November 14, 2019
Arsenal is unlike other digital forensics software vendors in the sense that we are consultants involved in casework first and software developers second. We build tools when we find valuable information being left behind by existing tools and techniques. In other words, if existing tools and techniques could deliver what we needed from our electronic evidence, we would happily buy or otherwise leverage them rather than launch ourselves into (often frustrating) software development. We are in a good position to know that our tools offer powerful and unique functionality, and we are doing what we can to make maximum exploitation of electronic evidence more accessible to our customers.
I once heard an interview with Todd McFarlane in which he said his company McFarlane Toys was not in competition with major toy manufacturers, but living in the gaps they left behind. For example, a major toy company might have a large number of requirements for their designers such as only applying a certain number of colors or a certain level of detail to a model. He explained that the models created by his company were not constrained by the same requirements, and were targeted at a different kind of consumer… a consumer who wanted more complex and authentic models. This interview left an impression on me, as he was describing what we do at Arsenal. We don’t build a “does everything” suite, we live in the gaps left by other digital forensics vendors and build surgical tools that expose information we could not have otherwise… which has proven incredibly valuable in our casework, and we hope in yours as well.
If you practice digital forensics and are familiar with the powerful and unique things our tools can do, please let others know… you will be helping us with our mission, as we work hard to help you with yours.
So, if you need to access EFS-encrypted files, you do not have the user’s Windows password, and you may even be dealing with an “IT gone rogue” (i.e. you cannot rely on help from IT – e.g. one or more may be suspects!) scenario, what are your options?
In “BitLocker for DFIR – Part I” we provided a quick summary of BitLocker, details regarding the various “states” of BitLocker volumes that we see most often in our casework, and some thoughts on things that are particularly relevant to digital forensics and incident response practitioners. We will now discuss launching virtual machines from BitLockered disk images.
BitLocker is a Full Volume Encryption (FVE) technology introduced by Microsoft in the Ultimate and Enterprise versions of Windows Vista. BitLocker has come a very long way since Vista, becoming quite flexible (some of our colleagues might prefer the word complicated) and secure if used properly.
Join our mailing list to arm yourself with updates about Arsenal tools, training, and research. Our mailing list is double opt-in so you will need to check your email and confirm your subscription before receiving our mailings.
or (617) 277-3625
Terms & Conditions