{"id":922,"date":"2024-11-22T16:07:40","date_gmt":"2024-11-22T16:07:40","guid":{"rendered":"https:\/\/elusivedata.io\/?p=922"},"modified":"2025-07-18T18:04:35","modified_gmt":"2025-07-18T18:04:35","slug":"3-2","status":"publish","type":"post","link":"https:\/\/elusivedata.io\/es\/3-2\/","title":{"rendered":"Navegaci\u00f3n por la matriz de entrada de particiones GPT para el an\u00e1lisis forense. Parte 3."},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"922\" class=\"elementor elementor-922\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c34a31 e-flex e-con-boxed e-con e-parent\" data-id=\"3c34a31\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-651d9f61 elementor-widget elementor-widget-text-editor\" data-id=\"651d9f61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<h1 class=\"wp-block-heading\">Parte 3<\/h1>\n<p><\/p>\n<h2 class=\"wp-block-heading\">Introducci\u00f3n<\/h2>\n<p><\/p>\n<p>En nuestros posts anteriores, sentamos las bases para entender la Tabla de Particiones GUID (GPT) examinando el MBR Protector y el Encabezado GPT. Ahora, en la Parte 3, nos enfocaremos en el GPT Partition Entry Array. Este componente crucial del esquema GPT proporciona un mapa detallado de todas las particiones del disco, cada entrada contiene informaci\u00f3n vital sobre una partici\u00f3n espec\u00edfica. Al entender la estructura y funci\u00f3n del GPT Partition Entry Array, obtendr\u00e1 una visi\u00f3n completa de c\u00f3mo GPT gestiona las particiones, permitiendo un an\u00e1lisis m\u00e1s efectivo, la resoluci\u00f3n de problemas y la recuperaci\u00f3n de datos.<\/p>\n<p><\/p>\n<h2 class=\"wp-block-heading\">GPT (Tabla de particiones GUID) Matriz de entradas de partici\u00f3n<\/h2>\n<p><\/p>\n<p>La matriz de entradas de la tabla de particiones GUID (GPT) es una parte cr\u00edtica del sistema de particiones GPT, que se utiliza para definir y gestionar las particiones de un disco duro. Piense en ello como una lista detallada que registra los detalles de cada partici\u00f3n en el disco, como el cat\u00e1logo de una biblioteca que enumera los detalles de cada libro.<\/p>\n<p><\/p>\n<h3 class=\"wp-block-heading\">Componentes clave de la matriz de entrada GPT:<\/h3>\n<p><\/p>\n<p><strong>GUID de partici\u00f3n<\/strong>: Cada partici\u00f3n tiene un identificador \u00fanico, conocido como GUID de partici\u00f3n, que garantiza que cada partici\u00f3n pueda ser identificada de forma \u00fanica, incluso a trav\u00e9s de diferentes sistemas.<\/p>\n<p><\/p>\n<p><strong>Identificaci\u00f3n \u00fanica<\/strong>: Se trata de otro identificador \u00fanico espec\u00edfico de cada partici\u00f3n, que proporciona una capa adicional de identificaci\u00f3n \u00fanica.<\/p>\n<p><\/p>\n<p><strong>Inicio del LBA (Logical Block Addressing) de la partici\u00f3n<\/strong>: Indica el punto de inicio de la partici\u00f3n en el disco. Indica al sistema d\u00f3nde comienza la partici\u00f3n.<\/p>\n<p><\/p>\n<p><strong>LBA final de la partici\u00f3n<\/strong>: Al igual que el LBA inicial, indica d\u00f3nde termina la partici\u00f3n en el disco.<\/p>\n<p><\/p>\n<p><strong>Bits de atributos<\/strong>: Son banderas que proporcionan informaci\u00f3n adicional sobre la partici\u00f3n, como si es arrancable o si tiene alg\u00fan atributo especial.<\/p>\n<p><\/p>\n<p><strong>Nombre de la partici\u00f3n<\/strong>: Cada partici\u00f3n puede tener un nombre legible para el ser humano, lo que nos facilita la identificaci\u00f3n de la finalidad o el contenido de la partici\u00f3n. Este nombre se termina con un car\u00e1cter nulo para marcar el final de la cadena.<\/p>\n<p><\/p>\n<p>Vamos a desglosarlas todas en detalle para que entiendas perfectamente cada entrada de la matriz.<\/p>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-HxD1.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-Table1.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<p>Cuando el disco se configura como un disco GPT, la primera partici\u00f3n que se crear\u00e1 es la Partici\u00f3n del Sistema EFI (ESP). Esta es una partici\u00f3n oculta que no est\u00e1 disponible para los usuarios. Esta partici\u00f3n se encuentra en el sector 2048 y est\u00e1 formateada como FAT32 para ser compatible con todos los sistemas (Windows, Linux, MacOS).