{"id":922,"date":"2024-11-22T16:07:40","date_gmt":"2024-11-22T16:07:40","guid":{"rendered":"https:\/\/elusivedata.io\/?p=922"},"modified":"2025-07-18T18:04:35","modified_gmt":"2025-07-18T18:04:35","slug":"3-2","status":"publish","type":"post","link":"https:\/\/elusivedata.io\/nb\/3-2\/","title":{"rendered":"Navigere i GPT-partisjonsoppf\u00f8ringsmatrisen for kriminalteknisk analyse. Del 3."},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"922\" class=\"elementor elementor-922\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c34a31 e-flex e-con-boxed e-con e-parent\" data-id=\"3c34a31\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-651d9f61 elementor-widget elementor-widget-text-editor\" data-id=\"651d9f61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<h1 class=\"wp-block-heading\">Del 3<\/h1>\n<p><\/p>\n<h2 class=\"wp-block-heading\">Innledning<\/h2>\n<p><\/p>\n<p>I de foreg\u00e5ende innleggene har vi lagt grunnlaget for \u00e5 forst\u00e5 GUID-partisjonstabellen (GPT) ved \u00e5 se n\u00e6rmere p\u00e5 den beskyttende MBR-en og GPT-overskriften. N\u00e5, i del 3, retter vi fokus mot GPT Partition Entry Array. Denne viktige komponenten i GPT-skjemaet gir et detaljert kart over alle partisjonene p\u00e5 disken, og hver oppf\u00f8ring inneholder viktig informasjon om en bestemt partisjon. Ved \u00e5 forst\u00e5 strukturen og funksjonen til GPT Partition Entry Array f\u00e5r du en omfattende oversikt over hvordan GPT h\u00e5ndterer partisjoner, noe som muliggj\u00f8r mer effektiv analyse, feils\u00f8king og datagjenoppretting.<\/p>\n<p><\/p>\n<h2 class=\"wp-block-heading\">GPT (GUID-partisjonstabell) Partisjonsoppf\u00f8ringsmatrise<\/h2>\n<p><\/p>\n<p>GUID Partition Table (GPT) Entry Array er en viktig del av GPT-partisjoneringssystemet, som brukes til \u00e5 definere og administrere partisjonene p\u00e5 en harddisk. Tenk p\u00e5 det som en detaljert liste som registrerer detaljene for hver partisjon p\u00e5 disken, p\u00e5 samme m\u00e5te som en bibliotekskatalog som viser detaljene for hver bok.<\/p>\n<p><\/p>\n<h3 class=\"wp-block-heading\">N\u00f8kkelkomponenter i GPT-oppf\u00f8ringsmatrisen:<\/h3>\n<p><\/p>\n<p><strong>Partisjon GUID<\/strong>: Hver partisjon har en unik identifikator, kjent som Partition GUID, som sikrer at hver partisjon kan identifiseres entydig, selv p\u00e5 tvers av ulike systemer.<\/p>\n<p><\/p>\n<p><strong>Unik ID<\/strong>: Dette er en annen unik identifikator som er spesifikk for hver partisjon, og som gir et ekstra lag med unik identifikasjon.<\/p>\n<p><\/p>\n<p><strong>Start LBA (logisk blokkadressering) for partisjonen<\/strong>: Dette angir startpunktet for partisjonen p\u00e5 disken. Den forteller systemet hvor partisjonen begynner.<\/p>\n<p><\/p>\n<p><strong>Slutt p\u00e5 LBA for partisjon<\/strong>: I likhet med start-LBA angir denne hvor partisjonen slutter p\u00e5 disken.<\/p>\n<p><\/p>\n<p><strong>Attributtbiter<\/strong>: Dette er flagg som gir tilleggsinformasjon om partisjonen, for eksempel om den er oppstartbar eller om den har spesielle attributter.<\/p>\n<p><\/p>\n<p><strong>Navn p\u00e5 partisjon<\/strong>: Hver partisjon kan ha et navn som kan leses av mennesker, slik at det blir lettere for oss \u00e5 identifisere form\u00e5let med eller innholdet i partisjonen. Navnet avsluttes med et null-tegn for \u00e5 markere slutten p\u00e5 strengen.<\/p>\n<p><\/p>\n<p>La oss g\u00e5 n\u00e6rmere inn p\u00e5 alle disse, slik at du forst\u00e5r hver enkelt oppf\u00f8ring i matrisen.<\/p>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-HxD1.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-Table1.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<p>N\u00e5r disken er konfigurert som en GPT-disk, er den f\u00f8rste partisjonen som opprettes, EFI-systempartisjonen (ESP). Dette er en skjult partisjon som ikke er lett tilgjengelig for brukerne. Denne partisjonen finnes i sektor 2048 og er formatert som FAT32 for \u00e5 v\u00e6re kompatibel med alle systemer (Windows, Linux, MacOS).<\/p>\n<p><\/p>\n<p>Skjermbildet ovenfor viser en standard Windows 10-installasjon der Microsoft Reserved Partition ble opprettet sammen med en Basic Data Partition som ble spesifisert av brukeren under installasjonen.<\/p>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-Image_Series1.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<p>Nedenfor er et utdrag av GUID-er fra en tabell som finnes p\u00e5 Wikipedia-siden GUID Partition Table:<\/p>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-Wiki-Page.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<p>Kilde: <a href=\"https:\/\/en.wikipedia.org\/wiki\/GUID_Partition_Table#Partition_type_GUIDs\">https:\/\/en.wikipedia.org\/wiki\/GUID_Partition_Table#Partition_type_GUIDs<\/a><\/p>\n<p><\/p>\n<p>GUID-en vil selvf\u00f8lgelig ikke bli lagret i GUIID-skjemaet n\u00e5r du viser verdiene i Hex Viewer.