Does EnCase have an...
 
Notifications
Clear all

Does EnCase have any weak spots ?

14 Posts
10 Users
0 Likes
646 Views
(@circo)
Posts: 1
New Member
Topic starter
 

All software has its Achilles heel, right ? Some employers/spy ware merchants are using the profile of Encase to effectively put the fear of god into their employees; this I believe is on the basis that fear works better than investigation – thus rendering all employees as potentially guilty of something as yet undefined - but it has led many of us to wonder; just how bullet-proof is Encase ?

I would be very keen to hear from anyone who has a working knowledge of this product and to learn of any known weaknesses that versions 4 or 5 are know to be prone to.

Any info sent to chas_clifton@yahoo.co.uk would be gratefully received and will of course be treated in strictest confidence.

Many thanks.

 
Posted : 14/11/2005 8:08 pm
keydet89
(@keydet89)
Posts: 3568
Famed Member
 

Some employers/spy ware merchants are using the profile of Encase to effectively put the fear of god into their employees;

Can you give an example of what you mean by this?

Keep in mind…EnCase is a tool, and like any tool, is only as good/effective as the person using it. The Barrett .50-cal sniper rifle is an awesome and powerful tool, but can easily be reduced to a paperweight in the hands of someone with no idea how to use it. Likewise, EnCase has a lot of nice features, and some cool buttons to click on, but if the analyst doesn't know what's going on under the hood, or what the information means, then it ends up being a very expensive waste of time.

Harlan

 
Posted : 14/11/2005 8:32 pm
 dirk
(@dirk)
Posts: 25
Eminent Member
 

Its support for handling data embedded inside arbitrary formats isn't so good. It's one thing to be able to find a deleted NSF file from a hard drive, but another thing entirely to be able to decipher email communciations from inside that file.

 
Posted : 21/11/2005 5:57 am
(@phius)
Posts: 25
Eminent Member
 

Dirk… surely that applies to all forensic tools though, not just EnCase? Merely highlight the fact that there is no one stop solution & sometime we need to use Brain Ver. 1.0 also…

 
Posted : 21/11/2005 6:56 am
keydet89
(@keydet89)
Posts: 3568
Famed Member
 

Paul,

You're absolutely correct in that. Different tools have different strengths and weaknesses. Some tools are really good at parsing formats (FTK comes to mind), others aren't so good. However, that should not be a limiting factor. If you're doing push-button, Nintendo forensics, then it would be pretty clear that the common weak point in all tools is the analyst using the tool…

Harlan

 
Posted : 21/11/2005 4:18 pm
skip
 skip
(@skip)
Posts: 57
Trusted Member
 

Are you asking, "how does someone beat encase?"

I think these folks hit it on the head…you beat the person using the tool, not the tool.

So, in short, the answer is who cares if the tool has an Achilles heel. An examiner will follow a sound, standard, defendable, precedented, process. He/she will use multiple tools and document everything that happens.

Interesting topic,
Skip

 
Posted : 21/11/2005 6:58 pm
(@jonathan)
Posts: 878
Prominent Member
 

What angle are you coming from?

Just interested?
You're assessing various products before purchase?
You/ your client is faced with EnCase produced evidence?
You're the developer of a competing product?

 
Posted : 21/11/2005 7:03 pm
keydet89
(@keydet89)
Posts: 3568
Famed Member
 

> Your assessing various products before purchase?

If that's the case, it definitely sounds as if the wrong questions are being asked.

Harlan

 
Posted : 21/11/2005 7:16 pm
(@fatrabbit)
Posts: 132
Estimable Member
 

I think the motive or angle is merely to arm themselves with information to discredit the tool in the face of its advocates and operators. Of course I could be wrong and it could be a serious research orientated question.

 
Posted : 21/11/2005 7:46 pm
keydet89
(@keydet89)
Posts: 3568
Famed Member
 

> …it could be a serious research orientated question.

It may have already been taken on as research…

http//dftt.sourceforge.net/

The purpose of the DFTT site (and the associated CFTT site at NIST) is to provide standard images for testing forensic tools, such as EnCase, etc.

I know a while back, ILook v.7.0 had an issue with not being able to recognize directory entries with names that were in Unicode. However, ILook was certified for use by the federal gov't.

Again, I don't think that the point is really inherent weaknesses in tools…nor should it be.

Harlan

 
Posted : 21/11/2005 8:06 pm
Page 1 / 2
Share: