• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

IT & Software Handling BitLocker and FileVault 2: Evimetry and Mount Image Pro | Cybrary (1 Viewer)

Currently reading:
 IT & Software Handling BitLocker and FileVault 2: Evimetry and Mount Image Pro | Cybrary (1 Viewer)

Covers web development, programming, AI, cloud computing, DevOps, and cybersecurity.
Recently searched:

protectaccount

Member
Amateur
LV
3
Joined
Nov 21, 2025
Threads
732
Likes
61
Awards
8
Credits
15,213©
Cash
0$
amPl1fW.png

During the course we will collect a FileVault 2 encrypted MacBook Air in minutes without breaking a sweat using Evimetry. Once we have a series of fully encrypted forensic images will use GetData Mount Image Pro to decrypt our forensic images and make the data available for further forensic analysis.


Prerequisites


Before any forensic acquisition you must document the evidence
See my Cybrary course: “Evidence Handling: Do it the Right Way”
See my Cybrary course: “Basic Evimetry Deadboot Forensic Acquisition: Wired & Local”
A full-featured, evaluation copy of Evimetry
An evaluation copy of Mount Image Pro
Internet connected computer
An encrypted Mac computer
A USB thumbdrive for dead booting
A storage drive (USB3 External)
Course Goals


By the end of this course, students should be able to:


How to identify a BitLocker’d or FileVault’d disk by signature
Acquire a FileVault’d Mac with Evimetry
Use Mount Image Pro to decrypt Windows and Mac encrypted volumes

Link:
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom