PALADIN Quick Start Guide - 7.00
PALADIN Quick Start Guide - 7.00
SUMURI.COM
MAC FORENSICS IN MINUTES!
AUTOMATED AND FAST! DO COMPLETE EXAMS IN MINUTES!
SUMURI.COM
automatically create Advanced Artifact
Timelines, instantly recover Keychain
passwords and run on a live Mac!
SUMURI.COM
INSTANTLY VIRTUALIZE WINDOWS
THE ONLY TOOL ABLE TO VIRTUALIZE WITHOUT IMAGING OR DISASSEMBLY!
SNAPSHOT COMPARISON
LEARN WHAT WAS CHANGED OR MODIFIED - GREAT FOR MALWARE ANALYSIS!
SUMURI.COM
• Instantly Virtualize Thousands of Windows Devices - No Imaging and No Disassembly
• Largest Support for Virtualizing Forensic Images and VM Images
• Automatically Bypass Windows Logon Passwords and Hardware Conflicts
• Document your Investigation with Built-in Video or Screenshots
• Snapshot Comparison - Discover what changed between snapshots
• Create 1000+ Customized Reports in PDF, HTML, CSV and XML
• Software Write-Blocker and Imager Included
• Includes Samsung T3 250 GB USB 3.1 External Drive
Available as Add-On
• RECON for Windows - Automatic Windows Forensics
• Advanced Artifact Timeline Analysis
• Customizable Advanced File Searches - Keywords, Signatures and Names
• Customizable Advanced Data Carving
SEXY
AND WE
KNOW IT
TALINO
KA - l
+1 302.570.0015
SUMURI.COM
PALADIN
Quick Start Guide
Version 7.00
sumuri.com
Dedication and Credits
CREDITS
PALADIN and its features could not have reached its full potential without the assistance of those who
contribute to the Open Source and Digital Forensic communities. It is through their efforts that we are
able to provide PALADIN.
However, it is through the tireless work of Manoj Kumar and the rest of the ForensoDigital team that we
have to thank for bringing all of the elements together symbiotically to create PALADIN. For his efforts
and the efforts of his team I can not thank them enough. Their work has helped the rest of us fight
terrorism, bring criminals to justice and protect children from sexual exploitation all over the world on
countless occasions.
My sincerest thank you to Manoj and the forensic community who continue to make PALADIN
possible.
Steve Whalen
SUMURI LLC - CEO
All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including
photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the publisher, except in the
case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law. For permission
requests, write to the publisher, addressed “Attention: Permissions Coordinator,” at the address below.
SUMURI LLC
P.O. Box 252
Wyoming, Delaware 19934
USA
www.sumuri.com
i
Quick Start Guide
sumuri.com
What is PALADIN?
PALADIN is available as an ISO which can The “engine” that runs the PALADIN
be used to make a bootable DVD or USB. Toolbox is a combination of applications
that have been used by forensic examiners
Once booted, the user will find a host of and investigators for years and have
precompiled open-source forensic tools withstood scrutiny of many courts of law.
that can be used to perform various tasks.
sumuri.com 3
New Features of PALADIN
PALADIN has been described as a forensic examiner’s “Swiss Army Knife”. It contains
basic features required by any examiner and advanced features that are still not found in
other expensive commercial forensic tools.
In addition to updating to a newer version of Ubuntu, PALADIN has also been ported to
64-bit architecture which allows for faster processing and support for newer hardware.
Finally, we have also added and updated our collection of open source forensic
applications found within our Forensic Tools directory.
4
sumuri.com
Features at a Glance
Boots most PCs and Intel Macs into a forensically sound environment.
Supports the most popular forensic image formats - .E01, Ex01, RAW (.dd), SMART, AFF ,VHD and
VMDK.
Ability to convert from one forensic image to another including the VMDK format.
Ability to create a master and an archive image or two different image formats at the same time.
Disk Manager allows you to easily visualize and identify attached drives and their partitions.
Ability to capture and image the Unallocated Space and Free Space to a file for carving.
Built-in Triage which can search by file name, keywords or MIME types (file signatures).
Over 100+ pre-compiled open source forensic tools and applications in our Forensic Tool Chest.
Autopsy Digital Forensics Platform from Basis Technology and Brian Carrier!
Ability to customize PALADIN and the Remote Services feature for your agency!
