{"id":920,"date":"2024-11-22T16:06:10","date_gmt":"2024-11-22T16:06:10","guid":{"rendered":"https:\/\/elusivedata.io\/?p=920"},"modified":"2025-07-18T18:04:37","modified_gmt":"2025-07-18T18:04:37","slug":"2-2","status":"publish","type":"post","link":"https:\/\/elusivedata.io\/it\/2-2\/","title":{"rendered":"GPT parte 2. Il ruolo dell'intestazione GPT nell'integrit\u00e0 del disco."},"content":{"rendered":"<h2 class=\"wp-block-heading\" id=\"h-introduction\">Introduzione<\/h2>\n\n\n\n<p>Nella prima parte di questa serie di blog, abbiamo esplorato il Protective MBR e il suo ruolo nel salvaguardare la compatibilit\u00e0 dei moderni dischi partizionati GPT con i sistemi legacy. Abbiamo approfondito il modo in cui il Protective MBR funge da barriera per impedire ai sistemi pi\u00f9 vecchi di interpretare erroneamente i dischi GPT, garantendo cos\u00ec che l'intero disco sia contrassegnato come in uso da GPT. Questa conoscenza di base pone le basi per un'immersione pi\u00f9 profonda nel cuore della tabella di partizione GUID (GPT) stessa: l'intestazione GPT.<\/p>\n\n\n\n<p>In questa seconda parte, esamineremo l'intestazione GPT, un componente cruciale dello schema GPT che fornisce informazioni vitali sulla struttura del disco. Esamineremo ogni campo dell'intestazione GPT, spiegandone il significato e il modo in cui contribuisce alla funzionalit\u00e0 e all'integrit\u00e0 complessiva del disco. Alla fine di questo post, avrete una comprensione completa dell'intestazione GPT, che vi permetter\u00e0 di analizzare e manipolare con sicurezza i dischi partizionati GPT nelle indagini forensi o negli scenari di recupero dei dati.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-gpt-header-overview\">Panoramica dell'intestazione GPT<\/h2>\n\n\n\n<p>L'intestazione GPT (GUID Partition Table) \u00e8 un componente fondamentale del sistema di partizionamento del disco. Divide il disco in sezioni separate, ognuna delle quali pu\u00f2 contenere diversi tipi di dati, come il sistema operativo, i file personali, i dati delle applicazioni o i giochi. Queste sezioni possono essere unit\u00e0 diverse (come l'unit\u00e0 C:, D:, E: e cos\u00ec via).<\/p>\n\n\n\n<p>L'intestazione GPT include una copia di backup alla fine del disco, un po' come avere una chiave di riserva per il catalogo della biblioteca nel caso in cui quella principale venga persa o danneggiata. Questo ci garantisce di poter trovare e accedere ai nostri dati anche se qualcosa va storto.<\/p>\n\n\n\n<p>L'intestazione GPT fornisce la posizione del suo backup e la posizione del GUID Partition Table Entry Array, che \u00e8 un elenco di voci di partizione GPT che indicano dove si trovano le sezioni (partizioni) sul disco.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"742\" height=\"164\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Figure-1.png\" alt=\"\" class=\"wp-image-934\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Figure-1.png 742w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Figure-1-600x133.png 600w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Figure-1-300x66.png 300w\" sizes=\"(max-width: 742px) 100vw, 742px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Figura 1: Layout di un'ipotetica installazione di Windows 10 con un volume (n = ultimo settore dell'unit\u00e0)<\/em><\/p>\n\n\n\n<p>L'intestazione GPT inizia con la sua firma, EFI PART. Il resto dei valori \u00e8 suddiviso nella tabella seguente:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-gpt-header-structure\">Struttura dell'intestazione GPT<\/h2>\n\n\n\n<p>L'intestazione GPT inizia con la sua firma, \"EFI PART.\" Il resto dei valori \u00e8 suddiviso nella tabella seguente:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" width=\"746\" height=\"666\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD1.png\" alt=\"\" class=\"wp-image-936\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD1.png 746w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD1-600x536.png 600w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD1-300x268.png 300w\" sizes=\"(max-width: 746px) 100vw, 746px\" \/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code><\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" width=\"796\" height=\"179\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Table1.png\" alt=\"\" class=\"wp-image-937\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Table1.png 796w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Table1-600x135.png 600w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Table1-300x67.png 300w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Table1-768x173.png 768w\" sizes=\"(max-width: 796px) 100vw, 796px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Fonte: <a href=\"https:\/\/uefi.org\/specs\/UEFI\/2.10\/05_GUID_Partition_Table_Format.html\">https:\/\/uefi.org\/specs\/UEFI\/2.10\/05_GUID_Partition_Table_Format.html<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"743\" height=\"772\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_Series_1-right-background.png\" alt=\"\" class=\"wp-image-939\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_Series_1-right-background.png 743w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_Series_1-right-background-600x623.png 600w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_Series_1-right-background-289x300.png 289w\" sizes=\"(max-width: 743px) 100vw, 743px\" \/><\/figure>\n\n\n\n<p>Finora, i primi 16 byte dell'intestazione GPT rimarranno costanti tra i diversi dischi GPT.