotels, etc.) • Law Enforcement – Case backlog grows – Longer time to case resolution – Potentially vital data missed 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 40. Business Issue – Solutions EnCase© Portable v3 • Corporate IT – Non-expert collect using trusted & proven technology – No training needed to collect (basic computer skills only) – Allowing employees to retain their machines – Keeping expert resources focused on core competency (analysis) • Law Firms – Immediate data collection & preservation – Reduce cost – Collect with internal personnel with little training required • Law Enforcement – Collect data without requiring forensic expert – Data not altered during search and collection – Option to have immediate access to data 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 41. EnCase Portable EnCase© Portable v3 • Automated forensic triage and collection from a USB device, designed for use when – Immediate access to evidence is required – Field personnel, the users of EnCase Portable, have no forensic training and/or experience – Large number of computers in the field to triage – Ability to review data immediately can provide actionable results 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 42. Core Capabilities EnCase© Portable v3 • Customizable job creation – Use keywords and hash values to perform targeted collections – Memory acquisition – Full disk imaging 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 43. Core Capabilities EnCase© Portable v3 • Multiple operating modes – Live mode – Boot mode • Live triage – Instantly view images on the target machine – Review documents in real-time • Forensically sound – Search and collect while preserving metadata 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 44. Product Overview - Benefits EnCase© Portable v3 • Benefits – Triage suspect computers instantly – Preserve digital evidence in the court-vetted EnCase evidence file format – Triage computers in remote locations without sending forensic experts – Seamlessly integrate collected data into EnCase® Forensic or EnCase® Enterprise for analysis – Create a repeatable and defensible triage and collection process using non-technical personnel 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 45. Triage Case Studies EnCase© Portable v3 • Parolee Home Visit – During visit, triage solution used to review images, internet history on parolee’s computer – Real-time feedback signals probation officer if parolee has violated terms of parole 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 46. Triage Case Studies EnCase© Portable v3 • Border Crossing – Person of interest attempts to enter/leave territory – Agent uses Triage solution to search computer, looking for known terrorist websites, watch list names, etc. – In minutes agent can detect if person should be detained for further questioning 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 47. Triage Case Studies EnCase© Portable v3 • Cyber-bullying at a University – Security Team uses triage solution to search computer for Twitter, Facebook logs for evidence of cyber-bullying – Discovering evidence, action against student is taken 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 48. What’s the Takeaway EnCase© Portable v3 • Effective Triage can – Provide real-time feedback for first responders – Help target activities of on-site investigations – Assist in identifying suspects and victims – Uncover related misdoings – Provide forensic specialists with direction and focus for investigation 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 49. How EnCase Portable Works EnCase© Portable v3 1. Configured device given to field agents 2. Field agents triage target computers 3. Collected evidence sent back to experts for analysis in EnCase 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 50. EnCase Portable EnCase© Portable v3 • With EnCase Portable – Enable first responders to perform triage in a matter of minutes – Review evidence immediately – Utilize proven capabilities of EnCase – Store data in forensically sounds Logical Evidence File or E01 Formats – Fully integrated with EnCase 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 51. Advancing the art of Field Triage and Acquisition
  • 52. Portable v3 – New Capabilities EnCase© Portable v3 • New Portable Management App – Create/Edit Jobs – Device Management – Prepare Storage – Manage Evidence 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 53. Portable v3 – New Capabilities EnCase© Portable v3 • In-Field Job Creation – Right from EnCase Portable – No installation of EnCase required – Jobs can be shared after created 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 54. Portable v3 – New Capabilities EnCase© Portable v3 • New module support – System Info Parser – Windows Artifact Parser – IM Parser – Log Parsers (Windows, Unix, Linux) 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 56. v3 Pricing at a Glance EnCase© Portable v3 Offering License Price SMS Price (Software, Maintenance, and Support) EnCase® Portable - Single $1,175.00* EnCase® Portable 3-Pack $3,299.00* EnCase® Portable 5-Pack $5,245.00* 1 yr @ 20% license price* 2 yr @ 18% license price* EnCase® Portable 10-Pack $9,990.00* 3 yr @ 16% license price* EnCase® Portable 1-year Term $695.00* EnCase® Portable 2-year Term $1,195.00* EnCase® Portable 3-year Term $2,085.00* Customers with current EnCase Portable SMS will receive v3 at no cost * International pricing may vary, SMS is required on all EnCase Portable licenses 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved
  • 57. EnCase© Forensic v7 Learn More EnCase© Portable v3 • EnCase Forensic v7 http://www.guidancesoftware.com/encase-forensic-v7-whats-new.htm • EnCase Portable v3 http://www.guidancesoftware.com/encase-portable.htm • Follow Us – Facebook: facebook.com/guidancesoftware – Twitter: twitter.com/encase – My Twitter: @Steve_at_EnCase – v7 Twitter HashTag: #EF7 • Get the news from Guidance Software http://www.guidancesoftware.com/newsroom.htm 7/26/2011 Guidance Software, Inc. 2011, All Rights Reserved