Athulin, if you've nothing constructive to say then just don't bother, how rude. Telling someone to hand the job over to someone who does have the knowledge is not going to help anyone learn anything.
Why do you think I was asking, I'm all out of people who know anything. If this is the best you can do though then you are contributing to an ocean of 'clevers' who are trying to out do one another, rather than actually helping anyone else gain knowledge and make a good job of protecting those who need it.
This will be the last time I bother asking for help on here, there are some who genuinely try to help and some like you.
Thanks but no thanks, I'll stick to books in future.
@mctriv
Come on ) , there was clearly no attempt to offend you in any way, you started it with
I have used Nevis (but don't really know what I'm doing) which can see partitions but can't tell me any more
and athulin - jokingly - picked up on that.
As a generic advice - if I may - you'll need some thicker skin to go around on the internet, you may happen to find some challenging remarks or comments (though this is not the case at hand, I am sure).
Let's start from fresh, OK?
1) You have a hard disk.
2) You have no idea what is on it. (it isn't accessible/parsable by normal tools)
3) You "assume" or "presume" that it is encrypted and examine it through a couple of tools dedicated to find "hidden" or "encrypted" areas on a hard disk and you get a couple of "positives", but not as "hidden" or "encrypted" but rather as "traces" or "remnants" of this or that "normal" filesystem or partition scheme
4) and - declaring how you are out of your normal sphere of knowledge/experience - you come here asking for help.
athulin (right after the sentence that upset you) suggested you to try using on the image of the device a tool designed to identify "normal" (not encrypted or hidden) filesystems or partition schemes.
Though I personally would not suggest that specific disktype tool (as I would rather use a plain hex/disk editor and look myself what I can see on the disk/image) the suggestion is correct, it is a way to verify whether the *whatever* Nevis found could be a "false positive".
Tools like those you used - since they are intended to find what more conventional tools miss - are of course prone to "false positives", it is part of the game.
But objectively - from what you report - the disk is filled with identical sectors, with a given pattern.
Though this is not common, it is not "unthinkable of" or in any way "suspicious" in itself, if the same hex string is on all sectors, there is nothing hidden, nothing encrypted, nothing that may be a trace of a previous partitioning or formatting, the disk has been simply filled with a pattern (for *whatever* reason, as an example it could be an experiment to test if the disk was working).
The most it can hide is that pattern/string itself (that may be a form of encrypted message) but it doesn't sound like probable that you have - say - a hash or encrypted password message and you stamp it on all sectors of a disk.
jaclaz