<\/p>\n\n\n\n<p>CRC intestazione GPT<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"741\" height=\"400\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_series_2-right-background.png\" alt=\"\" class=\"wp-image-941\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_series_2-right-background.png 741w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_series_2-right-background-600x324.png 600w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_series_2-right-background-300x162.png 300w\" sizes=\"(max-width: 741px) 100vw, 741px\" \/><\/figure>\n\n\n\n<p>Di seguito \u00e8 riportato un esempio di calcolo del CRC32 per l'intestazione GPT:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"765\" height=\"306\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Comparison-Table.png\" alt=\"\" class=\"wp-image-942\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Comparison-Table.png 765w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Comparison-Table-600x240.png 600w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Comparison-Table-300x120.png 300w\" sizes=\"(max-width: 765px) 100vw, 765px\" \/><\/figure>\n\n\n\n<p>\u00c8 possibile utilizzare uno script Python per calcolare il CRC dei byte isolati:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"674\" height=\"468\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Python1.png\" alt=\"\" class=\"wp-image-943\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Python1.png 674w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Python1-600x417.png 600w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Python1-300x208.png 300w\" sizes=\"(max-width: 674px) 100vw, 674px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Lo script Python \u00e8 disponibile all'indirizzo: <a href=\"https:\/\/github.com\/eichbaumj\/Python\">https:\/\/github.com\/eichbaumj\/Python<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"540\" height=\"246\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Python2.png\" alt=\"\" class=\"wp-image-944\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Python2.png 540w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Python2-300x137.png 300w\" sizes=\"(max-width: 540px) 100vw, 540px\" \/><\/figure>\n\n\n\n<p>Lo script Python prender\u00e0 il valore CRC32 risultante e lo convertir\u00e0 nel formato richiesto per l'intestazione GPT. Il valore calcolato, in questo caso, \u00e8 0x1B2C37BC. Ma per memorizzarlo nel campo dell'intestazione GPT, il valore viene letto in formato little endian: 0xBC372C1B.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"745\" height=\"696\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_Series_3-right-background.png\" alt=\"\" class=\"wp-image-946\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_Series_3-right-background.png 745w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_Series_3-right-background-600x561.png 600w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_Series_3-right-background-300x280.png 300w\" sizes=\"(max-width: 745px) 100vw, 745px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-disk-guid\">GUID del disco<\/h3>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"745\" height=\"244\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_series_4-Under-Disk-GUID-header-right-background.png\" alt=\"\" class=\"wp-image-947\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_series_4-Under-Disk-GUID-header-right-background.png 745w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_series_4-Under-Disk-GUID-header-right-background-600x197.png 600w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_series_4-Under-Disk-GUID-header-right-background-300x98.png 300w\" sizes=\"(max-width: 745px) 100vw, 745px\" \/><\/figure>\n\n\n\n<p>La schermata seguente mostra il GUID evidenziato nell'intestazione GPT:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"811\" height=\"474\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD2.png\" alt=\"\" class=\"wp-image-949\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD2.png 811w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD2-600x351.png 600w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD2-300x175.png 300w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD2-768x449.png 768w\" sizes=\"(max-width: 811px) 100vw, 811px\" \/><\/figure>\n\n\n\n<p>Il GUID \u00e8 un valore esadecimale di 16 byte, ma se si pensa di poter copiare i valori e separarli adeguatamente con dei trattini e delle parentesi graffe, ci si sbaglia. Si otterrebbe il valore sbagliato.