daily pastebin goal
12%
SHARE
TWEET

Untitled

a guest Nov 10th, 2012 4 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. evan@edlap:/media/4A169A33169A204D/Forensic/live$ ls chroot/
  2. dev  proc  sys
  3. evan@edlap:/media/4A169A33169A204D/Forensic/live$ ls target/
  4. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo fdisk -l ../WD80GBIMAGES/WD6GBEXTRACTED.raw
  5.  
  6. Schijf ../WD80GBIMAGES/WD6GBEXTRACTED.raw: 6448 MB, 6448619520 bytes
  7. 255 koppen, 63 sectoren/spoor, 784 cilinders, totaal 12594960 sectoren
  8. Eenheid = sectoren van 1 * 512 = 512 bytes
  9. Sectorgrootte (logischl/fysiek): 512 bytes / 512 bytes
  10. in-/uitvoergrootte (minimaal/optimaal): 512 bytes / 512 bytes
  11. Schijf-ID: 0xbd4bbd4b
  12.  
  13.                            Apparaat Opstart   Begin       Einde     Blokken   ID  Systeem
  14. ../WD80GBIMAGES/WD6GBEXTRACTED.raw1   *          63    11936294     5968116   83  Linux
  15. ../WD80GBIMAGES/WD6GBEXTRACTED.raw2        11936295    12594959      329332+   5  uitgebreid
  16. ../WD80GBIMAGES/WD6GBEXTRACTED.raw5        11936358    12594959      329301   82  Linux wisselgeheugen
  17. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo cp ../WD80GBIMAGES/WD6GBEXTRACTED.raw  WD6GBEXTRACTED.raw
  18. evan@edlap:/media/4A169A33169A204D/Forensic/live$ md5sum WD6GBEXTRACTED.raw
  19. ce8b2f91e056df306268f1e9ccfdaa4c  WD6GBEXTRACTED.raw
  20. evan@edlap:/media/4A169A33169A204D/Forensic/live$ ls
  21. chroot  target  WD6GBEXTRACTED.raw
  22. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo kpartx -v -a WD6GBEXTRACTED.raw
  23. [sudo] password for evan:
  24. add map loop0p1 (252:1): 0 11936232 linear /dev/loop0 63
  25. add map loop0p2 (252:2): 0 658665 linear /dev/loop0 11936295
  26. add map loop0p5 : 0 658602 linear 252:2 63
  27. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount /dev/mapper/loop0p1 target
  28. evan@edlap:/media/4A169A33169A204D/Forensic/live$ ls target/
  29. bin  boot  cdrom  dev  etc  home  initrd  initrd.img  lib  media  mnt  opt  proc  root  sbin  srv  sys  tmp  usr  var  vmlinuz
  30. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind target/proc chroot/proc
  31. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind target/dev chroot/dev
  32. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind target/dev/pts chroot/dev/pts
  33. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind target/sys chroot/sys
  34. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo chroot chroot/ /bin/bash
  35. chroot: failed to run command `/bin/bash': No such file or directory
  36. evan@edlap:/media/4A169A33169A204D/Forensic/live$
  37.  
  38.  
  39. -----------------------------
  40.  
  41.  
  42. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind /proc target/proc
  43. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind /dev target/dev
  44. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind /sys target/sys
  45. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo chroot target/ /bin/bash
  46. root@edlap:/# su stickieman
  47. stickieman@edlap:/$ ls
  48. bin  boot  cdrom  dev  etc  home  initrd  initrd.img  lib  media  mnt  opt  proc  root  sbin  srv  sys  tmp  usr  var  vmlinuz
  49.  
  50.  
  51. evan@edlap:/media/4A169A33169A204D/Forensic/live$ fuser -m target/dev/
  52. /media/4A169A33169A204D/Forensic/live/target/dev:  2103  2141  2142  2152  2160  2162  2170m  2173  2178  2181  2186  2188  2189  2190  2191  2196  2210  2219  2222  2224  2228  2232  2280  2318  2319  2328  2332  2353  2355  2365  2367  2369  2371  2373  2375  2409  2414  2435  2451  2511  2536  2538  2540  2542  2567  2573  2575  2589  2591  2606  2613  2618  2728  2765  2800  2811  2827  2860  2987  3738  3743  5524  6206  6224  6764  7356
RAW Paste Data
Top