LogoLogo
Back to binalyze.com
  • Welcome | Binalyze Knowledge Base
  • AIR
    • AIR
    • Introduction
      • What is AIR?
      • Terminology
      • Architecture
        • AIR Responder Architecture; overview and performance analysis
        • AIR Task Flow and Management
      • Network Communication
      • Cloud Forensics with Binalyze AIR
    • AIR Setup
      • Console Hardware Requirements
      • Console Pre-Installation
      • Console Installation
      • Microsoft Azure Cloud Platform Integration
      • AIR Relay Server
        • What is AIR Relay Server?
        • Requirements for installation
        • How to install a Relay Server on different Linux platforms
        • How to change IP address of Relay Server
        • How to install a Responder with Relay Server support
        • Proxy configurations
          • Adding proxy to Relay Server
          • Adding proxy to Responder
        • Service Management for Relay Server
        • Whitelisting for Relay Server
        • Retrieving metrics from Relay Server
        • Updating and Uninstalling Relay Server
        • Troubleshooting
      • AIR Responder - Supported Operating Systems
        • AIR Responder - MS Windows supported systems
        • AIR Responder - Apple macOS supported systems
        • AIR Responder - Linux (DEB/RPM) supported systems
        • AIR - ESXi Standalone Collector
        • AIR Responder - Chrome supported systems
          • AIR For Chrome
      • AIR Responder Hardware Requirements
      • AIR Responder Deployment
        • Golden Image
        • Responder & Active Directory OUs
        • AIR Responder Exception Rules
          • Binalyze AIR Watchdog Folder
        • FDA via Jamf and Apple’s PPPC utility
        • AIR Responder in Windows 'Safe Mode'
      • Uninstalling AIR Responders
      • Security
        • AIR Console Access Control
        • AIR SSL Enforcement
          • SSL Certificate Management in Binalyze AIR
        • Two-factor authentication (2FA)
      • Post-Deployment Configuration Guide
        • Using AIR CLI on Binalyze AIR Console
      • AIR's User Settings
    • Updating AIR
      • Single-Tier Systems
      • 2-Tier Systems
      • AIR Console Updating - SaaS
    • Backup
      • Restore AIR Backup using the CLI
    • Features
      • Acquisition
        • Task Creation
          • Regex in AIR/DRONE:
          • Asset Management with Persistent Saved Filters
          • Task Cancellation and Deletion
        • Acquisition Profiles
        • Supported Evidence
          • Windows Collections
          • macOS Collections
          • Linux Collections
          • IBM AIX Collections
        • Scheduling Tasks
        • Disk and Volume Imaging
          • Imaging with interACT
        • Chain Of Custody in AIR
      • Auto Tagging
      • Triage
        • Triage Rule Templates
          • YARA Templates
          • Sigma Templates
          • osquery Templates
        • Schedule Triage Tasks
      • interACT
        • interACT Commands
        • PowerShell commands in interACT
      • Compare
      • Timeline
      • Integrations
        • SSO Integrations
          • Microsoft Azure SSO Integration
          • Okta SAML 2.0 SSO Integration
        • Webhooks
          • Mattermost Integration
          • Splunk Integration
          • IBM QRadar Integration
          • Wazuh Integration
          • Cortex XSOAR Integration
          • Elasticsearch Logstash Kibana Integration
          • ServiceNow Integration
          • Sumo Logic Integration
          • Crowdstrike Integration
          • Microsoft Sentinel Integration
          • Slack Integration
          • Carbon Black Cloud Integration
          • Rapid7 InsightIDR Integration
          • LogicHub SOAR (DEVO) Integration
          • Fortigate SIEM Integration
          • Dynatrace Integration
          • Stellar XDR Integration