<\/p>\n\n\n\n<p>Si pu\u00f2 vedere che HxD fornisce la conversione GUID nel Data Inspector a destra. Ma come avviene? Come avviene:<br>55 BA 55 51 2B D8 59 41 BC 1F C4 17 80 0F D7 63<\/p>\n\n\n\n<p>Diventare:<\/p>\n\n\n\n<p>{5155BA55-D82B-4159-BC1F-C417800FD763}<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-the-guid-format\"><em>Il formato GUID<\/em><\/h4>\n\n\n\n<p>XX XX XX | XX XX | XX XX | XX XX | XX XX | XX XX XX XX XX XX XX<\/p>\n\n\n\n<p>55 BA 55 51 | 2B D8 | 59 41 | BC 1F | C4 17 80 0F D7 63<\/p>\n\n\n\n<p>Il primo gruppo di quattro byte viene convertito in esadecimale piccolo-endiano: 51 55 BA 55<\/p>\n\n\n\n<p>Il secondo gruppo di 2 byte viene convertito in esadecimale piccolo-endiano: D8 2B<\/p>\n\n\n\n<p>La terza serie di 2 byte viene convertita in esadecimale piccolo-endiano: 59 41<\/p>\n\n\n\n<p>Le altre due serie di valori esadecimali sono lasciate cos\u00ec come sono, big-endian: BC 1F | C4 17 80 0F D7 63<\/p>\n\n\n\n<p>Una volta completate tutte le conversioni, possiamo metterle insieme, mettendo i trattini dove \u00e8 necessario e racchiudendole tra parentesi graffe:<\/p>\n\n\n\n<p>{5155BA55-D82B-4159-BC1F-C417800FD763}<\/p>\n\n\n\n<p>\u00c8 possibile confermare la corretta codifica del GUID lanciando diskpart dalla riga di comando e verificando l'uniqueid del disco:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"549\" height=\"501\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Terminal1.png\" alt=\"\" class=\"wp-image-950\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Terminal1.png 549w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Terminal1-300x274.png 300w\" sizes=\"(max-width: 549px) 100vw, 549px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"745\" height=\"398\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_series_5-right-background.png\" alt=\"\" class=\"wp-image-951\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_series_5-right-background.png 745w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_series_5-right-background-600x321.png 600w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_series_5-right-background-300x160.png 300w\" sizes=\"(max-width: 745px) 100vw, 745px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-gpt-partition-table-checksum-crc\">Tabella delle partizioni GPT Checksum CRC<\/h3>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"743\" height=\"223\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_Series_6-right-background.png\" alt=\"\" class=\"wp-image-952\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_Series_6-right-background.png 743w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_Series_6-right-background-600x180.png 600w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Image_Series_6-right-background-300x90.png 300w\" sizes=\"(max-width: 743px) 100vw, 743px\" \/><\/figure>\n\n\n\n<p>\u00c8 possibile utilizzare lo stesso script Python, ma sostituendo i valori esadecimali con quelli presenti nella matrice delle voci della partizione.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"565\" height=\"453\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Python3.png\" alt=\"\" class=\"wp-image-953\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Python3.png 565w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Python3-300x241.png 300w\" sizes=\"(max-width: 565px) 100vw, 565px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"564\" height=\"211\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Python4.png\" alt=\"\" class=\"wp-image-954\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Python4.png 564w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Python4-300x112.png 300w\" sizes=\"(max-width: 564px) 100vw, 564px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"568\" height=\"242\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD3.png\" alt=\"\" class=\"wp-image-956\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD3.png 568w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD3-300x128.png 300w\" sizes=\"(max-width: 568px) 100vw, 568px\" \/><\/figure>\n\n\n\n<p>E possiamo vedere che il valore corrisponde a quello trovato nell'intestazione GPT.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-repairing-a-gpt-header\">Riparazione di un'intestazione GPT<\/h2>\n\n\n\n<p>Ok, ora che sappiamo come \u00e8 strutturata l'intestazione GPT e che c'\u00e8 un backup situato nell'ultimo settore del disco, come si fa a riparare l'intestazione GPT nel caso in cui sia danneggiata o cancellata?