Jump to content

EnCase

From Wikipedia, the free encyclopedia
EnCase
Developer(s)Guidance Software, OpenTextk
Initial release1998
Stable release
21.1 CE / March 11, 2021; 3 years ago (2021-03-11)[1]
Operating systemWindows
Available inEnglish
TypeComputer forensics
Websitewww.opentext.com/products/encase-forensic

EnCase is the shared technology within a suite of digital investigations products by Guidance Software (acquired by OpenText in 2017[2]). The software comes in several products designed for forensic, cyber security, security analytics, and e-discovery use. EnCase is traditionally used in forensics to recover evidence from seized hard drives. It allows the investigator to conduct in-depth analysis of user files to collect evidence such as documents, pictures, internet history and Windows Registry information.

The company also offers EnCase training and certification.

Data recovered by EnCase has been used in various court systems, such as in the cases of the BTK Killer and the murder of Danielle van Dam.[3][4] Additional EnCase forensic work was documented in other cases such as the evidence provided for the Casey Anthony, Unabomber, and Mucko (Wakefield Massacre) cases.

Company and Product Overview

[edit]

Guidance Software, and the Encase forensic tool, was originally created by Shawn H. McCreight.[5]

In 2002 EnCase Enterprise was released allowing the first network enabled digital forensic tool to be used in forensic, investigative, and security matters.

In 2005 EnCase eDiscovery was released which further enabled the network abilities of EnCase to allow Identification, Collection, Preservation, and Analysis of ESI for Litigation and Investigative purposes.

In 2007 EnCase AIRS (Automated Incident Response Suite) was released (now discontinued and evolved to EnCase Endpoint Security) to automate the scanning, documenting, and remediation abilities of EnCase Enterprise. In 2007, EnCase Information Assurance, EnCase Data Audit and Policy Enforcement (both also effectively integrated into EnCase Endpoint Security) were also released.

In 2008 EnCase Cybersecurity was released which combined many of the tools and automation from previous security functions and streamlined the workflow of incident response.

In 2015 EnCase Endpoint Security was released which was the evolution of Endpoint Security into a more user-friendly web interface as well as further integration with many other security tools to further expedite and shorten the response time from an attack or event.

In 2016 EnCase Enterprise needed a face lift and the distributed agent (formerly referred to as servlet) was given more abilities with the redesign into EnCase Endpoint Investigator. Also in 2016 the release of EnCase Risk Manager for data risk assessment, audit, DLP-like services, and compliance.

In 2017 Guidance Software was acquired by OpenText, and the company name "Guidance Software" is no longer used.

EnCase Product Line

[edit]

EnCase technology is available within a number of products, currently including: EnCase Forensic, EnCase Endpoint Investigator, EnCase eDiscovery (which includes EnCase Legal Hold), EnCase Endpoint Security and EnCase Portable.[6] Guidance Software also runs training courses from Foundations in Computer Forensics, to several expert series courses to include an EnScripting course to automate various functions within EnCase. Further, certification is offered to train toward and prove knowledge within various fields to include EnCE (EnCase Certified Examiner), EnCEP (EnCase Certified eDiscovery Practitioner), CFSR (Certified Forensic Security Responder). The EnCase training team have trained over 100000 individuals to date.[7]

Features

[edit]

EnCase contains tools for several areas of the digital forensic process; acquisition, analysis and reporting. The software also includes a scripting facility called EnScript with various API's for interacting with evidence.

Expert Witness File Format

[edit]

EnCase contains functionality to create forensic images of suspect media. Images are stored in proprietary Expert Witness File format; the compressible file format is prefixed with case data information and consists of a bit-by-bit (i.e. exact) copy of the media inter-spaced with CRC hashes for every 64 sectors of data (by default).[8] The file format also appends an MD5 hash of the entire drive as a footer.[9] The E01 file format was reversed engineered and specifications can be found here.

Mobile forensics

[edit]

As of EnCase V7, Mobile Phone Analysis is possible with the addition some add-ons available from Guidance Software.[10]

References

[edit]
  1. ^ "Announcing OpenText Security and Protection Cloud CE 21.1 - OpenText Blogs". blogs.opentext.com. 11 March 2021. Archived from the original on 2021-03-11. Retrieved 2021-04-04.
  2. ^ "News and Press Releases (PR)". OpenText. 2017-09-14. Archived from the original on 2018-09-03. Retrieved 2021-10-31.
  3. ^ Taub, Eric A. (2006-04-05). "Deleting may be easy, but your hard drive still tells all". New York Times. Archived from the original on 2024-06-19. Retrieved 2009-01-11.
  4. ^ Dillon, Jeff, and Steve Perez. "Prosecutor hammers away at computer forensic expert; Dad's patron describes Brenda's propositions," Archived 2014-07-14 at the Wayback Machine San Diego Union-Tribune, July 3, 2002.
  5. ^ "Pasadena-Based Guidance Software Founder Writes to Stockholders to Help Improve Company – Pasadena Now". www.pasadenanow.com. Archived from the original on 2023-09-05. Retrieved 2023-09-05.
  6. ^ "Guidance Software". Archived from the original on December 26, 1996. Retrieved October 11, 2012.
  7. ^ "Sprintzeal". Archived from the original on July 4, 2016. Retrieved June 18, 2024.
  8. ^ Bunting, Steve (2012). EnCase computer forensics: the official EnCE: EnCase certified examiner; study guide (3rd ed.). Indianapolis, Ind: Wiley. ISBN 978-1-118-05898-5.
  9. ^ Martin S. Olivier, Sujeet Shenoi, ed. (2006). Advances in digital forensics II. Springer. ISBN 0-387-36890-6. Retrieved 31 August 2010.
  10. ^ GuidanceSoftware. "EnCase Forensic V7". GuidanceSoftware. Archived from the original on 12 February 2012. Retrieved 13 April 2012.

Further reading

[edit]