<\/p>\n<p><\/p>\n<p>La captura de pantalla anterior muestra una instalaci\u00f3n est\u00e1ndar de Windows 10 en la que se cre\u00f3 la partici\u00f3n reservada de Microsoft junto con una partici\u00f3n de datos b\u00e1sicos especificada por el usuario durante la instalaci\u00f3n.<\/p>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-Image_Series1.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<p>A continuaci\u00f3n se muestra un extracto de GUIDs de una tabla que se encuentra en la p\u00e1gina de Wikipedia GUID Partition Table:<\/p>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-Wiki-Page.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<p>Fuente: <a href=\"https:\/\/en.wikipedia.org\/wiki\/GUID_Partition_Table#Partition_type_GUIDs\">https:\/\/en.wikipedia.org\/wiki\/GUID_Partition_Table#Partition_type_GUIDs<\/a><\/p>\n<p><\/p>\n<p>Por supuesto, el GUID no se almacenar\u00e1 en la forma GUIID al visualizar los valores dentro del visor hexadecimal.\u00a0<\/p>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-Image_Series2.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<p>Los GUIDs se convierten tal y como hicimos en la anterior entrada del blog, pero tambi\u00e9n se pueden ver f\u00e1cilmente al visualizarlo en HxD:<\/p>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-HxD2.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<p>Podemos confirmar los GUID de la partici\u00f3n del volumen con el comando: mountvol.exe<\/p>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-CommandWindow.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-Image_Series3-right-background.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<p>Conociendo el LBA inicial y el LBA final, podemos calcular el tama\u00f1o de la partici\u00f3n. Por ejemplo, la partici\u00f3n EFI:<\/p>\n<p><\/p>\n<p>LBA inicial: 2048<\/p>\n<p><\/p>\n<p>Final LBA: 534527<\/p>\n<p><\/p>\n<p>Longitud total: 532479 sectores x 512 bytes\/sector = 272629248 bytes, lo que equivale a 260 MB.<\/p>\n<p><\/p>\n<figure><img decoding=\"async\" style=\"width: 645px; height: auto;\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-Disk0-Shot.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-Image_Series4-right-background.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<h2 class=\"wp-block-heading\">La matriz de entrada de partici\u00f3n GPT de copia de seguridad<\/h2>\n<p><\/p>\n<p>La matriz de entrada de la partici\u00f3n GPT de respaldo se encuentra al final del disco y antes del encabezado GPT, espec\u00edficamente 33 sectores antes del final del disco (LBA (n - 33) donde n es el \u00faltimo sector del disco). Tambi\u00e9n podemos hacer alg\u00fan c\u00e1lculo de por qu\u00e9 est\u00e1 33 sectores antes del final del disco, o 32 sectores antes del Backup GPT Header.<\/p>\n<p><\/p>\n<p>Cada entrada de partici\u00f3n es de 128 bytes y hay 128 entradas totales en el Entry Array. Esto significa que hay 16.384 sectores en el Array o 32 sectores (16384\/512).\u00a0<\/p>\n<p><\/p>\n<p>El encabezado GPT de copia de seguridad apunta a la ubicaci\u00f3n de la matriz de entrada de partici\u00f3n GPT de copia de seguridad<\/p>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-Figure1.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-HxD3.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<p>Copia de seguridad de la matriz de entrada de partici\u00f3n GPT cerca del final del disco<\/p>\n<p><\/p>\n<h2 class=\"wp-block-heading\">Reparaci\u00f3n de una matriz de entrada de partici\u00f3n GPT<\/h2>\n<p><\/p>\n<p>Reparar la matriz de entrada de particiones GPT es tan sencillo como copiar la copia de seguridad de 16.384 bytes encontrados 33 sectores desde el final del disco y pegarlos en LBA 2 a 3. No hay necesidad de ninguna alteraci\u00f3n\/modificaci\u00f3n de los valores hexadecimales ya que son copias exactas.<\/p>\n<p><\/p>\n<p>El GPT de reserva situado cerca del final del disco es el mismo que el primario. De hecho, si se separan los sectores de cada uno y se les aplica el hash, se comprueba que coinciden exactamente.\u00a0<\/p>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-HxD4-Final-Shot-before-Conclusion.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<h2 class=\"wp-block-heading\">Conclusi\u00f3n<\/h2>\n<p><\/p>\n<p>En esta tercera entrega, hemos examinado a fondo la matriz de entradas de partici\u00f3n GPT, un componente cr\u00edtico del esquema GPT. Desglosando cada campo dentro de las entradas de partici\u00f3n, desde los GUIDs hasta los bits de atributo y los nombres de partici\u00f3n, hemos visto c\u00f3mo GPT proporciona un marco robusto para organizar y acceder a los datos del disco. Este conocimiento es esencial para investigaciones forenses, recuperaci\u00f3n de datos y administraci\u00f3n de sistemas, equip\u00e1ndote con las habilidades para navegar y manipular discos particionados con GPT de forma efectiva. Permanezca atento a nuestro pr\u00f3ximo post, en el que profundizaremos en aplicaciones pr\u00e1cticas y casos de estudio, llevando la teor\u00eda a la pr\u00e1ctica.<\/p>\n<p data-start=\"324\" data-end=\"697\"><strong data-start=\"327\" data-end=\"397\">Este post concluye nuestra serie de 3 partes sobre estructuras de partici\u00f3n GPT.<\/strong><br data-start=\"397\" data-end=\"400\" \/>Si se ha perdido las entradas anteriores, empiece por <a class=\"\" href=\"https:\/\/elusivedata.io\/es\/1-2\/\" target=\"_new\" rel=\"noopener\" data-start=\"446\" data-end=\"508\"><strong data-start=\"447\" data-end=\"478\">Parte 1 - El MBR protector<\/strong><\/a>donde exploramos c\u00f3mo se mantiene la compatibilidad heredada, y continuamos con <a class=\"\" href=\"https:\/\/elusivedata.io\/es\/2-2\/\" target=\"_new\" rel=\"noopener\" data-start=\"585\" data-end=\"643\"><strong data-start=\"586\" data-end=\"613\">Parte 2 - La cabecera GPT<\/strong><\/a>que define la disposici\u00f3n del disco y garantiza su integridad.<\/p>\n<p data-start=\"702\" data-end=\"856\">\u00bfQuiere profundizar m\u00e1s? Suscr\u00edbase a nuestro bolet\u00edn de noticias para recibir contenidos sobre recuperaci\u00f3n de particiones, hashing a nivel de disco y desaf\u00edos CTF basados en escenarios forenses reales.<\/p>\n<p><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Conozca en profundidad la matriz de entrada de particiones GPT y su importancia en el an\u00e1lisis forense digital. Esta gu\u00eda explora las t\u00e9cnicas y conocimientos clave para mejorar sus investigaciones forenses.<\/p>","protected":false},"author":1,"featured_media":580,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[19],"tags":[],"class_list":["post-922","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-forensics"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Navigating the GPT Partition Entry Array for Forensic Analysis. Part 3. - Elusive Data<\/title>\n<meta name=\"description\" content=\"Learn how to navigate the GPT Partition Entry Array during forensic disk analysis. Understanding partition structures helps investigators locate and recover disk-level evidence.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/elusivedata.io\/es\/3-2\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Navigating the GPT Partition Entry Array for Forensic Analysis. Part 3.\" \/>\n<meta property=\"og:description\" content=\"Learn how to navigate the GPT Partition Entry Array during forensic disk analysis. Understanding partition structures helps investigators locate and recover disk-level evidence.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/elusivedata.io\/es\/3-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Elusive Data\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-22T16:07:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-18T18:04:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/HDD3-1-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"James Eichbaum\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"James Eichbaum\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/\"},\"author\":{\"name\":\"James Eichbaum\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#\\\/schema\\\/person\\\/2c00b8313d6aef321fd69bf82e2aa436\"},\"headline\":\"Navigating the GPT Partition Entry Array for Forensic Analysis. Part 3.