<\/p>\n\n\n\n<p>Per riparare l'intestazione GPT, copiare gli ultimi 512 byte dalla fine del disco e incollarli nell'LBA 1 (settore #2). \u00c8 necessario apportare alcune modifiche.<\/p>\n\n\n\n<p>Di seguito \u00e8 riportato un esempio dell'aspetto dell'intestazione GPT di backup alla fine di un disco:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"793\" height=\"625\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD4.png\" alt=\"\" class=\"wp-image-957\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD4.png 793w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD4-600x473.png 600w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD4-300x236.png 300w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD4-768x605.png 768w\" sizes=\"(max-width: 793px) 100vw, 793px\" \/><\/figure>\n\n\n\n<p>Si pu\u00f2 notare che alcuni valori rimangono costanti rispetto all'intestazione GPT originale. Queste costanti sono evidenziate in rosso qui sotto:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"747\" height=\"589\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD5.png\" alt=\"\" class=\"wp-image-958\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD5.png 747w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD5-600x473.png 600w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD5-300x237.png 300w\" sizes=\"(max-width: 747px) 100vw, 747px\" \/><\/figure>\n\n\n\n<p>I valori da modificare sono quattro.<\/p>\n\n\n\n<p>Il primo \u00e8 il CRC dell'intestazione GPT, su cui torneremo. Per il momento, questi valori possono essere azzerati, poich\u00e9 per ottenere di nuovo il CRC corretto, dovremo utilizzare quello calcolato dopo aver modificato gli altri valori.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"565\" height=\"224\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD6.png\" alt=\"\" class=\"wp-image-961\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD6.png 565w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD6-300x119.png 300w\" sizes=\"(max-width: 565px) 100vw, 565px\" \/><\/figure>\n\n\n\n<p>Il successivo \u00e8 il valore MyLBA situato all'offset 24 per 4 byte. Questo valore punta alla posizione dell'intestazione GPT (dove si trova attualmente) e la sua posizione attuale \u00e8 LBA 1 o 0x010000000000000.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"580\" height=\"231\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD7.png\" alt=\"\" class=\"wp-image-962\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD7.png 580w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD7-300x119.png 300w\" sizes=\"(max-width: 580px) 100vw, 580px\" \/><\/figure>\n\n\n\n<p>Il valore a 8 byte con offset 32 \u00e8 il valore che indica la posizione dell'intestazione GPT di backup. Attualmente il backup punta all'originale, ma \u00e8 necessario modificare questo valore per rappresentare l'ultimo settore del disco. Questo \u00e8 avvenuto con i valori esadecimali che abbiamo appena modificato nel passaggio precedente. In questo esempio, il valore deve essere modificato in 0xAFD23B7700000000.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"586\" height=\"238\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD8-2.png\" alt=\"\" class=\"wp-image-964\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD8-2.png 586w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD8-2-300x122.png 300w\" sizes=\"(max-width: 586px) 100vw, 586px\" \/><\/figure>\n\n\n\n<p>Il valore di 8 byte situato all'offset 72 deve riflettere la posizione e l'inizio dell'array di voci di partizione GPT. Attualmente, l'intestazione GPT di backup punta al backup di tale array. L'array di partizioni GPT effettivo dovrebbe trovarsi a LBA 2. Questo valore deve essere modificato in 0x0200000000000000.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"605\" height=\"238\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD9-1.png\" alt=\"\" class=\"wp-image-965\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD9-1.png 605w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD9-1-600x236.png 600w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD9-1-300x118.png 300w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/figure>\n\n\n\n<p>Con questi tre valori modificati, \u00e8 il momento di calcolare il valore CRC32.&nbsp;<\/p>\n\n\n\n<p>Il checksum risultante \u00e8:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"184\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Python5-1.png\" alt=\"\" class=\"wp-image-967\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Python5-1.png 624w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Python5-1-600x177.png 600w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-Python5-1-300x88.