EnCase Direct Network
Preview
EnCase v7.06 and higher
Direct Network Preview
• Direct Network Preview and Acquisition process was introduced in EnCase
7.06 as an option for powered on computers
• It allows the examiner to view the target computer through the EnCase for
Windows interface and conduct an examination just as if working from an
image.
• Direct Network Preview allows access of data on a target computer system
while it is powered on, including
• the contents of hard drives connected externally or internally,
• removable media,
• electronic memory.
• If there is disk encryption on the target system the mounted volumes may
be imaged without having to obtain the authentication files or
passphrase(s).
Direct Network Preview
EnCase Examiner
Target machines with direct servlet
Preparation of the Examiner’s Computer
• A small command-line program must be run on the target computer to
enable a connection from the examiner’s computer an servlet.
• Servlet contains an authentication key and authenticate access from
the Encase computer system that created the servlet
Steps
• Generation encryption key pairs
• two files public and private keys are generate
• Creating direct servelet with encryption keys
• Deploying servlets
• as service or
• for one go as application
• Accesing remote machine
• Optional removing servlets
Generate Encryption Key – 1 step
• Generate Encryption Key – tools dropdown entry
Generate Encryption Key - 2 step
• Generation of the keypair
Generate Encryption Key – 3 step
• Provide user name and password for keypair
• traditionaly user is Examiner
• Don’t forget username and password
Generate Encryption Key – 4 step
• Save public key
• it is
<username>.PublicKey
Creation of the Direct Servlet
• Creation of the Direct Servlet requires encryption keys
• In communication
• servlet takes public key,
• private key is used by EnCase
• Each OS needs different servlet code
• for some OS there can be more than one servlet file
Creation of the Direct Servlet – step 1
• tools dropdown entry -> Create Direct Servlet
Creation of the Direct Servlet – step 2
• Choose encryption key
• It is essential that public
keyfile is in default position
in filesystem so EnCase can
use it
• Keypair is defined by
username used during key
pair creation,
• username passoword will
decrypt key files
Creation of the Direct Servlet – step 3
• Choose for wich
platform you like to
have servlets
• Choose in which
folder to store
servlets
Creation of the Direct Servlet – step 4
• Pressing on Finish will create servlets
• Windows platform
• „G:casesDirectNWPriviewServlets” folder
Windows servlets
• 32 i 64bit version of servlets
• can be in two forms
• enstart.exe standalone program
• better for running from USB
• setup.msi as instaler
• as a service on target machine
Configure the Target Computer System
• One servlet can be installed on many target machines
• you can talk only with one servlet in one moment
• Start the servlet
• you have to be local administrator
• from usb media - enstart.exe or
• install service setup.exe
• option -h option for help
• record IP adress and chek if servlet is running and accessible
• For conecting from EnCase workstation
• password, IP address, TCP port info is needed
Conneting to servlet – step 1
• Best to open new case for each
direct servlet access
• In case select
• Add Evidence -> Add Network Preview -> Add Direct Network Preview
Choose encryption key - step 2
Connect to the servlet – step 3
• IP address or machine name with TCP port is needed
machine: COMPUTER19,
port: 4445
Choose devices to access on the remote machine
• It is same as other „add device” wizard menu
Do forensics
• It is on live remote machine
• At the end do not forget to stop/remove servlet from target machine

More Related Content

PDF
Usage aspects techniques for enterprise forensics data analytics tools
PDF
Datafoucs 2014 on line digital forensic investigations damir delija 2
PDF
EnCase Enterprise Basic File Collection
PDF
Ocr and EnCase
PDF
LTEC 2013 - EnCase v7.08.01 presentation
PDF
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
PDF
CNIT 152: 1 Real-World Incidents
PDF
CNIT 152: 9 Network Evidence
Usage aspects techniques for enterprise forensics data analytics tools
Datafoucs 2014 on line digital forensic investigations damir delija 2
EnCase Enterprise Basic File Collection
Ocr and EnCase
LTEC 2013 - EnCase v7.08.01 presentation
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
CNIT 152: 1 Real-World Incidents
CNIT 152: 9 Network Evidence

What's hot (20)

