http://www.youtube.com/watch?v=Ce9eQ0OG2jA
http://hackingexposedcomputerforensicsblog.blogspot.com/2014/02/daily-blog-248-adding-winfe-image-to.html
By accepting you will be accessing a service provided by a third-party external to https://brettshavers.com/
The X-Ways Users Conference is here in a few weeks. My kind of conference: Australia and fellow X-Ways users!
Maybe next year for me...but it sure would make for a good vacation, I mean, training trip.
Not that many years ago, you would not find a requirement of having experience with X-Ways to apply for a DFIR job. But now, some jobs recommend it and yet some others require it. This is not to say the other big players (Encase, Accessdata, etc..) are not needed or useful, just that XWF has made it to the same level at a price point that will probably not be beat with capabilities that still outpace other tools.
So......it makes sense to know a little about the tool that might put you over the edge for that next job. Of course, you need to be competent too, but like I've said before, "beware the examiners that use X-Ways Forensics because they probably know what they are doing."
For the future XWF users, check out www.x-ways.net for some details, download and read a quick guide, and when you move forward with XWF, buy the book :)
Cool. WinFE is mentioned in a Scientific Working Group on Digital Evidence document.
From a twitter post, a cool video on imaging with X-Ways noted (13:50) as doing something other tools don't. The entire video is actually pretty good too.
http://youtu.be/zYYCv21I-1I
http://www.amazon.com
I have a detailed review of this book at http://winfe.wordpress.com. In short, it's a really good book and of all tools to choose for the research in the book, the authors picked X-Ways Forensics. But then, that should not come as any surprise.
There's still time to ask Santa to put this in your stocking...
I've been waiting for this book to come out so I can write something about it. I had the fortune of being able to read it early as I was asked to be the tech editor of the book. It's not my book, but if it were, I'd be mighty proud of it. If you want to skip this review and get to the point, here it is; get this book, it is well worth it! This is another one of those books that you will wish had been written before you tried to figure out how to do it on earlier cases...
[caption id="" align="alignleft" width="209"] http://www.amazon.com
The forensic books of today have gotten so much better, not because older books are not good, but because the information we know now is so much more detailed and specific. The topics of the books are no longer "Computer Forensics" but rather specific topics within forensics. Books focusing solely on registry forensics or windows forensics or X-Box forensics. And now we have cloud forensics. This makes it so much easier to find a reference when needed by grabbing a book on the specific subject instead of flipping through a book to find a specific chapter of a subject.
One of the biggest differences you'll find in this book is the documentation of the methodology followed by the authors. Step-by-step instructions of what they did and their findings. Every chapter follows the same methods, in order and detail. It is laid out so well, that you can replicate their work on any cloud system not covered and know that you did a good job. Another neat thing about this book...the authors used X-Ways Forensics.
As I mentioned, the forensic books of today make it nice to have books dedicated to one topic in detail. That is the good news and the bad news as there are many of these books being published to buy.
I know many people like Kindle versions, but I have this book in print (not Kindle) because I like to treat it the same as all my other reference books. Dog eared, highlighted, sticky-noted, and lots of personal notes written throughout the book.
There are a few behind the scenes work on creating scripts to integrate forensic applications into WinFE. This is substantial work for WinFE users as it reduces your effort to add programs during the build process. Basically, a one button approach to add a forensic application.
But, before you wait for these scripts to be written, remember that you can add many programs without a script or additional work if the program is already portable (meaning, no need to install for it to run). The best example of a full-fledged forensic suite is X-Ways Forensics. Many small forensic applications are also portable and easily copied into a WinFE build. The difference is, X-Ways Forensics is an entire forensic suite, not just one app.
Some forensic apps being worked on now to be put into WinFE may not be full forensic suites, but have a single powerful function that make it worthwhile. I won't break the news yet and will let the vendors have first crack.
On another note, last week, I helped a LE forensics detective set up a review platform with WinFE for other detectives in his department using X-Ways Investigator.
The problem:
--Detectives assigned to cases with electronic evidence, particularly illicit images evidence, wanted to do light review work for their cases.
--Reviewing any type of illicit images on a work machine only leads to that machine getting dirtied up. Also, every detective had 'their own way' of setting up their computers.
--Detectives had no forensic training.
The solution:
--WinFE and X-Ways fixed both problems.
--Department purchased two licenses of X-Ways Investigator.
--A WinFE boot CD was made with X-Ways Investigator copied onto it.
--Detectives now boot their machine to WinFE, run X-Ways Investigator, and access the forensic images from an external drive. All work is saved onto the external drive and their workstation remains clean.
--This also prevented the IT staff from the city panicking over installing 'unauthorized' software
--And of course, a copy of the X-Ways Forensics Practitioner's Guide was ordered for the detectives to use :)
[caption id="attachment_1010" align="aligncenter" width="121"] X-Ways Forensics Practitioner's Guide
Eric is at it again. This time with a pretty cool update to the X-Ways Forensics Install Manager (v0.0.7.0). The update to the XWFIM now includes an option to create a portable install to external media. Page 13 of the Practitioner's Guide to X-Ways Forensics details how to do this manually, but XWFIM does it for you with a few clicks.
Easy enough
Cool! Notepad++ and Volume Label renamed.
Bam! Done.
Another cool little feature is that the XWFIM creates all the case folders for you in the process of the portable install. Neat.
I like this. Saves a few keystrokes and I'm all about saving keystrokes.
Don't forget, if you liked the Practitioner's Guide to X-Ways Forensics, write a review on Amazon to let us know how you liked it (or if you didn't...). And if you use XWF and didn't buy the guide...you are missing out on more than a few tips and tricks that will save you dozens of keystrokes.
Be sure to check out my DFIR Training website for practically the best resources for all things Digital Forensics/Incident Response related.
© 2023 Brett Shavers