PALADIN
5
About SUMURI
SUMURI is a leading provider of software, hardware, training and services relating to
digital evidence, computer forensics and eDiscovery worldwide.
SUMURI LLC was founded in 2010 by Steve Whalen and our company is based and
located in the State of Delaware in the United States of America.
Steve's experience in computer forensics dates back to 1997. Steve has developed and
delivered forensic training to thousands of investigators and examiners around the world
individually and through organizations such as the International Association of Computer
Investigative Specialists (IACIS), the High Technology Crimes International Association
(HTCIA) and the US Department of State Anti-Terrorism Assistance Program. Steve is also
the developer of the successful Macintosh Forensic Survival Course (MFSC), PALADIN
(previously Raptor), RECON and CARBON forensic software and co-developer of TALINO
Forensic Workstations. Steve has provided training throughout North America, Central
America, Asia, Europe, Middle East, Caribbean, Africa and Oceania.
Previously, Steve served over 15 years as a Delaware State Trooper. During that time, he
worked as a detective with the Criminal Investigations Unit and served as their first full-
time forensic examiner for digital evidence. Building off that experience, Steve helped the
Delaware State Police develop its first High Technology Crimes Unit in 2001, where he
processed thousands of electronic items and devices containing digital evidence from
hundreds of cases relating to intrusion, financial crimes, child sexual exploitation,
narcotics, stalking and homicides.
SUMURI was founded on the same principals which was instilled in our founder
while a State Trooper - Honor, Integrity, Courage, Loyalty, Attitude, Discipline and
Service.
All of the SUMURI team are held to these standards in every aspect of our work. We treat
our clients as we would treat our family. We listen to your needs and offer innovative
customized solutions.
6
Our team consists of some of the leading experts in the fields of digital evidence,
computer forensics and eDiscovery. Our team are all active practitioners from the law
enforcement and corporate communities.
Our team has taught thousands of forensic examiners and investigators from Fortune 500
companies, local and federal law enforcement agencies and world governments.
SUMURI’s newest Remote Services allows us to provide your agency with the
expertise of a SUMURI team member without the expense of travel.
We look forward to assisting you and hope that you enjoy PALADIN!
7
Differences Between Versions (PALADIN vs. EDGE)
There are two versions of PALADIN:
PALADIN (starting with Version 6) is 64-Bit Architecture and is based on the most
current LTS (Long Term Support) version of Ubuntu. LTS allows for a more stable
distribution. In addition to the PALADIN Toolbox this version of PALADIN includes pre-
compiled Open Source forensic tools and applications.
PALADIN EDGE (starting with Version 6) is 32-Bit Architecture which supports more
legacy systems and some newer computers. PALADIN EDGE includes the PALADIN
Toolbox but does not include any additional pre-compiled Open Source forensic tools and
applications. Many PALADIN users only use the PALADIN Toolbox. By removing the extra
pre-compiled tools this distribution is smaller in size and boots faster.
Both PALADIN and PALADIN EDGE have three modes which can be selected from the
splash screen:
8
Differences Between Versions (PALADIN vs. EDGE)
Remote Services Mode - forensically sound with networking enabled. Booting to
Remote Services Mode does not mount internal drives, attached media and/or swap
files. Once booted mounting of devices is controlled by the PALADIN Toolbox. The user
can utilize the PALADIN Toolbox and any pre-compiled forensic tool to complete tasks or
you may engage the SUMURI Team for assistance.
9
PALADIN DVD vs. USB
PALADIN is available as an ISO format image. This image can be used to create either a
DVD optical disc or as a USB:
Most computers support booting from an Optical Disc and optical discs are inexpensive to
duplicate. However, many modern computers do not contain and optical disc drive and
boot times are slower.
With a PALADIN USB you will have faster boot and access times. However, some older
computers do not support booting to USB.
10
How Can I Get PALADIN?
The PALADIN ISO (used to create the PALADIN DVD or USB) is provided as a courtesy to
the forensic community by SUMURI.
Branded and pre-compiled PALADIN DVDs can be obtained from SUMURI at:
• Conferences
• Speaking engagements with SUMURI Team Members
• On-Site Trainings provided by SUMURI
• Upon request (cost of shipping or materials may apply)
We love to hear from our friends and colleagues so please stop by and see us and any of
the events we attend.
If you need PALADIN immediately you may download it from the SUMURI website
(www.sumuri.com).