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Ora possiamo sostituire i valori 0x00000000 all'offset 16 con 0xBC372C1B:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"636\" height=\"431\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD10.png\" alt=\"\" class=\"wp-image-969\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD10.png 636w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD10-600x407.png 600w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HxD10-300x203.png 300w\" sizes=\"(max-width: 636px) 100vw, 636px\" \/><\/figure>\n\n\n\n<p>HxD ha un calcolatore di checksum CRC32 integrato in Analisi -&gt; Checksum. Il valore risultante deve solo essere aggiunto come valore little-endian.<\/p>\n\n\n\n<p>Per curiosit\u00e0, se isoliamo quei 512 byte per l'originale e il backup che abbiamo ripristinato, i valori hash corrispondono effettivamente, indicando che abbiamo riprodotto con successo l'intestazione GPT originale usando il backup.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"672\" height=\"184\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HashCalc.png\" alt=\"\" class=\"wp-image-970\" srcset=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HashCalc.png 672w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HashCalc-600x164.png 600w, https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog2-HashCalc-300x82.png 300w\" sizes=\"(max-width: 672px) 100vw, 672px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\">Conclusione<\/h2>\n\n\n\n<p>La comprensione delle complessit\u00e0 dell'intestazione GPT \u00e8 essenziale per chiunque si occupi di digital forensics, recupero dati o amministrazione di sistema. L'intestazione GPT non solo definisce il layout e la struttura del disco, ma garantisce anche l'integrit\u00e0 dei dati grazie a meccanismi quali le checksum CRC32 e le intestazioni di backup. Imparando a conoscere i dettagli dell'intestazione GPT, sarete meglio attrezzati per risolvere e riparare i problemi del disco, garantendo l'affidabilit\u00e0 e l'accessibilit\u00e0 dei dati critici.<\/p>\n\n\n\n<p>Per continuare questa serie, la prossima attenzione sar\u00e0 rivolta all'array di voci della tabella di partizione GPT. Esploreremo come sono strutturate le voci della partizione e come lavorano di concerto con l'intestazione GPT per mantenere l'organizzazione e l'integrit\u00e0 delle partizioni del disco. Rimanete sintonizzati per una guida completa sull'analisi e la riparazione dell'array di voci della tabella di partizione GPT, che vi permetter\u00e0 di acquisire le conoscenze necessarie per gestire con sicurezza i dischi con partizioni GPT.<\/p>\n\n\n\n<p><strong>Vi siete persi la prima parte?<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/elusivedata.io\/it\/1-2\/\">Iniziare dall'inizio: Capire l'MBR protettivo nei dischi con partizionamento GPT (Parte 1)<\/a> - in cui si spiega come GPT garantisca la retrocompatibilit\u00e0 con i sistemi legacy.<\/p>\n\n\n\n<p><strong>Siete pronti per il prossimo passo?<\/strong><\/p>\n\n\n\n<p>Continua a <a href=\"https:\/\/elusivedata.io\/it\/3-2\/\">Parte 3: Navigazione nella matrice di inserimento delle partizioni GPT<\/a> - dove esploriamo come sono strutturate le voci delle partizioni e come integrano l'intestazione GPT.<\/p>","protected":false},"excerpt":{"rendered":"<p>Esplorate il ruolo vitale dell'intestazione GPT nel mantenimento dell'integrit\u00e0 del disco. Questo articolo fornisce approfondimenti sulla sua struttura, sul suo scopo e sulla sua importanza nelle indagini forensi.<\/p>","protected":false},"author":1,"featured_media":579,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[19],"tags":[],"class_list":["post-920","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-forensics"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>GPT part 2. The Role of the GPT Header in Disk Integrity. - Elusive Data<\/title>\n<meta name=\"description\" content=\"Explore the role of the GPT Header in maintaining disk integrity and enabling forensic analysis. Part 2 of our series on GUID Partition Table structures for digital investigators.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/elusivedata.io\/it\/2-2\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GPT part 2. The Role of the GPT Header in Disk Integrity.\" \/>\n<meta property=\"og:description\" content=\"Explore the role of the GPT Header in maintaining disk integrity and enabling forensic analysis. Part 2 of our series on GUID Partition Table structures for digital investigators.