Atola Insight Forensic

Creating a logical image of a source drive

While physical imaging involves sector-for-sector copying the whole evidence drive from the first LBA to the last one, logical acquisition implies bit-for-bit copying of the file structure. Logical acquisition is handy, when time is limited and you need to quickly start working with the file structure. At the same time, logical image does not include remaining fragments of previously deleted files, which makes this imaging method incomplete. On top of that, hash values of the source and the target will not be identical. Therefore, for profound investigation, it is still preferable to use a physical image. This guide will show how Atola Insight Forensic’s flexible imaging functionality enables users to Read more…

Atola Insight Forensic

Case Management: Finding and Opening a Case

Insight’s Case Management system records every step of data acquisition process saving them into reports grouped by cases. To view the whole list of cases and their devices: Go to Case category in the top menu Click on Search/Open option In the Search and Open Case window you will see the list of all the devices that have ever been connected and identified by your Insight. It is possible to search for cases using multiple criteria and sort the results ascending or descending in any of the columns. Please note that it is possible to store multiple devices under the same case number, allowing you to keep track of all Read more…

Atola Insight Forensic

Q&A during Forensic Europe Expo

Atola team attended the annual Forensic Europe Expo on May 3 – 4 in London. We were pleased to meet both our existing and potential customers, and answer their questions about Atola Insight Forensic. Those of you who were not able to attend this event may have similar questions, so here are the most frequently asked ones at the Expo and our answers to them. We would be happy to answer any further queries you may have, so please don’t hesitate to write a comment below or send us a message here.   Question: Does write protection work for SATA source drives only? Answer: No, write protection works for all source Read more…

Atola Insight Forensic

Verifying Damaged Target Images with Segmented Hashing

Last November Atola Technology team presented a new hashing method called Segmented hashing. Unlike the conventional linear hashing, segmented hashing produces not a single hash, but a list of hashes of corresponding LBA ranges of the image saved into a CSV file in this format: Hash, start LBA, end LBA By validating all hashes in the list, you can prove that the entire image has not been modified. For more information about this hashing method, please follow this link: Segmented Hashing. While this method of hashing has a number of benefits for forensic specialists, among its strongest advantages is its applicability to damaged drives. For one, this non-linear hashing method allows calculating hashes Read more…

Atola Insight Forensic

Extracting and Resetting an Unknown ATA Password

[Update 2022] Atola keeps developing Atola Insight Forensic, forensic data recovery tool that is capable of Seagate password removal via COM port. Insight can recover and/or remove unknown HDD passwords (also known as ATA passwords) and for most hard drives the unlocking process is fully automated. When a device is connected and identified as locked with an ATA password, there is a corresponding PWD indicator displayed in the port, and Security Status in the Home page says Locked, High or Locked, Maximum. High and maximum are password protection levels that the operator who locked the device selected. Although information about it may be relevant to the investigator, both security levels are Read more…

Atola Insight Forensic

Lifting HPA and DCO restrictions

Both HPA (host protected area) and DCO (device configuration overlay) features were created by hard drive manufacturers as hidden areas reserved for storing vendor utilities or simply to make a drive appear to have a certain number of sectors (smaller than the actual drive capacity). But it is many years ago that end users learned to modify and write to these areas of hard drives with the help of open source and freely available tools. For digital forensics specialists, it means that without the ability to identify such hidden areas of a drive and image the full physical image including data in these areas, the evidence they get may be incomplete Read more…

Atola Insight Forensic

Calculating Hash During Imaging

Atola Insight Forensic supports hash calculation of both source and target devices in conjunction with imaging. We have developed highly flexible functionality to help optimize evidence acquisition process to fit one’s internal procedures as well as avoid causing further damage to fragile media. To view the hashing options: Go to Imaging category of the left-side menu and click on Create New Session link Select the target device or file In Preset line click on the Show settings link In the upper part of the Passes and Hash tab there are three checkboxes: Pre-hash source device Hash source during imaging Post-hash target device(s) Multiselect is available, which allows an operator to Read more…

Atola Insight Forensic

Imaging a Source Drive to an E01 File with a Double Hash

In recent years, E01 file format has become the de facto standard format for forensic purposes due to its ability to store not only a physical or logical copy of a source drive, but also case and evidence details. E01 file can also contain both MD5 and SHA-1 hashes. And it is considered a good practice among forensic specialists to calculate both hashes while imaging the evidence so that they are included in the E01 file. To image a source evidence drive to an E01 file you have to add a new target file. Selecting a new E01 file 1. In Imaging category of the left-side menu you can click Read more…

Atola Insight Forensic

Screenshot analysis: Imaging a freezing drive

Recently, we received an email from a long-standing client. The drive he was imaging contained a large number of errors. We would like to use this screenshot of a real-case imaging process to illustrate how well Atola Insight Forensic handles imaging hard drives in such dire state. In the screenshot the numbers show that despite encountering over 1100 errors, Insight has already imaged 605 million sectors out of 1,745 million sectors it has attempted to image in this first pass. The speed may seem low, but Insight is actually able to read it, while most other imagers will likely be unable to even identify such device. Second, in this screenshot we Read more…

Atola Insight Forensic

How to wipe multiple drives simultaneously

Erasing data on destination drives guarantees accuracy of the imaged data and helps verify that the drive has no errors. In the course, all sectors are overwritten with the help of selected pattern or method. When you need to prepare multiple hard drives for imaging, Insight’s multitasking capabilities enable you to do so much faster by launching Erase/Fill on multiple drives simultaneously, including those connected to the source port. To wipe the drive connected to the source port, remember to switch off write protection on the port so that the indicator above the switch is off and there is a notification right below the port bar saying Note: Write protection of Read more…