PALADIN is available as donationware. If you find value using PALADIN we ask that
you donate in order to keep the PALADIN project alive and well. We truly appreciate
any donation!
11
How Can I Download the PALADIN ISO?
1. Navigate to www.sumuri.com.
2. Sign into your account via the “My Account” menu. If you do not currently have an
account you will need to register for a free account.
3. Navigate to the PALADIN page via the “Products” menu.
4. Select the version of PALADIN that you would like to download.
5. Name your price then select “Add to Cart”.
6. Review your “Cart” then select “Proceed to Checkout”.
7. Provide the requested information and select “Place Order”.
Even if the amount entered is zero you must use this process to obtain any of the
PALADIN ISOs.
Anonymous or false information may be discarded and could prevent you from
downloading PALADIN.
12
PALADIN PRO USBs
The PALADIN PRO USBs are a dual-boot USB containing the most current versions of
PALADIN.
PALADIN PRO USBs can be ordered from the SUMURI website (www.sumuri.com) for
$74.95 USD.
13
PALADIN PRO “Credit-card style” USB Wristband available for $74.95 USD as
sumuri.com
14
MAKING YOUR OWN PALADIN USB
Once you have downloaded the PALADIN ISO from the SUMURI website you can use the
ISO to make your own PALADIN USBs.
The most common tools used to make a PALADIN USB from the ISO are:
Unetbootin - https://unetbootin.github.io
Rufus - https://rufus.akeo.ie
https://sumuri.com/category/blog/
15
Troubleshooting PALADIN
The PALADIN Community Support Forum is a venue to allow PALADIN users to post
questions and receive help from other PALADIN users. Additionally, we encourage the
posting of tips and tricks to assist other users. This forum is supported by PALADIN
users and is available for free. The forum is located at: https://sumuri.com/support/
forum/
PALADIN is based on Ubuntu Linux and it supports anything that Ubuntu supports.
Please refer to the Ubuntu Support pages if you encounter any issues with hardware.
Answers to most hardware issues can be found on within the Ubuntu Support site. The
Ubuntu support sites can be found at: http://www.ubuntu.com/support/
We understand that there are times where users need immediate assistance with PALADIN
and do not have time to wait for an answer from the Community Support Forums.
SUMURI offers Single Support Sessions starting at $39 USD. These sessions can be
used for advanced troubleshooting, mini-lessons or even remote assistance from a
SUMURI Team Member. A Support Session certificate can be purchased from the
SUMURI website at: https://sumuri.com/product/support-session/
16
Booting PALADIN DVD/USB on a PC
In order to safely boot PALADIN on standard PCs (non-Macs) please make sure that you
are comfortable with the following:
Secure Boot is a security standard found in modern computers that only allows software
trusted by the PC manufacturer to boot the computer. If Secure Boot is enabled on a PC
it will most likely need to be disabled to boot PALADIN which is based on Linux.
To disable Secure Boot you will need to enter the BIOS/UEFI Setup Utility. This is done by
powering on the PC and pressing a “catch” key. This “catch” key can be different for
every PC. The “catch” key is usually displayed for a couple of seconds after pressing the
power key to turn on the PC. Common examples of BIOS/UEFI Setup Utility “catch” keys
are: ESC, F1 or F2 keys.
Once you have safely entered the BIOS/UEFI Setup Utility you will need to find the
“Security” menu where you can disable the Secure Boot option and save the changes.
Once the Secure Boot option is disabled and the changes are saved you can then power
off the computer, restart and boot with PALADIN.
17
Setting Boot Options within the BIOS/UEFI (Opiton-1)
Follow the instructions above to enter the BIOS/UEFI Setup Utility. This time look for the
“Boot” menu. Change the order in the Boot Menu to make sure that the PALADIN DVD or
USB are first before any other boot source.
Many PCs have a “catch” key to display a Boot Manager where the boot device can be
selected without entering the BIOS/UEFI Setup Utility. Common examples of Boot
Manager “catch” keys for some PCs are: F10 or F12.
Once the Boot Manager is displayed choose the device where the PALADIN DVD or USB
is inserted.