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/elusivedata.io\/it\/2-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Elusive Data\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-22T16:06:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-18T18:04:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/HDD2-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"James Eichbaum\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"James Eichbaum\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/2-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/2-2\\\/\"},\"author\":{\"name\":\"James Eichbaum\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#\\\/schema\\\/person\\\/2c00b8313d6aef321fd69bf82e2aa436\"},\"headline\":\"GPT part 2. The Role of the GPT Header in Disk Integrity.\",\"datePublished\":\"2024-11-22T16:06:10+00:00\",\"dateModified\":\"2025-07-18T18:04:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/2-2\\\/\"},\"wordCount\":1382,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/2-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/HDD2-scaled.jpg\",\"articleSection\":[\"Digital Forensics\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/elusivedata.io\\\/2-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/2-2\\\/\",\"url\":\"https:\\\/\\\/elusivedata.io\\\/2-2\\\/\",\"name\":\"GPT part 2. The Role of the GPT Header in Disk Integrity. - Elusive Data\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/2-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/2-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/HDD2-scaled.jpg\",\"datePublished\":\"2024-11-22T16:06:10+00:00\",\"dateModified\":\"2025-07-18T18:04:37+00:00\",\"description\":\"Explore the role of the GPT Header in maintaining disk integrity and enabling forensic analysis. Part 2 of our series on GUID Partition Table structures for digital investigators.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/2-2\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/elusivedata.io\\\/2-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/2-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/HDD2-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/HDD2-scaled.jpg\",\"width\":2560,\"height\":1920,\"caption\":\"Hard disk drive \u2014 digital forensics evidence storage device analysis\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/2-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/elusivedata.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"GPT part 2. The Role of the GPT Header in Disk Integrity.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#website\",\"url\":\"https:\\\/\\\/elusivedata.io\\\/\",\"name\":\"ElusiveData\",\"description\":\"Excellence in Digital Forensics Training and Consulting\",\"publisher\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/elusivedata.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#organization\",\"name\":\"ElusiveData\",\"url\":\"https:\\\/\\\/elusivedata.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Asset-3_2x-scaled.png\",\"contentUrl\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Asset-3_2x-scaled.png\",\"width\":2560,\"height\":370,\"caption\":\"ElusiveData\"},\"image\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.youtube.com\\\/@elusivedata\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#\\\/schema\\\/person\\\/2c00b8313d6aef321fd69bf82e2aa436\",\"name\":\"James Eichbaum\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/plugins\\\/ld-dashboard\\\/public\\\/img\\\/img_avatar.png\",\"url\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/plugins\\\/ld-dashboard\\\/public\\\/img\\\/img_avatar.png\",\"contentUrl\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/plugins\\\/ld-dashboard\\\/public\\\/img\\\/img_avatar.png\",\"caption\":\"James Eichbaum\"},\"sameAs\":[\"http:\\\/\\\/elusivedata.io\"],\"url\":\"https:\\\/\\\/elusivedata.io\\\/it\\\/author\\\/eichbaumjamesgmail-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"GPT parte 2. Il ruolo dell'intestazione GPT nell'integrit\u00e0 del disco. - Dati sfuggenti","description":"Explore the role of the GPT Header in maintaining disk integrity and enabling forensic analysis. Part 2 of our series on GUID Partition Table structures for digital investigators.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/elusivedata.io\/it\/2-2\/","og_locale":"it_IT","og_type":"article","og_title":"GPT part 2. The Role of the GPT Header in Disk Integrity.","og_description":"Explore the role of the GPT Header in maintaining disk integrity and enabling forensic analysis. Part 2 of our series on GUID Partition Table structures for digital investigators.","og_url":"https:\/\/elusivedata.io\/it\/2-2\/","og_site_name":"Elusive Data","article_published_time":"2024-11-22T16:06:10+00:00","article_modified_time":"2025-07-18T18:04:37+00:00","og_image":[{"width":2560,"height":1920,"url":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/HDD2-scaled.jpg","type":"image\/jpeg"}],"author":"James Eichbaum","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"James Eichbaum","Tempo di lettura stimato":"12 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/elusivedata.io\/2-2\/#article","isPartOf":{"@id":"https:\/\/elusivedata.io\/2-2\/"},"author":{"name":"James