Difference between pages "Windows Shadow Volumes" and "Sim Filesystem"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(External Links)
 
(Getting Started)
 
Line 1: Line 1:
==Volume Shadow Copy Service==
+
''Under Construction''
Windows has included the Volume Shadow Copy Service in it's releases since Windows XP.  The Shadow Copy Service creates differential backups periodically to create restore points for the user.  Windows 7 Professional and Ultimate editions include tools to work with and manage the Volume Shadow Copy Service, including the ability to [[mount shadow volumes on disk images]].
+
  
== Also see ==
+
The [[SIM Card]] is the basic memory device inside of many mobile phones in use today. This small piece of hardware has been key to solving many cases in the world of [[SIM Card Forensics]]. However, without the proper knowledge of the SIM card's filesystem, the user will be missing out on all the valuable information the [[SIM Card]] holds.
* [[Mount shadow volumes on disk images]]
+
  
== External Links ==
 
* [http://computer-forensics.sans.org/blog/2008/10/10/shadow-forensics/ VISTA and Windows 7 Shadow Volume Forensics], by [[Rob Lee]], October 2008
 
* [http://forensic4cast.com/2010/04/19/into-the-shadows/ Into The Shadows] and [http://www.forensic4cast.com/2010/04/presentation-into-the-shadows/ Presentation], by [[Lee Whitfield]], April 2010
 
* [http://windowsir.blogspot.ch/2011/01/accessing-volume-shadow-copies.html Accessing Volume Shadow Copies], by [[Harlan Carvey]], January 2010
 
* [http://code.google.com/p/libvshadow/downloads/detail?name=Volume%20Shadow%20Snapshot%20%28VSS%29%20format.pdf Volume Shadow Snapshot format], by the [[libvshadow|libvshadow projects]], March 2011
 
* [http://toorcon.techpathways.com/uploads/VolumeShadowCopyWithProDiscover-0511.pdf Volume Shadow Copy with ProDiscover], May 2011
 
* [http://computer-forensics.sans.org/blog/2011/09/16/shadow-timelines-and-other-shadowvolumecopy-digital-forensics-techniques-with-the-sleuthkit-on-windows/ Shadow Timelines And Other VolumeShadowCopy Digital Forensics Techniques with the Sleuthkit on Windows], by [[Rob Lee]], September 2011
 
* [http://justaskweg.com/?p=351 Getting Ready for a Shadow Volume Exam], by [[Jimmy Weg]], June 2012
 
* [http://encase-forensic-blog.guidancesoftware.com/2012/06/examining-volume-shadow-copies-easy-way.html Examining Volume Shadow Copies – The Easy Way!], by [[Simon Key]], June 2012
 
* [http://justaskweg.com/?p=466 Mounting Shadow Volumes], by [[Jimmy Weg]], July 2012
 
* [http://justaskweg.com/?p=518 Examining the Shadow Volumes with X-Ways Forensics], by [[Jimmy Weg]], July 2012
 
  
== Tools ==
+
== Getting Started ==
* [[EnCase]] with VSS Examiner Enscript (available from the downloads section of the GSI Support Portal)
+
* [[libvshadow]]
+
* [[ProDiscover]]
+
* [http://www.shadowexplorer.com/ ShadowExplorer]
+
  
[[Category:Volume Systems]]
+
[[File:What_you_need.jpg|300px|thumb|left|Items you need]]
 +
 
 +
== Definitions ==
 +
 
 +
=== MF ===
 +
 
 +
=== DF ===
 +
 
 +
=== EF ===
 +
 
 +
== Information ==

Revision as of 11:36, 5 April 2011

Under Construction

The SIM Card is the basic memory device inside of many mobile phones in use today. This small piece of hardware has been key to solving many cases in the world of SIM Card Forensics. However, without the proper knowledge of the SIM card's filesystem, the user will be missing out on all the valuable information the SIM Card holds.


Getting Started

Items you need

Definitions

MF

DF

EF

Information