18
Booting PALADIN DVD/USB on a Macintosh
In order to safely boot PALADIN on Intel Macs (non-Power PCs) please make sure that you
are comfortable with the following:
Similar to the Secure Boot option on PCs, Macs can have a Firmware Password (boot
level password) set. If the Firmware Password has been set by the user none of the
Startup Commands (key combinations held down on boot) will work other than the Option/
ALT key. Instead, the computer will boot to the Login Window if a Firmware Password is
set. Prior to attempting to boot PALADIN from a USB or DVD the examiner should first
hold down the Option/ALT key to check for an image of a lock.
If the Firmware Password is not set then any bootable options will be displayed including
PALADIN.
Once you have determined that no Firmware Password has been set, the examiner can
start the Mac holding down the Option/ALT key. Any boot options will be displayed. The
PALADIN USB or DVD may be identified by the Mac as a “Windows” or “EFI” DVD or USB
icon. Selecting this icon will boot the Mac to PALADIN.
19
Booting PALADIN DVD/USB on a Macintosh
20
PALADIN Desktop - Overview
PALADIN is based on Ubuntu Linux. Many of the applications and features included with
Ubuntu still remain. PALADIN is a complete operating system and the desktop and
navigation is similar to other operating systems. In this section we will be highlighting the
following:
• Start Menu
• PALADIN Toolbox
• SUMURI Remote Services
• Forensic Tools Directory
• Terminal
Start Menu
21
PALADIN Desktop - Dock
TOOLBOX GUIDE REMOTE FORENSIC AUTOPSY WEB TERMINAL SCREEN LIBRE MOUNTED
SERVICES TOOLS BROWSER CAPTURE OFFICE MEDIA
PALADIN Toolbox
The PALADIN Toolbox is the heart of PALADIN. We have worked hard to create a tool and
interface to handle a majority of basic and advanced forensic tasks and organized them
into a simple to use GUI. The PALADIN Toolbox can be accessed by double-clicking it’s
icon found on the Dock.
SUMURI now offers Remote Services with all PALADIN distributions. If activated, the
SUMURI team will be able to assist you with your forensic tasks or troubleshoot a
problem. SUMURI Remote Services can be started by enabling networking and clicking
the icon found in the Dock.
The Forensic Tools Directory contains more than 100 pre-compiled applications which
have been found useful in forensic examinations and investigations. These tools have
been organized by categories that cover a wide range of forensic topics for Windows,
Mac, Mobile forensics and more.
22
PALADIN Toolbox
The PALADIN project was conceived by Steve Whalen in 2006 out of the need to have an
easy-to-use low or no-cost solution for imaging and previewing computers. This was
released as “Raptor” in 2007. “Raptor” was abandoned in 2010 by Whalen when SUMURI
was founded and PALADIN was released. Since 2010, the PALADIN Toolbox has been
completely re-written to account for changes to technology and continues to be updated.
The PALADIN Toolbox has combined and simplified multiple forensic tasks into one easy
to use GUI (graphical user interface) that requires minimal training and does not require
user to utilize the command line. As the SUMURI tagline states, “Forensics Simplified”.
We are frequently questioned about the validity of the PALADIN Toolbox. As with any tool
that you choose to use the validation and testing is your responsibility. Every tool, whether
it is ours or someone else’s, should be tested by the examiner prior to using. We can say
that the “engine” that runs the PALADIN Toolbox is a combination of applications that
have been used by forensic examiners and investigators for years and have withstood
scrutiny within many courts of law. Versions of PALADIN have also been tested by the
National Institute of Standards and Technology (NIST).
23
PALADIN Toolbox - Toolbox
In this section we will be covering the following:
24
PALADIN Toolbox - Date and Time Settings
When the PALADIN Toolbox is first started a warning message appears.
This message is to remind the examiner that any times recorded in PALADIN logs will be
based off of the system (computer) date, time and time zone. If the system date, time and
time zones are wrong on the computer then the log dates and times will also be incorrect.
It is important to always check the system time with a known time (e.g. atomic wristwatch)
and document both the system time and the actual time in your notes.
The default Time Zone in PALADIN is GMT. To change the time zone click on the Time and
Date icon found at the bottom of the desktop to access its settings.
Note: It may take a minute or two for the displayed system clock to update.
25
PALADIN Toolbox - Logging
There are two main types of logs in PALADIN:
• Task Logs
• System Logs
• Module Specific Logs
All the logs are found in tabs at the bottom of the PALADIN Toolbox window.
Task Logs keep a historical record of the “tasks” that have been executed within a single
PALADIN Toolbox session.