Eichbaum","@id":"https:\/\/elusivedata.io\/#\/schema\/person\/2c00b8313d6aef321fd69bf82e2aa436"},"headline":"GPT part 2. The Role of the GPT Header in Disk Integrity.","datePublished":"2024-11-22T16:06:10+00:00","dateModified":"2025-07-18T18:04:37+00:00","mainEntityOfPage":{"@id":"https:\/\/elusivedata.io\/2-2\/"},"wordCount":1382,"commentCount":2,"publisher":{"@id":"https:\/\/elusivedata.io\/#organization"},"image":{"@id":"https:\/\/elusivedata.io\/2-2\/#primaryimage"},"thumbnailUrl":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/HDD2-scaled.jpg","articleSection":["Digital Forensics"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/elusivedata.io\/2-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/elusivedata.io\/2-2\/","url":"https:\/\/elusivedata.io\/2-2\/","name":"GPT parte 2. Il ruolo dell'intestazione GPT nell'integrit\u00e0 del disco. - Dati sfuggenti","isPartOf":{"@id":"https:\/\/elusivedata.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/elusivedata.io\/2-2\/#primaryimage"},"image":{"@id":"https:\/\/elusivedata.io\/2-2\/#primaryimage"},"thumbnailUrl":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/HDD2-scaled.jpg","datePublished":"2024-11-22T16:06:10+00:00","dateModified":"2025-07-18T18:04:37+00:00","description":"Explore the role of the GPT Header in maintaining disk integrity and enabling forensic analysis. Part 2 of our series on GUID Partition Table structures for digital investigators.","breadcrumb":{"@id":"https:\/\/elusivedata.io\/2-2\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/elusivedata.io\/2-2\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/elusivedata.io\/2-2\/#primaryimage","url":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/HDD2-scaled.jpg","contentUrl":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/HDD2-scaled.jpg","width":2560,"height":1920,"caption":"Hard disk drive \u2014 digital forensics evidence storage device analysis"},{"@type":"BreadcrumbList","@id":"https:\/\/elusivedata.io\/2-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/elusivedata.io\/"},{"@type":"ListItem","position":2,"name":"GPT part 2. The Role of the GPT Header in Disk Integrity."}]},{"@type":"WebSite","@id":"https:\/\/elusivedata.io\/#website","url":"https:\/\/elusivedata.io\/","name":"ElusiveData","description":"Eccellenza nella formazione e nella consulenza in materia di Digital Forensics","publisher":{"@id":"https:\/\/elusivedata.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/elusivedata.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/elusivedata.io\/#organization","name":"ElusiveData","url":"https:\/\/elusivedata.io\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/elusivedata.io\/#\/schema\/logo\/image\/","url":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Asset-3_2x-scaled.png","contentUrl":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Asset-3_2x-scaled.png","width":2560,"height":370,"caption":"ElusiveData"},"image":{"@id":"https:\/\/elusivedata.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.youtube.com\/@elusivedata"]},{"@type":"Person","@id":"https:\/\/elusivedata.io\/#\/schema\/person\/2c00b8313d6aef321fd69bf82e2aa436","name":"James Eichbaum","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/elusivedata.io\/wp-content\/plugins\/ld-dashboard\/public\/img\/img_avatar.png","url":"https:\/\/elusivedata.io\/wp-content\/plugins\/ld-dashboard\/public\/img\/img_avatar.png","contentUrl":"https:\/\/elusivedata.io\/wp-content\/plugins\/ld-dashboard\/public\/img\/img_avatar.png","caption":"James Eichbaum"},"sameAs":["http:\/\/elusivedata.io"],"url":"https:\/\/elusivedata.io\/it\/author\/eichbaumjamesgmail-com\/"}]}},"_links":{"self":[{"href":"https:\/\/elusivedata.io\/it\/wp-json\/wp\/v2\/posts\/920","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/elusivedata.io\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/elusivedata.io\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/elusivedata.io\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/elusivedata.io\/it\/wp-json\/wp\/v2\/comments?post=920"}],"version-history":[{"count":11,"href":"https:\/\/elusivedata.io\/it\/wp-json\/wp\/v2\/posts\/920\/revisions"}],"predecessor-version":[{"id":7452,"href":"https:\/\/elusivedata.io\/it\/wp-json\/wp\/v2\/posts\/920\/revisions\/7452"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/elusivedata.io\/it\/wp-json\/wp\/v2\/media\/579"}],"wp:attachment":[{"href":"https:\/\/elusivedata.io\/it\/wp-json\/wp\/v2\/media?parent=920"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/elusivedata.io\/it\/wp-json\/wp\/v2\/categories?post=920"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/elusivedata.io\/it\/wp-json\/wp\/v2\/tags?post=920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}