daily pastebin goal
12%
SHARE
TWEET

Untitled

a guest Nov 10th, 2012 3 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. evan@edlap:/media/4A169A33169A204D/Forensic/live$ ls chroot/
  2. dev  proc  sys
  3. evan@edlap:/media/4A169A33169A204D/Forensic/live$ ls target/
  4. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo fdisk -l ../WD80GBIMAGES/WD6GBEXTRACTED.raw
  5.  
  6. Schijf ../WD80GBIMAGES/WD6GBEXTRACTED.raw: 6448 MB, 6448619520 bytes
  7. 255 koppen, 63 sectoren/spoor, 784 cilinders, totaal 12594960 sectoren
  8. Eenheid = sectoren van 1 * 512 = 512 bytes
  9. Sectorgrootte (logischl/fysiek): 512 bytes / 512 bytes
  10. in-/uitvoergrootte (minimaal/optimaal): 512 bytes / 512 bytes
  11. Schijf-ID: 0xbd4bbd4b
  12.  
  13.                            Apparaat Opstart   Begin       Einde     Blokken   ID  Systeem
  14. ../WD80GBIMAGES/WD6GBEXTRACTED.raw1   *          63    11936294     5968116   83  Linux
  15. ../WD80GBIMAGES/WD6GBEXTRACTED.raw2        11936295    12594959      329332+   5  uitgebreid
  16. ../WD80GBIMAGES/WD6GBEXTRACTED.raw5        11936358    12594959      329301   82  Linux wisselgeheugen
  17. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo cp ../WD80GBIMAGES/WD6GBEXTRACTED.raw  WD6GBEXTRACTED.raw
  18. evan@edlap:/media/4A169A33169A204D/Forensic/live$ md5sum WD6GBEXTRACTED.raw
  19. ce8b2f91e056df306268f1e9ccfdaa4c  WD6GBEXTRACTED.raw
  20. evan@edlap:/media/4A169A33169A204D/Forensic/live$ ls
  21. chroot  target  WD6GBEXTRACTED.raw
  22. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo kpartx -v -a WD6GBEXTRACTED.raw
  23. [sudo] password for evan:
  24. add map loop0p1 (252:1): 0 11936232 linear /dev/loop0 63
  25. add map loop0p2 (252:2): 0 658665 linear /dev/loop0 11936295
  26. add map loop0p5 : 0 658602 linear 252:2 63
  27. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount /dev/mapper/loop0p1 target
  28. evan@edlap:/media/4A169A33169A204D/Forensic/live$ ls target/
  29. bin  boot  cdrom  dev  etc  home  initrd  initrd.img  lib  media  mnt  opt  proc  root  sbin  srv  sys  tmp  usr  var  vmlinuz
  30. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind target/proc chroot/proc
  31. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind target/dev chroot/dev
  32. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind target/dev/pts chroot/dev/pts
  33. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind target/sys chroot/sys
  34. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo chroot chroot/ /bin/bash
  35. chroot: failed to run command `/bin/bash': No such file or directory
  36. evan@edlap:/media/4A169A33169A204D/Forensic/live$
  37.  
  38.  
  39. -----------------------------
  40.  
  41.  
  42. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind /proc target/proc
  43. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind /dev target/dev
  44. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind /sys target/sys
  45. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo chroot target/ /bin/bash
  46. root@edlap:/# su stickieman
  47. stickieman@edlap:/$ ls
  48. bin  boot  cdrom  dev  etc  home  initrd  initrd.img  lib  media  mnt  opt  proc  root  sbin  srv  sys  tmp  usr  var  vmlinuz
  49.  
  50.  
  51. evan@edlap:/media/4A169A33169A204D/Forensic/live$ fuser -m dev/
  52. evan@edlap:/media/4A169A33169A204D/Forensic/live$
RAW Paste Data
Top