Module Specific Logs show information relating to the current module being used and
typically shows live information. For example, in the image below you are seeing Module
Specific Logs for the Imager Module (“Imager 1” and “Imager 2”).
26
PALADIN Toolbox - Logging
Logs in PALADIN Toolbox can be saved automatically to a destination drive of your choice.
Insert and drive where you would like your logs to be stored. If necessary, you can
prepare the drive using the Disk Manager in the PALADIN Toolbox.
Click the “Logs” icon in the upper right-hand corner of the PALADIN Toolbox Window.
27
PALADIN Toolbox - Automatic Logging
A dropdown box will appear giving you the option of selecting a connected drive to store
your PALADIN Toolbox Logs.
Logs from the Imager and Unallocated tabs will now be saved automatically to the drive
you selected in text format.
28
PALADIN Toolbox - Preparing Media - Sterilize (Wiping)
Many agencies require that media to be used for the storage of evidence must be “wiped”
or “sterilized” to ensure that it is free from pre-existing data.
PALADIN Toolbox sterilizes media by writing “zeros” to the entire device with a single
pass. Toolbox gives you the option to perform a verification to ensure that the drive only
consists of zeros. Most tools tend to hash the drive with a CRC-64 algorithm which will
return a result of zero if properly wiped. Any algorithm takes time to calculate.
PALADIN Toolbox speeds up the process of verification by simply scanning the device for
anything that is not a zero which is much more efficient and faster. The results of this scan
is either pass or fail.
To sterilize a drive navigate to the Disk Manager tab, highlight the physical drive that you
want to sterilize and click “Wipe”.
29
PALADIN Toolbox - Preparing Media - Sterilize (Wiping)
30
PALADIN Toolbox - Preparing Media - Formatting
PALADIN Toolbox supports makes it easy to format a device with any one of five File
Systems:
• Linux EXT4
• NTFS
• VFAT (FAT32)
• HFSPLUS (Mac OS X Extended - no journaling)
• ExFAT
From the Disk Manager select the drive or volume to format and then select the “Format”
button.
31
PALADIN Toolbox - Formatting
Verification of the formatting can be found in the Task Logs. Once the format is completed
click the “Refresh” button in the Disk Manager to re-poll the devices to show the newly
formatted volume.
32
PALADIN Toolbox - Formatting
PALADIN Toolbox is the easiest way to image a device in a forensically sound manner.
Since PALADIN is based on Ubuntu a majority of modern and legacy hardware is
supported. This includes PCs, Macs, internal hard drives, external hard drives, RAIDs and
servers. All without the need of hardware write-blockers. Several versions of PALADIN
Toolbox have already been tested by the NIST (National Institute of Standards and
Technology).
33
PALADIN Toolbox - Imaging a Drive
Imaging functions
can be found in
the PALADIN
Toolbox Imager
Module.
• Source = Select the physical or logical drive that you want to image.
• Image Type = This is where you select the type of forensic image for the output or
select “Device” to make a clone.
• Destination = This is the volume where you want your forensic image to go.
• Label = Name for your image (no spaces).
• Verify after creation = Select this if you want to hash the forensic image files after they
have been created (SHA-1 and MD5).
• Segment Size = Select this if you would like to divide your forensic image file into
smaller segments or “chunks”. Due to Linux FAT32 limitations (VFAT), 2000 Mb is the
largest size allowed.
• Start - Starts imaging once your parameters as set.
34
PALADIN Toolbox - Imaging a Drive
Any drives connected while PALADIN boots or drives that are plugged in afterwards are
write-protected automatically.
35
PALADIN Toolbox - Imaging a Drive
A single physical drive (/dev/sdd JD Mercury) being imaged to a collection drive (/dev/
sdc1 “DEST-1” volume) and then as a Virtual Machine image to a second drive “DEST-2”.
The first is an .E01 format with the name “BAD_GUY_IMAGE”. The second (“Additional”)
image is a .vmdk format with the name “BAD_GUY_VMDK”.
The EWF format will be hashed after the completion of the imaging (“Verify after creation”)
and will be segmented into 2GB “chunks” if the source is larger than 2 GBs (“Segment
Size”).
36
PALADIN Toolbox - Cloning a Drive
PALADIN Toolbox provides the ability to clone devices through the Device Imager Tab.
When cloning a drive make sure that your destination drive is larger than the source. Keep
in mind that even though devices are advertised as being the same size this is not always
true.
