Guest User

Untitled

a guest
Nov 10th, 2012
18
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.04 KB | None | 0 0
  1. evan@edlap:/media/4A169A33169A204D/Forensic/live$ ls chroot/
  2. dev proc sys
  3. evan@edlap:/media/4A169A33169A204D/Forensic/live$ ls target/
  4. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo fdisk -l ../WD80GBIMAGES/WD6GBEXTRACTED.raw
  5.  
  6. Schijf ../WD80GBIMAGES/WD6GBEXTRACTED.raw: 6448 MB, 6448619520 bytes
  7. 255 koppen, 63 sectoren/spoor, 784 cilinders, totaal 12594960 sectoren
  8. Eenheid = sectoren van 1 * 512 = 512 bytes
  9. Sectorgrootte (logischl/fysiek): 512 bytes / 512 bytes
  10. in-/uitvoergrootte (minimaal/optimaal): 512 bytes / 512 bytes
  11. Schijf-ID: 0xbd4bbd4b
  12.  
  13. Apparaat Opstart Begin Einde Blokken ID Systeem
  14. ../WD80GBIMAGES/WD6GBEXTRACTED.raw1 * 63 11936294 5968116 83 Linux
  15. ../WD80GBIMAGES/WD6GBEXTRACTED.raw2 11936295 12594959 329332+ 5 uitgebreid
  16. ../WD80GBIMAGES/WD6GBEXTRACTED.raw5 11936358 12594959 329301 82 Linux wisselgeheugen
  17. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo cp ../WD80GBIMAGES/WD6GBEXTRACTED.raw WD6GBEXTRACTED.raw
  18. evan@edlap:/media/4A169A33169A204D/Forensic/live$ md5sum WD6GBEXTRACTED.raw
  19. ce8b2f91e056df306268f1e9ccfdaa4c WD6GBEXTRACTED.raw
  20. evan@edlap:/media/4A169A33169A204D/Forensic/live$ ls
  21. chroot target WD6GBEXTRACTED.raw
  22. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo kpartx -v -a WD6GBEXTRACTED.raw
  23. [sudo] password for evan:
  24. add map loop0p1 (252:1): 0 11936232 linear /dev/loop0 63
  25. add map loop0p2 (252:2): 0 658665 linear /dev/loop0 11936295
  26. add map loop0p5 : 0 658602 linear 252:2 63
  27. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount /dev/mapper/loop0p1 target
  28. evan@edlap:/media/4A169A33169A204D/Forensic/live$ ls target/
  29. bin boot cdrom dev etc home initrd initrd.img lib media mnt opt proc root sbin srv sys tmp usr var vmlinuz
  30. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind target/proc chroot/proc
  31. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind target/dev chroot/dev
  32. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind target/dev/pts chroot/dev/pts
  33. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind target/sys chroot/sys
  34. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo chroot chroot/ /bin/bash
  35. chroot: failed to run command `/bin/bash': No such file or directory
  36. evan@edlap:/media/4A169A33169A204D/Forensic/live$
  37.  
  38.  
  39. -----------------------------
  40.  
  41.  
  42. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind /proc target/proc
  43. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind /dev target/dev
  44. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo mount -o bind /sys target/sys
  45. evan@edlap:/media/4A169A33169A204D/Forensic/live$ sudo chroot target/ /bin/bash
  46. root@edlap:/# su stickieman
  47. stickieman@edlap:/$ ls
  48. bin boot cdrom dev etc home initrd initrd.img lib media mnt opt proc root sbin srv sys tmp usr var vmlinuz
  49.  
  50.  
  51. evan@edlap:/media/4A169A33169A204D/Forensic/live$ fuser -m dev/
  52. evan@edlap:/media/4A169A33169A204D/Forensic/live$
Advertisement
Add Comment
Please, Sign In to add comment