          • SentinelOne Integration
          • Microsoft 365 Defender Integration
          • Cisco XDR Integration
      • Event Subscription
      • AIR API
        • API in AIR is likely to be more effective than Webhooks
      • DRONE
        • What is DRONE?
        • What is an Analysis Pipeline?
        • Analyzers
          • Cross Platform Analyzers
            • MITRE ATT&CK Analyzer
              • MITRE ATT&CK Analyzer changelog
            • Dynamo Analyzer
            • Browser History Analyzer
            • Generic WebShell Analyzer
          • Windows Analyzers
            • Windows Event Records and how AIR handles them
              • Windows Event Logs in AIR v4.21 and older versions
              • Event Records Summary vs. Event Records
            • Prefetch Analyzer
            • Shellbag Data Fields
          • Linux Analyzers
          • macOS Analyzers
            • Audit Event Analyzer
      • AIR Investigation Hub
        • Using the AIR Investigation Hub
        • Investigation Hub – Data Usage Statistics Dashboard
      • AIR File Explorer
        • File Explorer - FAQs
      • Tornado (Preview Version)
        • Tornado Installation Guide
          • Tornado Operating System Support
        • Updating Tornado
        • Tornado demo video
        • Getting Started with Tornado
          • Tornado Terminology
        • Tornado Collectors
          • Accessing Google Workspace
            • Service Account Creation
              • Enable Service Account Key Creation
          • Access Modes in O365
            • O365 license types
        • Tornado Troubleshooting & Feedback
        • Tornado FAQs
      • Frank.AI
      • Asset Isolation
      • Evidence Repositories
      • Policies
      • Tags
      • Off-Network Responder
        • Setting Up a Custom Case Directory
        • biunzip
          • biunzip password file
      • Binalyze AIR Responder Proxy Support
      • Proxy Configuration on Binalyze AIR Console
      • Binalyze AIR Audit Logs
    • Troubleshooting
      • Binalyze AIR Console CPU Profiling for Performance Issues
      • Understanding MSI Error Code 1618
      • How to gather Binalyze AIR logs for Troubleshooting
        • Collecting Binalyze AIR Console Log Files
        • Collecting Binalyze AIR Responder Log Files
        • Collecting Binalyze AIR Off-Network Responder Log Files
    • FAQs
      • Binalyze AIR Console Migration Procedure For Single-Tier Setup
      • Binalyze AIR Console Migration Procedure For 2-Tier Installation
      • Binalyze AIR Console Backup Procedure
      • Resolving the “Invalid Host Header. Host must be the Console Address” Error
      • How to download the collected evidence and artifacts in Binalyze AIR?
      • How to gather Binalyze AIR logs for Troubleshooting
        • Collecting Binalyze AIR Console Log Files
        • Collecting Binalyze AIR Responder Log Files
        • Collecting Binalyze AIR Off-Network Responder Log Files
      • AIR responder troubleshooting
      • Understanding Port Usage in Binalyze AIR
      • How many assets can connect to a single Console instance?
      • How do I enable SSL on AIR?
      • Can I use AIR with EDR/XDR Products?
      • Can I integrate AIR with my SOAR/SIEM?
      • What (sub)domains are used by AIR?
      • Docker & Host System IP Conflict
      • Monitoring Responder and UI API's
      • How do I update AIR Console?
      • How do I update AIR Responders on assets?
      • How to reset the password of a user via the AIR-CLI?
      • Is there a way to move an asset from one Organization or Case to another?
      • Creating exclusions/exception rules for Binalyze AIR Responder on EPP and EDR Solutions
      • Anything missing?
      • How can I install a version of AIR that isn't the latest?
  • General
    • Licenses - Open-source Software List
Powered by GitBook
On this page