To clone a device simply select the physical drive from the “Source” field. In “Image Type”
select “Device”. In the “Destination” field select the drive that will become the clone.
Finally, provide any name in the Label field and press start.
37
PALADIN Toolbox - Imaging Across a Network
One of the coolest features of the PALADIN Toolbox is its ability to image across a
network. This could be from your workstation to an Image Server or it could be out in the
field imaging a large RAID or server to a NAS (Network Attached Storage) that you brought
along. As long as you have set up a Samba (SMB) or Network File Share (NFS) share for a
folder or drive you are good to go!
38
PALADIN Toolbox - Imaging Across a Network
By default, networking is disabled remain silent if a computer is on a network. To begin,
you must enable networking in PALADIN.
39
PALADIN Toolbox - Imaging Across a Network
Upon successful connection your SMB or NFS share will be available in the “Destination”
dropdown in the Imaging module.
40
PALADIN Toolbox - Converting a Forensic Image
PALADIN has the ability to convert forensic images from one type to another using the
“Image Converter” Module. Make sure that you have a drive mounted read-write with
the images that you would like to convert.
Image List - your forensic images to convert. If you do not see you images hit the refresh
button next to the dropdown box.
Image Type - select the new format for the forensic image.
Destination - where to send the new image format.
Label - enter a name for the conversion.
41
PALADIN Toolbox - Imaging Unallocated Space
Another useful feature of PALADIN is its ability to image only the Unallocated Space and
Free Space (unpartitioned space) to a set raw image files that can be later carved for data.
Unallocated Space and Free Space are areas where deleted files are typically found.
To begin extracting the Unallocated space and Free Space select “Unallocated” from the
Toolbox sidebar.
Source - select the device for unallocated and free space extraction.
Destination - select the drive that will store the extracted data.
Label - enter a name for the session.
42
PALADIN Toolbox - Imaging Unallocated Space
Upon completion an explorer will open showing the files containing the extracted
unallocated and free space.
These files can be carved with a variety of tools. The following data carving tools can be
found in the PALADIN Forensic Apps directory under “Carving Tools”:
• Foremost
• Photorec
• Scalpel
• TestDisk
• and more!
43
PALADIN Toolbox - Hashing
Physical disks and volumes verified or hashed within PALADIN Toolbox under Disk
Manager. Both an MD5 and a SHA-1 value will be calculated.
For physical devices or logical volumes select the device or volume to be hashed and click
“Verify” to begin.
44
PALADIN Toolbox - Hashing
Upon completion of the verification/hashing the results window will appear with a MD5
and SHA-1 hash values.
45
PALADIN Toolbox - Mounting and Unmounting
Whenever using PALADIN the mounting and unmounting of drives should be done through
the PALADIN Toolbox. This will ensure that the Toolbox works correctly and attached
devices are not accidentally altered. Mounting and unmounting occurs in the Disk
Manager module. Simply highlight a device or volume and click the appropriate button.
46
PALADIN Toolbox - Mounting and Unmounting
For convenience we have added the Mounted Media Folder Icon in the dock to find
currently mounted Devices, Images and Network Shares.
Once the mount type is selected an explorer window will open showing currently mounted
items.
47
PALADIN Toolbox - Restoring a Forensic Image
To restore a forensic image back to a physical disk use the Image Converter module.
Make sure that the device containing the forensic image to be restored is mounted read-
write. If you do not see your image in the drop down please select the refresh tab. Select
the forensic image to be restored from the “Image List”.
In “Destination” select the drive to be restored. Provide a name in “Label” and select
“Convert”.
48
TRIAGE with PALADIN
One of the most important features of PALADIN is its ability to search (or triage) a
computer or device for data without making any changes whatsoever. This feature was
initially designed to assist law enforcement in their efforts to combat the sexual
exploitation of children by providing a tool which can quickly locate files to determine if
they are illicit.
PALADIN’s triage and search features are found in the “Find” tab of the PALADIN Toolbox.
Searches from within the Find tab can be based on:
49
TRIAGE with PALADIN - Setup
Start PALADIN
Boot a computer to search with PALADIN or attach a device to search with a computer
already running PALADIN.
PALADIN Find can load multiple keywords at one time. In order to do this you need to
have a text file with one keyword per line. In PALADIN you can open your keyword list and
copy the keywords into the clipboard. In the Find configuration window there is a “P”
button that can be used to “paste” multiple keywords from the clipboard.
