Difference between pages "Windows Shadow Volumes" and "Bulk Extractor"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Also see)
 
(Created page with "{{Infobox_Software | name = Bulk Extractor | maintainer = Simson Garfinkel | os = {{Linux}}, {{Windows}}, {{Mac OS X}} | genre = {{Analysis}} | license = {{Public D...")
 
Line 1: Line 1:
==Volume Shadow Copy Service==
+
{{Infobox_Software |
Windows has included the Volume Shadow Copy Service in it's releases since Windows XP. The Shadow Copy Service creates differential backups periodically to create restore points for the user. Windows 7 Professional and Ultimate editions include tools to work with and manage the Volume Shadow Copy Service, including the ability to [[mount shadow volumes on disk images]].
+
  name = Bulk Extractor |
 +
  maintainer = [[Simson Garfinkel]] |
 +
  os = {{Linux}}, {{Windows}}, {{Mac OS X}} |
 +
  genre = {{Analysis}} |
 +
  license = {{Public Domain}} |
 +
  website = [http://afflib.org/software/bulk_extractor/ afflib.org/software/bulk_extractor/] |
 +
}}
  
== Also see ==
+
'''Bulk Extractor''' ('''bulk_extractor''') is a feature extraction tool written in C++ for extracting features from media images.
* How to: [[Mount shadow volumes on disk images]]
+
Extracted features are stored in feature files that can be easily inspected, parsed, or processed with automated tools.
 +
Some Python programs that process feature files are available.
 +
Also, feature files may be browsed using the [[Bulk Extractor Viewer]].
  
 
== External Links ==
 
== External Links ==
* [http://computer-forensics.sans.org/blog/2008/10/10/shadow-forensics/ VISTA and Windows 7 Shadow Volume Forensics], by [[Rob Lee]], October 2008
 
* [http://forensic4cast.com/2010/04/19/into-the-shadows/ Into The Shadows] and [http://www.forensic4cast.com/2010/04/presentation-into-the-shadows/ Presentation], by [[Lee Whitfield]], April 2010
 
* [http://windowsir.blogspot.ch/2011/01/accessing-volume-shadow-copies.html Accessing Volume Shadow Copies], by [[Harlan Carvey]], January 2011
 
* [http://code.google.com/p/libvshadow/downloads/detail?name=Volume%20Shadow%20Snapshot%20%28VSS%29%20format.pdf Volume Shadow Snapshot format], by the [[libvshadow|libvshadow projects]], March 2011
 
* [http://journeyintoir.blogspot.ch/2011/04/little-help-with-volume-shadow-copies.html A Little Help with Volume Shadow Copies], by [[Corey Harrell]], April 2011
 
* [http://toorcon.techpathways.com/uploads/VolumeShadowCopyWithProDiscover-0511.pdf Volume Shadow Copy with ProDiscover], May 2011
 
* [http://computer-forensics.sans.org/blog/2011/09/16/shadow-timelines-and-other-shadowvolumecopy-digital-forensics-techniques-with-the-sleuthkit-on-windows/ Shadow Timelines And Other VolumeShadowCopy Digital Forensics Techniques with the Sleuthkit on Windows], by [[Rob Lee]], September 2011
 
* [http://windowsir.blogspot.ch/2011/09/howto-mount-and-access-vscs.html HowTo: Mount and Access VSCs], by [[Harlan Carvey]], September 2011
 
* [http://encase-forensic-blog.guidancesoftware.com/2012/06/examining-volume-shadow-copies-easy-way.html Examining Volume Shadow Copies – The Easy Way!], by [[Simon Key]], June 2012
 
* [http://justaskweg.com/?p=351 Getting Ready for a Shadow Volume Exam], by [[Jimmy Weg]], June 2012
 
* [http://justaskweg.com/?p=466 Mounting Shadow Volumes], by [[Jimmy Weg]], July 2012
 
* [http://justaskweg.com/?p=518 Examining the Shadow Volumes with X-Ways Forensics], by [[Jimmy Weg]], July 2012
 
* [http://justaskweg.com/?p=710 “Weg, I’m afraid that I don’t have VMware. How do I Examime Shadow Volumes?”], by [[Jimmy Weg]], August 2012
 
  
== Tools ==
+
* [http://afflib.org/software/bulk_extractor Official website]
* [[EnCase]] with VSS Examiner Enscript (available from the downloads section of the GSI Support Portal)
+
* [[libvshadow]]
+
* [[ProDiscover]]
+
* [http://www.shadowexplorer.com/ ShadowExplorer]
+
* [http://dfstream.blogspot.ch/p/vsc-toolset.html VSC Toolset]
+
* [[X-Ways AG|X-Ways Forensics]]
+
 
+
[[Category:Volume Systems]]
+

Revision as of 19:11, 1 December 2011

Bulk Extractor
Maintainer: Simson Garfinkel
OS: Linux,Windows,Mac OS X
Genre: Analysis
License: Public Domain
Website: afflib.org/software/bulk_extractor/

Bulk Extractor (bulk_extractor) is a feature extraction tool written in C++ for extracting features from media images. Extracted features are stored in feature files that can be easily inspected, parsed, or processed with automated tools. Some Python programs that process feature files are available. Also, feature files may be browsed using the Bulk Extractor Viewer.

External Links