\",\"datePublished\":\"2024-11-22T16:07:40+00:00\",\"dateModified\":\"2025-07-18T18:04:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/\"},\"wordCount\":919,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/HDD3-1-scaled.jpg\",\"articleSection\":[\"Digital Forensics\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/\",\"url\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/\",\"name\":\"Navigating the GPT Partition Entry Array for Forensic Analysis. Part 3. - Elusive Data\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/HDD3-1-scaled.jpg\",\"datePublished\":\"2024-11-22T16:07:40+00:00\",\"dateModified\":\"2025-07-18T18:04:35+00:00\",\"description\":\"Learn how to navigate the GPT Partition Entry Array during forensic disk analysis. Understanding partition structures helps investigators locate and recover disk-level evidence.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/HDD3-1-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/HDD3-1-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Hard disk drive \u2014 digital forensics evidence storage device analysis\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/elusivedata.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Navigating the GPT Partition Entry Array for Forensic Analysis. Part 3.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#website\",\"url\":\"https:\\\/\\\/elusivedata.io\\\/\",\"name\":\"ElusiveData\",\"description\":\"Excellence in Digital Forensics Training and Consulting\",\"publisher\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/elusivedata.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#organization\",\"name\":\"ElusiveData\",\"url\":\"https:\\\/\\\/elusivedata.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Asset-3_2x-scaled.png\",\"contentUrl\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Asset-3_2x-scaled.png\",\"width\":2560,\"height\":370,\"caption\":\"ElusiveData\"},\"image\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.youtube.com\\\/@elusivedata\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#\\\/schema\\\/person\\\/2c00b8313d6aef321fd69bf82e2aa436\",\"name\":\"James Eichbaum\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/plugins\\\/ld-dashboard\\\/public\\\/img\\\/img_avatar.png\",\"url\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/plugins\\\/ld-dashboard\\\/public\\\/img\\\/img_avatar.png\",\"contentUrl\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/plugins\\\/ld-dashboard\\\/public\\\/img\\\/img_avatar.png\",\"caption\":\"James Eichbaum\"},\"sameAs\":[\"http:\\\/\\\/elusivedata.io\"],\"url\":\"https:\\\/\\\/elusivedata.io\\\/es\\\/author\\\/eichbaumjamesgmail-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Navegaci\u00f3n por la matriz de entrada de particiones GPT para el an\u00e1lisis forense. Parte 3. - Datos Escurridizos","description":"Learn how to navigate the GPT Partition Entry Array during forensic disk analysis. Understanding partition structures helps investigators locate and recover disk-level evidence.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/elusivedata.io\/es\/3-2\/","og_locale":"es_ES","og_type":"article","og_title":"Navigating the GPT Partition Entry Array for Forensic Analysis. Part 3.","og_description":"Learn how to navigate the GPT Partition Entry Array during forensic disk analysis. Understanding partition structures helps investigators locate and recover disk-level evidence.","og_url":"https:\/\/elusivedata.io\/es\/3-2\/","og_site_name":"Elusive Data","article_published_time":"2024-11-22T16:07:40+00:00","article_modified_time":"2025-07-18T18:04:35+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/HDD3-1-scaled.jpg","type":"image\/jpeg"}],"author":"James Eichbaum","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"James Eichbaum","Tiempo de lectura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/elusivedata.io\/3-2\/#article","isPartOf":{"@id":"https:\/\/elusivedata.io\/3-2\/"},"author":{"name":"James Eichbaum","@id":"https:\/\/elusivedata.io\/#\/schema\/person\/2c00b8313d6aef321fd69bf82e2aa436"},"headline":"Navigating the GPT Partition Entry Array for Forensic Analysis. Part 3.","datePublished":"2024-11-22T16:07:40+00:00","dateModified":"2025-07-18T18:04:35+00:00","mainEntityOfPage":{"@id":"https:\/\/elusivedata.io\/3-2\/"},"wordCount":919,"commentCount":1,"publisher":{"@id":"https:\/\/elusivedata.io\/#organization"},"image":{"@id":"https:\/\/elusivedata.io\/3-2\/#primaryimage"},"thumbnailUrl":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/HDD3-1-scaled.jpg","articleSection":["Digital Forensics"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/elusivedata.io\/3-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/elusivedata.io\/3-2\/","url":"https:\/\/elusivedata.io\/3-2\/","name":"Navegaci\u00f3n por la matriz de entrada de particiones GPT para el an\u00e1lisis forense. Parte 3. - Datos Escurridizos","isPartOf":{"@id":"https:\/\/elusivedata.