Attach a destination drive to save your search results and to optionally copy out files of
interest and mount as read-write. PALADIN will remember your searches which can then
be reloaded later. This saves you from having to enter a large amount of search
parameters more than once.
“Find” creates symlinks (soft links) on your destination drive during the search process.
FAT32 and ExFAT file systems do not support symlinks. Therefore, it is recommended that
you should format your destination as HFSPLUS, NTFS or EXT4. FAT32 (VFAT) and ExFAT
can be used for the destination drive, however, the files which are located will
automatically be copied to your destination drive.
50
TRIAGE with PALADIN - Find Search Window
• Select Prev. Find Criteria - this is where you will find previously saved searches if you
check the tick box.
• “P” button - used to paste keywords saved to the clipboard.
• “+” (plus) button - used to add a single keyword.
• “-” (minus) button - used to remove a single keyword.
• Device - select your Destination drive to store you search results and search
parameters.
• Label - provide a unique name for each search. You will be able to use this to reload
the search again.
• Copy Original - files that match your keyword search can be copied to your
destination drive.
51
TRIAGE with PALADIN - Content Search
Example of a search for content (keywords found within a file).
• Use the “+” (plus) button in the Keyword window to add keywords. To add multiple
keywords all at once use the clipboard to copy your single-spaced keyword list into the
window with the “P” button. Example above is “vanagon”,“camper” and “vw”.
• Select the Device or add directories to search. The volume /dev/sdb1
“WESTYSROCK” is used this example.
• Provide a “Label” for you search. “Keyword_Search” is the label for this search.
• Choose a destination “Device”. The device /dev/sdc1 “DESTINATION” is used in this
example.
• Decide if you want to have PALADIN copy the files that are found to your destination
drive. We chose “No” in the “Copy Original” dropdown box.
• Click the “Search” button to begin your search.
52
TRIAGE with PALADIN - Content Search
53
TRIAGE with PALADIN - Content Search
PALADIN includes multiple applications to open and view the files found. As seen below
“vanagon” was found inside the document.
54
TRIAGE with PALADIN - Filename Search
Example of a search for keywords in the name of the file which can include extensions.
• Use the “+” (plus) button in the Name window to add keywords. To add multiple
keywords all at once use the clipboard to copy your single-spaced keyword list into the
window with the “P” button. Example above is “Earworm” and “.epub”.
• Select the Device or add directories to search. The volume /dev/sdb1
“WESTYSROCK” is used this example.
• Provide a “Label” for you search. “File_Name_Search” is the label for this search.
• Choose a destination “Device”. The device /dev/sdc1 “DESTINATION” is used in this
example.
• Decide if you want to have PALADIN copy the files that are found to your destination
drive. We chose “Yes” in the “Copy Original” dropdown box.
• Click the “Search” button to begin your search.
55
TRIAGE with PALADIN - Filename Search
56
TRIAGE with PALADIN - MIME Search
MIME is an acronym for “Multipurpose Internet Mail Extensions”. Its original purpose was
to assist in identifying and exchanging various file types via the Internet. The MIME
libraries which identify file types have been built into PALADIN Find.
We have included hundreds of MIME types into the PALADIN Find Module.
In PALADIN Find you can search by individual MIME signatures, MIME Categories or
Custom MIME Types. Using “Categories” you can search every file type within that
category. For example, selecting “image”
will find every image format known such as
JPEG, PNG, BMP and more.
57
TRIAGE with PALADIN - MIME Search
Example of a search based on MIME Categories for all Images and Videos.
• Use the MIME Categories tab to select file categories. To search for all videos and
images select the “image” and “video” categories.
• Select the Device or add directories to search. The volume /dev/sdb1
“WESTYSROCK” is used this example.
• Provide a “Label” for you search. “Image_Video_Search” is the label for this search.
• Choose a destination “Device”. The device /dev/sdc1 “DESTINATION” is used in this
example.
• Decide if you want to have PALADIN copy the files that are found to your destination
drive. We chose “Yes” in the “Copy Original” dropdown box to copy out the files.
• Click the “Search” button to begin your search.
58
TRIAGE with PALADIN - MIME Search
59
TRIAGE with PALADIN - Extra Features
In PALADIN Find you can add multiple search terms to any or all of the categories and run
them at the same time.
