# Basic EnCase

## Creating a Case

![](https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2F-MiQ90-14dPQGWL9j4Dg%2F-MiQ9LNfHQ5EAIYVhwwR%2Fimage.png?alt=media\&token=93fd6c47-70a2-4cf7-ad89-0d27440118b9)

* **Templates**: has an extension of .CaseTemplate and is stored in the Users\Documents\EnCase\Templates folder.
* Case information items with default values
* Bookmark folders and notes
* Tag names
* Report template
* User-defined report styles
* **Base Case Folder**: By default, your cases will be stored in your Documents or My Documents folder.
* **Primary Evidence Cache** : When EnCase loads an evidence item for viewing, it parses and stores metadata associated with that evidence item. Each acquired evidence item is assigned a GUID, and a folder by that GUID name will contain the cached data associated with that evidence item.
* **Secondary Evidence Cache**: This location is for previously created caches
* **Case Info**: several fields into which you can or should enter data pertaining to the case. The fields will vary according to the template you select in Templates

### EnCase Folder Structure

* EnCase creates subfolders called Email, Export, Tags, and Temp.&#x20;
* User need to manually created Evidence and EvidenceCache.

![](https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2F-MiQAGnHvLtBDJLQ_YZ_%2F-MiQANEYUTGjL92eDz1s%2Fimage.png?alt=media\&token=76d9f40c-8cde-47e3-ad89-07a4c2a501d4)

## EnCase View

Placeholder

## Verify Evidence

Evidence tab > drop down menu > Verify File Integrity > File Integrity/ MD5/SHA-1 / CRC Errors

*Note: Add Evidence will automatically verify the new evidence file added to the case, also reopening the case will verify the evidence files which is not verified yet.*

## Timeline view

Tree Pane > Set Included > Timeline view > Higher Resolution or Lower Resolution

Date Types > select which timestamps to be viewed

![Timeline View](https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2Fsync%2F97ee0ea310a8313b9eeaba8c7c43a88b28b3d43f.png?generation=1630396029271099\&alt=media)

## Sort

First sort (either one of the following):

* Open sort menu from Table toolbar
* Double click the header of the column you want to sort

Second sort:

* Hold down the Shirt key > double click the column header

Sort in opposite direction:

* CTRL + double click column header
* CTRL + SHIFT + double click the column header

Remove Sort:

* Remove sort in the Sort menu
* Double click

![](https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2F-MFGExvWL0pAaGpOuGCG%2F-MFGFPs_xlWo_N0WSWEo%2Fimage.png?alt=media\&token=3ec83d28-53a7-4916-95fd-5a86d7505fe4)

## Gallery view

* See images -> Set Include Folders button in the Tree pane, you can direct the content of the Table pane
* EnCase displays images based on the file extension. After the file signature analysis has been completed, the files will display based on their file header information.

## Disk view

* Evidence tab -> Place the cursor on device -> Device -> Disk View
* By default, you see a series of colored square blocks, each representing one sector. If you would prefer that each block represent a cluster, simply click the check box next to View Clusters on the toolbar for this view.&#x20;
* Blue blocks are allocated sectors or clusters.&#x20;
* The gray blocks with the raised bump in the center are unallocated sectors or clusters.&#x20;
* Go to a sector by typing in the sector number -> Go To feature from its menu on the Disk View toolbar

![](https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2F-MFGGRBXwPdvEXjViYrB%2F-MFGGUz1tj0rWBfDxGTv%2Fimage.png?alt=media\&token=3bb0aad7-8ebc-4f80-94d0-08aabf931909)

## File Types view

* Add File Type View > File Types > New
* Add a File Viewer Open With > File Viewers > New File Viewer

![View \&gt; File Types](https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2F-Lbb_39tmcDnLzapDpbU%2F-Lbb_aVLIMuRgqWSz9Nh%2F2019-04-04%2015_01_05-Greenshot.png?alt=media\&token=3bf2d6e2-592f-4928-abe4-1c7c769102ee)

![New File Type](https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2F-Lbb_39tmcDnLzapDpbU%2F-Lbb_kSFym6dapDWOrvq%2F2019-04-04%2015_01_32-Greenshot.png?alt=media\&token=a7e8b5e8-254c-4e92-91f1-f14594996c9b)

## Evidence Processor

![Right Click \&gt; Process](https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2F-Lbb_39tmcDnLzapDpbU%2F-Lbb_vMYDj8r_Du8j9qe%2F2019-04-04%2014_48_55-Greenshot.png?alt=media\&token=dd7ce395-81a1-4058-912f-cabad121bf2d)