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/elusivedata.io\/3-2\/#primaryimage"},"image":{"@id":"https:\/\/elusivedata.io\/3-2\/#primaryimage"},"thumbnailUrl":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/HDD3-1-scaled.jpg","datePublished":"2024-11-22T16:07:40+00:00","dateModified":"2025-07-18T18:04:35+00:00","description":"Learn how to navigate the GPT Partition Entry Array during forensic disk analysis. Understanding partition structures helps investigators locate and recover disk-level evidence.","breadcrumb":{"@id":"https:\/\/elusivedata.io\/3-2\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/elusivedata.io\/3-2\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/elusivedata.io\/3-2\/#primaryimage","url":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/HDD3-1-scaled.jpg","contentUrl":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/HDD3-1-scaled.jpg","width":2560,"height":1707,"caption":"Hard disk drive \u2014 digital forensics evidence storage device analysis"},{"@type":"BreadcrumbList","@id":"https:\/\/elusivedata.io\/3-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/elusivedata.io\/"},{"@type":"ListItem","position":2,"name":"Navigating the GPT Partition Entry Array for Forensic Analysis. Part 3."}]},{"@type":"WebSite","@id":"https:\/\/elusivedata.io\/#website","url":"https:\/\/elusivedata.io\/","name":"ElusiveData","description":"Excelencia en formaci\u00f3n y consultor\u00eda forense digital","publisher":{"@id":"https:\/\/elusivedata.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/elusivedata.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/elusivedata.io\/#organization","name":"ElusiveData","url":"https:\/\/elusivedata.io\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/elusivedata.io\/#\/schema\/logo\/image\/","url":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Asset-3_2x-scaled.png","contentUrl":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Asset-3_2x-scaled.png","width":2560,"height":370,"caption":"ElusiveData"},"image":{"@id":"https:\/\/elusivedata.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.youtube.com\/@elusivedata"]},{"@type":"Person","@id":"https:\/\/elusivedata.io\/#\/schema\/person\/2c00b8313d6aef321fd69bf82e2aa436","name":"James Eichbaum","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/elusivedata.io\/wp-content\/plugins\/ld-dashboard\/public\/img\/img_avatar.png","url":"https:\/\/elusivedata.io\/wp-content\/plugins\/ld-dashboard\/public\/img\/img_avatar.png","contentUrl":"https:\/\/elusivedata.io\/wp-content\/plugins\/ld-dashboard\/public\/img\/img_avatar.png","caption":"James Eichbaum"},"sameAs":["http:\/\/elusivedata.io"],"url":"https:\/\/elusivedata.io\/es\/author\/eichbaumjamesgmail-com\/"}]}},"_links":{"self":[{"href":"https:\/\/elusivedata.io\/es\/wp-json\/wp\/v2\/posts\/922","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/elusivedata.io\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/elusivedata.io\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/elusivedata.io\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/elusivedata.io\/es\/wp-json\/wp\/v2\/comments?post=922"}],"version-history":[{"count":9,"href":"https:\/\/elusivedata.io\/es\/wp-json\/wp\/v2\/posts\/922\/revisions"}],"predecessor-version":[{"id":7455,"href":"https:\/\/elusivedata.io\/es\/wp-json\/wp\/v2\/posts\/922\/revisions\/7455"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/elusivedata.io\/es\/wp-json\/wp\/v2\/media\/580"}],"wp:attachment":[{"href":"https:\/\/elusivedata.io\/es\/wp-json\/wp\/v2\/media?parent=922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/elusivedata.io\/es\/wp-json\/wp\/v2\/categories?post=922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/elusivedata.io\/es\/wp-json\/wp\/v2\/tags?post=922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}