Skip to content

EWF Address Space

gleeda edited this page Nov 20, 2014 · 13 revisions

Memory acquired by EnCase or converted using ewfacquire are stored in Expert Witness Format (EWF). Volatility supports the "older" EWF format used by EnCase v6 (and prior versions), but not the newer EWF2-EX01 format used in EnCase v7.

Acquisition

Click on "Add Device" in EnCase and then make sure that "Physical Memory" is checked. Depending on your version of EnCase (EE for example), the folders may differ below.

After hitting "Next" you should see RAM for the requested machine as an option. "Blue-check" it and hit "Next".

Then hit "Finish"

You should see the RAM in your evidence entries window.

To acquire the sample, right-click, click on "Acquire" and follow the acquisition dialog that follows.

Notes

You must have libewf installed for the EWF address space to work correctly. The address space can be found in the contrib/plugins/aspaces folder. You can use the --plugins= parameter in order to use the ewf.py address space without moving it. The --plugins= parameter must come before any other parameters for vol.py. You can see an example below:

$ python vol.py --plugins=contrib/plugins -f WinXPSP3x86.E01 --profile=WinXPSP3x86 pslist
Volatility Foundation Volatility Framework 2.4
Offset(V)  Name                    PID   PPID   Thds     Hnds   Sess  Wow64 Start                Exit    
---------- -------------------- ------ ------ ------ -------- ------ ------ -------------------- --------------------
0x8aeda660 System                    4      0     99     2022 ------      0    
0x89af3da0 smss.exe                912      4      3       19 ------      0 2011-04-08 17:30:59    
0x894c3720 csrss.exe              1036    912     14     1086      0      0 2011-04-08 17:31:05    
0x894ceda0 winlogon.exe           1060    912     22      604      0      0 2011-04-08 17:31:07    
0x86ff4da0 services.exe           1108   1060     16      417      0      0 2011-04-08 17:31:10    
0x8705a770 lsass.exe              1120   1060     23      531      0      0 2011-04-08 17:31:10    
0x86fdbda0 svchost.exe            1368   1108     16      208      0      0 2011-04-08 17:31:12    
[snip] 

Compression

If you have issues with compressed images, you may have to recompile libewf with --enable-v1-api. See https://code.google.com/p/volatility/issues/detail?id=472#c11

Alternative Methods

If you are using the compiled version of Volatility (exe), the address space is not available by default. In this case you can do one of the following:

  • Install libewf and use the address space by supplying the --plugins location as previous described.
  • Mount the memory sample with EnCase and run Volatility over the exposed device (see Sampling RAM Across the Enterprise).
  • Mount the memory sample with FTK Imager as "Physical & Logical" and then use an admin prompt to run Volatility on the exposed device. This method also works for the newer EWF2-EX01 format for EnCase v7.
    • If the "drive" that was mounted is E:\ the proper command would be vol.exe -f "E:\unallocated space" ... etc. An example of this can be seen below:

File Format

File format details can be found in Joachim Metz's EWF documentation.