PDF
CNIT 121: 11 Analysis Methodology
PDF
CNIT 152: 9 Network Evidence
PDF
CNIT 152 12. Investigating Windows Systems (Part 3)
PDF
CNIT 121: 12 Investigating Windows Systems (Part 3)
PDF
CNIT 152: 10 Enterprise Services
PDF
CNIT 152: 6. Scope & 7. Live Data Collection
PDF
CNIT 121: 9 Network Evidence
PDF
CNIT 152: 1 Real-World Incidents
PDF
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
PDF
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
PDF
CNIT 121: 3 Pre-Incident Preparation
PDF
CNIT 152: 3 Pre-Incident Preparation
PDF
CNIT 121: 13 Investigating Mac OS X Systems
PDF
CNIT 121: 2 IR Management Handbook
PDF
CNIT 152: 12b Windows Registry
PDF
CNIT 152: 4 Starting the Investigation & 5 Leads
PDF
CNIT 121: Computer Forensics Ch 1
PPTX
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
PDF
CNIT 152: 6 Scoping & 7 Live Data Collection
PDF
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 121: 11 Analysis Methodology
CNIT 152: 9 Network Evidence
CNIT 152 12. Investigating Windows Systems (Part 3)
CNIT 121: 12 Investigating Windows Systems (Part 3)
CNIT 152: 10 Enterprise Services
CNIT 152: 6. Scope & 7. Live Data Collection
CNIT 121: 9 Network Evidence
CNIT 152: 1 Real-World Incidents
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
CNIT 121: 3 Pre-Incident Preparation
CNIT 152: 3 Pre-Incident Preparation
CNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 2 IR Management Handbook
CNIT 152: 12b Windows Registry
CNIT 152: 4 Starting the Investigation & 5 Leads
CNIT 121: Computer Forensics Ch 1
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
CNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
Ad

Similar to Ecase direct servlet acess v1 (20)

PPTX
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
PDF
Philly Tech Fest Upgrade To Windows Server 2008 R2
PPTX
Windows 7 For Itpro
PPTX
01 overview-servlets-and-environment-setup
PDF
Hacking intranet websites
PDF
Microsoft Forefront - Unified Access Gateway 2010 Datasheet
PPSX
Bo sa nova enterprise_pres_8
PPTX
PPT
presentation
PDF
Microsoft Windows Nt
PDF
Encase V7 Presented by Guidance Software august 2011
PPTX
Configuring and Implementing DirectAccess with Windows Server 2012
PPT
Windows 7 Seminar - Acend Corporate Learning
PDF
Implementing High Availability Caching with Memcached
DOC
Unit5 servlets
PDF
"Intrusion Techniques (Open Source Tools)" por Ewerson Guimarães por
PPT
Web servers – features, installation and configuration
PPTX
Systems Administration
PPTX
Remote forensics fsec2016 delija draft
PDF
Dssh @ Confidence, Prague 2010
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Philly Tech Fest Upgrade To Windows Server 2008 R2
Windows 7 For Itpro
01 overview-servlets-and-environment-setup
Hacking intranet websites
Microsoft Forefront - Unified Access Gateway 2010 Datasheet
Bo sa nova enterprise_pres_8
presentation
Microsoft Windows Nt
Encase V7 Presented by Guidance Software august 2011
Configuring and Implementing DirectAccess with Windows Server 2012
Windows 7 Seminar - Acend Corporate Learning
Implementing High Availability Caching with Memcached
Unit5 servlets
"Intrusion Techniques (Open Source Tools)" por Ewerson Guimarães por
Web servers – features, installation and configuration
Systems Administration
Remote forensics fsec2016 delija draft
Dssh @ Confidence, Prague 2010
Ad

More from Damir Delija (20)

PDF
6414 preparation and planning of the development of a proficiency test in the...
PDF
6528 opensource intelligence as the new introduction in the graduate cybersec...
PDF
Uvođenje novih sadržaja u nastavu digitalne forenzike i kibernetičke sigurnos...
PPTX
Cis 2016 moč forenzičikih alata 1.1
PPTX
Draft current state of digital forensic and data science
PDF
Why i hate digital forensics - draft
DOCX
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
PPTX
Deep Web and Digital Investigations
PDF
Olaf extension td3 inisg2 2
PDF
Moguće tehnike pristupa forenzckim podacima 09.2013
PPT
Cis 2013 digitalna forenzika osvrt
PPT
Ibm aix wlm idea
PDF
Aix workload manager
PDF
2013 obrada digitalnih dokaza
PDF
Tip zlocina digitalni dokazi
PDF
Sigurnost i upravljanje distribuiranim sustavima
PDF
Improving data confidentiality in personal computer environment using on line...
PDF
Communication network simulation on the unix system trough use of the remote ...
PDF
Mehanizmi razmjene poruka ostvareni preko RPCa
PDF
Tip zlocina digitalni dokazi
6414 preparation and planning of the development of a proficiency test in the...
6528 opensource intelligence as the new introduction in the graduate cybersec...
Uvođenje novih sadržaja u nastavu digitalne forenzike i kibernetičke sigurnos...
Cis 2016 moč forenzičikih alata 1.1
Draft current state of digital forensic and data science
Why i hate digital forensics - draft
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Deep Web and Digital Investigations
Olaf extension td3 inisg2 2
Moguće tehnike pristupa forenzckim podacima 09.2013
Cis 2013 digitalna forenzika osvrt
Ibm aix wlm idea
Aix workload manager
2013 obrada digitalnih dokaza
Tip zlocina digitalni dokazi
Sigurnost i upravljanje distribuiranim sustavima
Improving data confidentiality in personal computer environment using on line...
Communication network simulation on the unix system trough use of the remote ...
Mehanizmi razmjene poruka ostvareni preko RPCa
Tip zlocina digitalni dokazi