![Evidence Processor](https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2F-Lbb607jjbLVXeo4rhcb%2F-Lbb61IZZSX0fnxbCwMK%2Fimage.png?alt=media\&token=08a1aa8a-aa16-4a96-8fd5-edc60949d022)

| Task                                    | Description                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 |
| --------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| Prioritization                          | <p>Prioritisation option</p><p><img src="https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2F-MiQQjYWbRcyMrJHZiga%2F-MiQRgyrNyKgTVhLDDKJ%2Fimage.png?alt=media&#x26;token=9da9c011-501e-4224-9d78-c1b2ca129ce1" alt=""></p>                                                                                                                                                                                                                                                                                             |
| Recover folders                         | <p>Recover files that have been deleted or corrupted on FAT and NTFS volumes</p><p><em>Note: When you turn on the Recover folder structure of NTFS 3.0 files option, recovery will take longer, but will reconstruct (folder tree); if you left that unchecked, all found folders will be grouped together without tree structure.</em></p><p><img src="https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2Fsync%2F020dc250786699be88375cbfbac189a19da39fd4.png?generation=1630398176799986&#x26;alt=media" alt=""></p> |
| File signature analysis                 | Determine if the extension of a file has been altered and whether or not the extension matches the file type as specified by the file’s header                                                                                                                                                                                                                                                                                                                                                                                                                              |
| Protected file analysis                 | Identify encrypted and password-protected files with the Passware Encryption Analyzer                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       |
| Thumbnail creation                      | Creates image thumbnails for faster display in the EnCase® GUI                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              |
| Hash analysis                           | Generate MD5 and/or SHA1 hash values for files and compare against your case Hash Library                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   |
| Expand compound files                   | Expand compound and compressed files, such as ZIP, RAR, GZIP, TAR, THUMBS.DB, CLOOP, and BZIP2                                                                                                                                                                                                                                                                                                                                                                                                                                                                              |
| Find email                              | Extract individual messages from e-mail archive files, such as PST (Microsoft® Outlook), NSF (Lotus® Notes), DBX (Microsoft® Outlook Express), EDB (Microsoft® Exchange), AOL, MBOX, and EMLX (Macintosh).                                                                                                                                                                                                                                                                                                                                                                  |
| Find Internet artifacts                 | Collect Internet-related artifacts, such as browser histories and cached web pages. You also have the option to search unallocated space for the Internet artifacts.                                                                                                                                                                                                                                                                                                                                                                                                        |
| Search for keywords                     | Search raw (not transcript) text for specific keywords.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     |
| Index text and metadata                 | Create an index for when you need to search for keywords in compound files (Microsoft Office 2007 and 2010) and across large amounts of data. You can adjust the parameters for index creation, such as the minimum word length to index and whether to use a noise file (which does not index specific and common words).                                                                                                                                                                                                                                                  |
| System Info Parser                      | <p>Report on the core system information for Linux and Windows, including:</p><ul><li>User activity (Linux only)</li><li>Operating system</li><li>Hardware</li><li>Software</li><li>Accounts/users</li><li>Network information</li><li>Shared/mapped drives</li><li>USB Devices</li><li>Network Shares</li></ul><p>Advanced : Windows Registry</p><ul><li>Time zone setting</li><li>Auto start</li><li>Hardware</li><li>User activity</li><li>User defined keys</li><li>Network Shares</li><li>Other AutoRuns</li></ul>                                                     |
| Windows Artifact Parser                 | <p>Report on Windows artifacts, including</p><ul><li>Link files</li><li>Recycle Bin files</li><li>MFT (NTFS Master File Table) transactions</li></ul><p>Option: All or selected files, and/or unallocated clusters</p>                                                                                                                                                                                                                                                                                                                                                      |
| Snapshot (Live preview of devices only) | Running processes, open ports, logged on users, etc.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        |

## File Signature Analysis

### Create a new file signatures

![View \&gt; File Types](https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2F-MiQJ7R51Fk9asH6QKsz%2F-MiQJJlcMH6sEcSXMW5z%2Fimage.png?alt=media\&token=ab168475-f992-45b6-8d76-9a63f7cd75b5)

![Click New on the File Types table toolbar](https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2F-MiQJ7R51Fk9asH6QKsz%2F-MiQJQMUvIryxc5nQR7Z%2Fimage.png?alt=media\&token=d1857b89-42fa-4153-a9ab-989e67c4497e)

![Change the extensions or Description of the file types](https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2F-MiQJd39noucL_Wgu6SW%2F-MiQJjQjTsWCk3aHvkSD%2Fimage.png?alt=media\&token=a61b1595-2992-45db-a7d7-45301913b348)