Was this helpful?

Export as PDF
  1. AIR
  2. Features
  3. AIR File Explorer

File Explorer - FAQs

PreviousAIR File ExplorerNextTornado (Preview Version)

Last updated 5 months ago

Was this helpful?

Q1. What is the AIR File Explorer?

The AIR File Explorer is a built-in, cross-platform GUI browser tool within AIR, designed for seamless navigation of full disk or volume image files. It allows users to explore directory structures and efficiently inspect individual file contents in Hex, Text, or Meta Data views.

Q2. What value does File Explorer provide?

A full disk or volume image can provide crucial evidence for digital forensic investigations. Offering investigators easy access to disk image files allows them to navigate investigations swiftly in a unified view, minimizing the need for mastering multiple tools.

Q3. What are the plans for File Explorer?

The initial release of File Explorer (v4.7) introduced the ability to explore raw disk or volume images. Since then, we’ve added support for more image file types, whether they are segmented or single files. Subsequent versions have expanded functionality, adding support for additional disk types for ingestion into AIR and increasing the range of supported remote storage locations from which these image files can be pulled, presented, and mounted within the AIR File Explorer.

Please see this page, , for the list of supported disk types and evidence repositories from which they can be mounted.

Our plans include introducing a live version of File Explorer, enabling users to explore files directly on remote assets, and DRONE support.

Q4. Are there any requirements to use AIR’s File Explorer?

Existing customers (installed AIR 4.7 and below) who have yet to do so will need to add the new 'air-tornado' Docker container to support the File Explorer feature - please contact the support team to help do so. Customers who installed AIR v4.7 or later will already have the additional Docker container.

Q5. Why is a new Docker container necessary to support the feature?

Refer to Q15.

Q6. What does RAW, EWF, VMDK, or VHD/X mean when discussing an image file?

Whether acquired by AIR or captured by a third-party tool, a disk image can only be explored in the AIR File Explorer if it's in the RAW(dd), EWF (E01/Ex01), VMDK, VHD/X formats:

  1. RAW format is a bit-by-bit copy of a disk or volume, preserving all data without interpretation or modification. AIR supports the generation of single or segmented RAW image files.

  2. EWF2 is also commonly used in digital forensics to store and compress digital evidence but this format supports additional metadata. AIR supports the generation of single EWF2/Ex01 files but NOT segmented EWF2/Ex01 image files.

  3. VMDK (Virtual Machine Disk) is a file format used to store virtual disk images for VMware virtual machines. It enables the encapsulation of an entire hard drive, including its filesystem and data, into a single file or set of files, facilitating easy management, migration, and backup of virtual environments.

  4. VHD (Virtual Hard Disk): VHD is an older virtual disk format used by Microsoft solutions like Hyper-V. It supports up to 2TB and is ideal for compatibility with legacy systems.

    VHDX (Virtual Hard Disk Extended): VHDX is the newer format, supporting disk sizes up to 64TB with improved performance and data protection. Use it for modern systems or larger disks.

NB re VMDK: We support reading RAW (Flat), COWD, and VMDK extent file formats.

For VMDK, we support the following disk types:

  • monolithicSparse

  • twoGbMaxExtentSparse

  • monolithicFlat

  • twoGbMaxExtentFlat

  • streamOptimized

However, the "vmfs" and "thin" disk types are not supported.

We can also open and read snapshots, but the actual VMDK files are required as well.

Q7. How does it work?

Clicking the “New Asset” button on the Asset page now offers the option to add “Disk Image”. Users can navigate to an SMB, SFTP, Amazon S3, or Azure Blob storage shared location, select the disk image, and add it as a new asset. Once created, users can browse the directory structure in the asset detail screen.

Q8. Where can the image file be saved so AIR can access it?

Currently, the image must be supplied to AIR from an SMB, SFTP, S3 or Azure Blob storage shared location, saved as:

  • a single or segmented RAW file, OR

  • a single or segmented E01/Ex01 file OR

  • a single or segmented VMDK file OR

  • a single or segmented VHD/VHDX file.

Q9. What are some important details about the displayed information?

The hash of the image file isn't calculated automatically to save time during asset creation. You can calculate the image hash on the Asset Info page as soon as it is created.

Various views for selected files include hex view, text view, and metadata view.

Q10. How long does it take to create an asset from an image file?

Testing has shown that a 107GB full disk image is available for exploration in AIR's File Explorer within 20 to 30 seconds after hitting the “Create Asset” button.

Q11. Can I bookmark items/files in File Explorer?

Not yet, but it's in the pipeline.

Q12. What actions are users able to take from within File Explorer?

Users can calculate the hash of individual or multiple files using the bulk action bar, and download individual files.

Q13. What other enhancements are planned?

In the future, users may have the ability to right-click a file for an option to 'hunt' for that item or other assets attached to the AIR console. Plans also include allowing users to run triage and acquisition tasks on the disk image and add the collections/results to the Investigation Hub.

Q14. Can deleted files be carved from File Explorer?

We present the logical file system, so we can only access existing files and folders; carving unallocated space is not an option currently.

Q15. Are we pulling raw data into the console or just parsed data?

In the AIR console, the latest Docker container, named 'air.tornado', acts as a proxy for commands from the front end. When an action is requested, such as opening a folder, AIR sends the command to the container, which reads the folder data from the disk and provides it to the front end on demand. Recent updates include indexing the entire image for search capabilities without downloading the entire image to the AIR server. The image remains in the evidence repository, so a revoked token from the evidence repository will result in a lost connection.

AIR File Explorer