Recently uploaded (20)

DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Trump Administration's workforce development strategy
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
Empowerment Technology for Senior High School Guide
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Complications of Minimal Access-Surgery.pdf
PDF
IGGE1 Understanding the Self1234567891011
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
My India Quiz Book_20210205121199924.pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
advance database management system book.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Trump Administration's workforce development strategy
Hazard Identification & Risk Assessment .pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Empowerment Technology for Senior High School Guide
AI-driven educational solutions for real-life interventions in the Philippine...
Share_Module_2_Power_conflict_and_negotiation.pptx
B.Sc. DS Unit 2 Software Engineering.pptx
Environmental Education MCQ BD2EE - Share Source.pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Complications of Minimal Access-Surgery.pdf
IGGE1 Understanding the Self1234567891011
Introduction to pro and eukaryotes and differences.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
My India Quiz Book_20210205121199924.pdf
Weekly quiz Compilation Jan -July 25.pdf
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
advance database management system book.pdf

Ecase direct servlet acess v1

  • 2. Direct Network Preview • Direct Network Preview and Acquisition process was introduced in EnCase 7.06 as an option for powered on computers • It allows the examiner to view the target computer through the EnCase for Windows interface and conduct an examination just as if working from an image. • Direct Network Preview allows access of data on a target computer system while it is powered on, including • the contents of hard drives connected externally or internally, • removable media, • electronic memory. • If there is disk encryption on the target system the mounted volumes may be imaged without having to obtain the authentication files or passphrase(s).
  • 3. Direct Network Preview EnCase Examiner Target machines with direct servlet
  • 4. Preparation of the Examiner’s Computer • A small command-line program must be run on the target computer to enable a connection from the examiner’s computer an servlet. • Servlet contains an authentication key and authenticate access from the Encase computer system that created the servlet
  • 5. Steps • Generation encryption key pairs • two files public and private keys are generate • Creating direct servelet with encryption keys • Deploying servlets • as service or • for one go as application • Accesing remote machine • Optional removing servlets
  • 6. Generate Encryption Key – 1 step • Generate Encryption Key – tools dropdown entry
  • 7. Generate Encryption Key - 2 step • Generation of the keypair
  • 8. Generate Encryption Key – 3 step • Provide user name and password for keypair • traditionaly user is Examiner • Don’t forget username and password
  • 9. Generate Encryption Key – 4 step • Save public key • it is <username>.PublicKey
  • 10. Creation of the Direct Servlet • Creation of the Direct Servlet requires encryption keys • In communication • servlet takes public key, • private key is used by EnCase • Each OS needs different servlet code • for some OS there can be more than one servlet file
  • 11. Creation of the Direct Servlet – step 1 • tools dropdown entry -> Create Direct Servlet
  • 12. Creation of the Direct Servlet – step 2 • Choose encryption key • It is essential that public keyfile is in default position in filesystem so EnCase can use it • Keypair is defined by username used during key pair creation, • username passoword will decrypt key files
  • 13. Creation of the Direct Servlet – step 3 • Choose for wich platform you like to have servlets • Choose in which folder to store servlets
  • 14. Creation of the Direct Servlet – step 4 • Pressing on Finish will create servlets • Windows platform • „G:casesDirectNWPriviewServlets” folder
  • 15. Windows servlets • 32 i 64bit version of servlets • can be in two forms • enstart.exe standalone program • better for running from USB • setup.msi as instaler • as a service on target machine
  • 16. Configure the Target Computer System • One servlet can be installed on many target machines • you can talk only with one servlet in one moment • Start the servlet • you have to be local administrator • from usb media - enstart.exe or • install service setup.exe • option -h option for help • record IP adress and chek if servlet is running and accessible • For conecting from EnCase workstation • password, IP address, TCP port info is needed
  • 17. Conneting to servlet – step 1 • Best to open new case for each direct servlet access • In case select • Add Evidence -> Add Network Preview -> Add Direct Network Preview
  • 19. Connect to the servlet – step 3 • IP address or machine name with TCP port is needed machine: COMPUTER19, port: 4445
  • 20. Choose devices to access on the remote machine • It is same as other „add device” wizard menu
  • 21. Do forensics • It is on live remote machine • At the end do not forget to stop/remove servlet from target machine