--
In PALADIN Find it is possible to reload previous searches.
Make sure that your destination drive with your previous saved searches is mounted read-
write.
Click the box next to “Select Prev. Find Criteria”.
Once you have selected your previous search name the keywords will automatically
populate.
60
PALADIN - Forensic Apps
PALADIN contains over 100+ pre-compiled applications to assist with your forensic tasks
divided into 33 different categories. PALADIN is truly an all-in-one forensic suite!
The Forensic Apps Directory can be accessed via the Dock at the bottom of the desktop.
Simply click the folder icon.
61
PALADIN - Forensic Apps - Autopsy
With the introduction of PALADIN Version 6 we have added Autopsy courtesy of BASIS
Technology and Brian Carrier. Autopsy is a powerful GUI based full forensic suite which
has features that rival many of the top commercial forensic suites found on the market
today without the cost or annual renewal fees.
“Autopsy® is the premier open source digital forensics platform that has thousands of
users worldwide. It has been developed by Basis Technology and an open source
community.
Autopsy has the core analysis features that are needed by law enforcement and corporate
investigators to conduct an investigation of a hard drive or mobile device.”
Images made with PALADIN can immediately be processed with Autopsy making
PALADIN a complete full forensic suite!
To start Autopsy in PALADIN click the Autopsy (dog) icon in the PALADIN dock.
62
PALADIN - Forensic Apps - Autopsy
After imaging with PALADIN start Autopsy and select “Create New Case”.
Enter a “Case Name” select your “Base Directory” (drive mounted read-write) for output.
63
PALADIN and Autopsy - Starting a Case
Select “Image File” for your source and navigate to the forensic image file.
64
PALADIN and Autopsy - Starting a Case
65
PALADIN and Autopsy - Starting a Case
Autopsy provides an easy to use and intuitive interface that makes processing and finding
data easy!
66
PALADIN and Autopsy - Reporting
After tagging and bookmarking data click the “Generate Report” button and select your
report type.
67
PALADIN and Autopsy - Reporting
For more information and to find additional Autopsy modules please visit Basis
Techology’s website here:
http://www.basistech.com/digital-forensics/autopsy/modules/
68
PALADIN and Mac Fusion Drives
Fusion Drives can be imaged with PALADIN and recombined on a Mac manually or
automatically with RECON for Mac.
1.) Boot the Mac containing the Fusion drive with PALADIN.
2.) Use the Imager in PALADIN Toolbox to image both parts of the Fusion drive in the .dmg
format.
3.) Remove the drive containing the two forensic images and connect it to a Mac.
4.) Remount the drives manually or automatically using RECON for Mac.
69
SUMURI Remote Services Mode
With the release of PALADIN 6 we have included a new boot option - SUMURI Remote
Services
SUMURI Remote Services allows you to boot into a forensically sound mode with
networking enabled. In this mode we have added the SUMURI Remote Services
application. This application allows you to connect with a vetted SUMURI Team Member
who can assist you with your forensic tasks remotely.
Additionally, SUMURI Remote Services allows you to engage the SUMURI Team to
handle your Forensic or eDiscovery needs without the expense of travel costs or
having to wait for a response team to arrive.
More information about SUMURI Remote Services can be found at our website
(www.sumuri.com).
70
SUMURI Remote Services Mode
Booting into SUMURI Remote Services mode is done at the boot menu. Using your arrow
keys select “SUMURI Paladin Live Session - SUMURI Remote Services”.
71
SUMURI Remote Services Mode
SUMURI Remote Service Mode can be identified by the orange PALADIN shield and the
words “REMOTE SERVICES MODE”.
72
SUMURI Remote Services Mode
Networking will be enabled by default, however, all devices will remain untouched.
Once you have a good connection you can start SUMURI Remote
Services by clicking its icon in the dock.
SUMURI
Remote Services
73
SUMURI Remote Services Mode
A green dot indicates that you have an active connection which is secure. At this point
you can contact your SUMURI Team member.
When you have contacted the SUMURI Team they will ask for the unique ID Number
displayed in the Remote Services window in order to connect after we receive your
permission.
74
PALADIN - CORPORATE Edition
SUMURI can customize and re-brand PALADIN and our Remote Services for your
agency.
Please contact SUMURI for more details about customizing PALADIN for your agency.
75