### Running File Signature Analysis against Selected Files

* Blue check the specific files you want to run signature analysis on.
* Click Entries. In the dropdown menu, click Hash\Sig Selected. The Hash\Sig Selected dialog displays.
* Select Verify file signatures to run signature analysis.
* Click OK and refresh the device after running

![Entries \&gt; Hash\Sig Selected](https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2F-MiQKYcKFx1VTgAQvXvi%2F-MiQKdF_EA5KnrvLn2Ak%2Fimage.png?alt=media\&token=90045e58-c20c-40c5-926c-ac98b34faee1)

### File Signature Analysis

| extension   | header      | Header in Table | Extension               | Signature           | Signature Analysis |
| ----------- | ----------- | --------------- | ----------------------- | ------------------- | ------------------ |
| picture.jpg | FF D8 FF E0 | Known           | Known and matches       | JPEG Image Standard | Match              |
| picture.dll | FF D8 FF E0 | Known           | Known and incorrect     | JPEG Image Standard | Alias              |
| anyfile.zza | FF D6 FE FF | Unknown         | Unknown                 |                     | Unknown            |
| picture.jpg | D8 D8 FF E0 | Unknown         | Known and doesn't match |                     | Bad Signature      |

* Search for different types of results with filter
* Find Entries by Signature
* The results will be in Result tab

## Hash Analysis

### Creating hash libraries and hash sets

* Before you can create any hash sets from within EnCase, you must first create a hash library container, which is a folder containing a series of file-based, database-like structures into which EnCase will store hash sets.&#x20;

![Create a folder](https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2F-MiQMYSRXrmH9pbAIA3I%2F-MiQMd2iAkUngfvFLU-w%2Fimage.png?alt=media\&token=8f585f20-0caa-4a19-ba4b-f33730988874)

* Tools -> Manage Hash Libraries&#x20;

![Tools \&gt; Manage hash library](https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2F-MiQMYSRXrmH9pbAIA3I%2F-MiQMnFCeTHfs2TBVjTc%2Fimage.png?alt=media\&token=0b28f8eb-919b-4277-b64e-fc5facdd4bab)

* Manage hash libraries -> new hash library&#x20;

![New hash library \&gt; Select the folder (container) you created](https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2F-MiQMYSRXrmH9pbAIA3I%2F-MiQMuSOCDFcRyyd_yc_%2Fimage.png?alt=media\&token=a50d6a60-aed0-4ece-8e74-35d5226e9a08)

* Importing legacy hash sets into EnCase

&#x20;

![Importing legacy EnCase hash sets](https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2F-MiQMYSRXrmH9pbAIA3I%2F-MiQN61qw8Ut4g_FvTdU%2Fimage.png?alt=media\&token=213a5978-58a3-4b07-9184-c14e5b87230b)

### Adding hash values to the hash sets and library

* Query the hash libraries for a MD5 hash
* Manage Hash Library -> Query&#x20;

![Manage Hash Library \&gt; Query](https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2F-MiQNB_oinPk-_UGEPqQ%2F-MiQNHT4LF5Kcodf-tq3%2Fimage.png?alt=media\&token=e868f152-0a6f-4ee6-88aa-7769aad1d12b)

* Add to hash library -> Right Click New Hash Set

&#x20;

![Add to Hash Library \&gt; Right click New Hash Set](https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2F-MiQNB_oinPk-_UGEPqQ%2F-MiQNQvBHU_fMIpxA0Iv%2Fimage.png?alt=media\&token=26ce0711-7f07-4186-9c86-85fd296c2df8)

### Using hash values to identify/exclude files

* Entries -> Hash\Sig Selected
* Find Entries by Hash Category -> Result tab

### Hash Analysis Summary

* Creating a Hash Library
  * Tools > Manage Hash Library
  * New button
  * Browse for a folder -> click OK
* Import hash sets from another library
  * Tools > Manage Hash Library
  * Click Import from the toolbar
* Creating a Hash Set
  * Tools > Manage Hash Library
  * click New Hash Set. The Create Hash Set dialog appears
* Adding Hash Values to a Hash Set
  * Hash the item by right click item Entries -> Hash\Sig Selected
  * Right click Entries -> Add to hash library
  * Choose the hash library to add to
  * Select one existing hash sets or create new hash set by right clicking
  * Select Fields

![Add to hash library](https://3899724814-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbSIGOSblVtuEjzcmhL%2F-MiQQWeOE6CF1mDepziW%2F-MiQQeZMFnFeJeNVndBI%2Fimage.png?alt=media\&token=3d943eda-27bc-425a-b7e0-3117285bb904)

* Adding Hash Values to a Hash Set from Results
