Understand the Partition Table within Master Boot Record (MBR) | Digital Forensics | File System

Поділитися
Вставка
  • Опубліковано 26 січ 2025

КОМЕНТАРІ • 19

  • @Blu3Eye-x6u
    @Blu3Eye-x6u 4 місяці тому +3

    Hey! Thank you for the video, i wanna see more stuff on file carving, GPT analysis and extended partition analysis. I am actually just getting starting into forensics and found your video really helpful to understand the structure of DOS|MBR partitioned drives, furthermore i have downloaded the raw disk images you mentioned and have examined the second partition entry metadata.
    1- first byte set to 0x00 indicating this as non-bootable partition
    2- partition type value to 0x07, indicating NTFS partition(FS type is NTFS)
    3- starting LBA address -> 0x32800 = 206,848 -> starting in-file offset -> 0x6500000
    4-size of the partition in sectors 0x27CD000 -> size of the partition in bytes 21367881728 =~21GB

    • @CyDig
      @CyDig  4 місяці тому +1

      Thank you for your comment. I will create another video about GPT. Please consider sharing my video to support the growth of my channel.

    • @CyDig
      @CyDig  4 місяці тому

      I will wait for the others for the answer.

  • @CyDig
    @CyDig  4 місяці тому +1

    Hi All, I hope you enjoy my videos. Could I ask you to support my channel by sharing my videos to help it grow? Don't forget to like and subscribe. Also, if you'd like me to create a new video on any topic related to cyber security and digital forensics, just let me know.

    • @Blu3Eye-x6u
      @Blu3Eye-x6u 4 місяці тому

      definitely i will share it on my socials, also i am threat researcher and started sharing some Malware analysis and reversing content,if you're into give it a look !

  • @monsterglow5979
    @monsterglow5979 3 місяці тому +1

    I am confused, 0x0030200 to decimal is 197120, why at 8:49 is 204800? Can tell me why? thank you!!!

    • @CyDig
      @CyDig  2 місяці тому +1

      It’s great that you found this. You are correct; the value should be 197120, not 204800. Here’s why:

    • @CyDig
      @CyDig  2 місяці тому +1

      0X 00 02 03 00 is stored as little endian
      It should be read byte by byte from right to left and then you can convert it to 00 03 02 00
      0000 0000 0000 0011 0000 0010 0000 0000
      2^17+2^16+2^9 = 512+65536+131072 = 197120

    • @monsterglow5979
      @monsterglow5979 2 місяці тому +1

      ​@@CyDig Thanks for answer. very helpful video!

  • @pllasticyes6455
    @pllasticyes6455 2 місяці тому +1

    Really Helpful!Thanku❤

    • @CyDig
      @CyDig  2 місяці тому

      Thanks

  • @piotrkulinski922
    @piotrkulinski922 11 місяців тому +3

    Extremely good content

    • @CyDig
      @CyDig  11 місяців тому

      Thanks

  • @BufferTheHutt
    @BufferTheHutt 8 місяців тому +2

    good explanation. I prefer the Active Disk Editor for MBR analysis, because of the templates and color segmentation.

    • @CyDig
      @CyDig  4 місяці тому +1

      I will download it and try using Active Disk Editor. Please consider sharing my video to help grow my channel.

  • @Notyourbusiness_kik
    @Notyourbusiness_kik 10 місяців тому +2

    thank you ,this helped me a lot

  • @peterokoye5115
    @peterokoye5115 3 місяці тому +1

    This was helpful but I want to know how I could convert big endian to sector because I am learning to analyse partition tables with Linux Caine command line

    • @CyDig
      @CyDig  2 місяці тому

      See this example to find out sector number 0X 00 02 03 00 is stored as little endian
      It should be read byte by byte from right to left and then you can convert it to 00 03 02 00
      0000 0000 0000 0011 0000 0010 0000 0000
      2^17+2^16+2^9 = 512+65536+131072 = 197120 sectors

  • @infosec1585
    @infosec1585 8 місяців тому +1

    ntfs