\u00a0<\/p>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-Image_Series2.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<p>GUID-ene konverteres p\u00e5 samme m\u00e5te som vi gjorde i forrige blogginnlegg, men kan ogs\u00e5 enkelt sees n\u00e5r du ser det i HxD:<\/p>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-HxD2.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<p>Vi kan bekrefte GUID-ene til volumpartisjonen med kommandoen: mountvol.exe<\/p>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-CommandWindow.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-Image_Series3-right-background.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<p>N\u00e5r vi kjenner start-LBA og slutt-LBA, kan vi beregne hvor stor partisjonen er. For eksempel EFI-partisjonen:<\/p>\n<p><\/p>\n<p>Start LBA: 2048<\/p>\n<p><\/p>\n<p>Slutt p\u00e5 LBA: 534527<\/p>\n<p><\/p>\n<p>Total lengde: 532479 sektorer x 512 byte\/sektor = 272629248 byte, som er 260 MB.<\/p>\n<p><\/p>\n<figure><img decoding=\"async\" style=\"width: 645px; height: auto;\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-Disk0-Shot.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-Image_Series4-right-background.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<h2 class=\"wp-block-heading\">Sikkerhetskopiering av GPT-partisjonoppf\u00f8ring<\/h2>\n<p><\/p>\n<p>Backup GPT Partition Entry Array er plassert p\u00e5 slutten av disken og f\u00f8r GPT Header, n\u00e6rmere bestemt 33 sektorer f\u00f8r slutten av disken (LBA (n - 33) der n er den siste sektoren p\u00e5 disken). Vi kan ogs\u00e5 regne litt p\u00e5 hvorfor det er 33 sektorer f\u00f8r slutten av disken, eller 32 sektorer f\u00f8r Backup GPT Header.<\/p>\n<p><\/p>\n<p>Hver partisjonspost er p\u00e5 128 byte, og det er 128 oppf\u00f8ringer totalt i Entry Array. Det betyr at det er 16 384 sektorer i matrisen, eller 32 sektorer (16384\/512).\u00a0<\/p>\n<p><\/p>\n<p>Backup GPT Header peker til plasseringen av Backup GPT Partition Entry Array<\/p>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-Figure1.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-HxD3.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<p>Sikkerhetskopiering av GPT-partisjonoppf\u00f8ring n\u00e6r slutten av disken<\/p>\n<p><\/p>\n<h2 class=\"wp-block-heading\">Reparere et GPT-partisjonsoppf\u00f8ringsomr\u00e5de<\/h2>\n<p><\/p>\n<p>Reparasjon av GPT Partition Entry Array er s\u00e5 enkelt som \u00e5 kopiere den 16 384 byte store sikkerhetskopien som ble funnet i 33 sektorer fra slutten av disken, og lime dem inn i LBA 2 til 3. Det er ikke n\u00f8dvendig \u00e5 endre\/modifisere hex-verdiene, siden dette er n\u00f8yaktige kopier.<\/p>\n<p><\/p>\n<p>Backup-GPT-en som ligger n\u00e6r enden av disken, er den samme som den prim\u00e6re. Faktisk viser utskj\u00e6ring av sektorene for hver av dem og hashing av dem at de er n\u00f8yaktig like.\u00a0<\/p>\n<p><\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Blog3-HxD4-Final-Shot-before-Conclusion.png\" alt=\"\" \/><\/figure>\n<p><\/p>\n<h2 class=\"wp-block-heading\">Konklusjon<\/h2>\n<p><\/p>\n<p>I denne tredje delen har vi g\u00e5tt grundig gjennom GPT Partition Entry Array, en kritisk komponent i GPT-skjemaet. Ved \u00e5 bryte ned hvert felt i partisjonspostene, fra GUID-ene til attributtbitene og partisjonsnavnene, har vi sett hvordan GPT gir et robust rammeverk for organisering av og tilgang til diskdata. Denne kunnskapen er viktig for kriminaltekniske unders\u00f8kelser, datagjenoppretting og systemadministrasjon, og gir deg ferdighetene du trenger for \u00e5 navigere og manipulere GPT-partisjonerte disker p\u00e5 en effektiv m\u00e5te. F\u00f8lg med p\u00e5 neste innlegg, der vi g\u00e5r n\u00e6rmere inn p\u00e5 praktiske anvendelser og casestudier, slik at du kan omsette teori til praksis.<\/p>\n<p data-start=\"324\" data-end=\"697\"><strong data-start=\"327\" data-end=\"397\">Dette innlegget avslutter v\u00e5r serie i tre deler om GPT-partisjonsstrukturer.<\/strong><br data-start=\"397\" data-end=\"400\" \/>Hvis du har g\u00e5tt glipp av de tidligere innleggene, kan du starte med <a class=\"\" href=\"https:\/\/elusivedata.io\/nb\/1-2\/\" target=\"_new\" rel=\"noopener\" data-start=\"446\" data-end=\"508\"><strong data-start=\"447\" data-end=\"478\">Del 1 - Den beskyttende MBR-en<\/strong><\/a>hvor vi unders\u00f8ker hvordan kompatibilitet med eldre systemer opprettholdes, og fortsetter med <a class=\"\" href=\"https:\/\/elusivedata.io\/nb\/2-2\/\" target=\"_new\" rel=\"noopener\" data-start=\"585\" data-end=\"643\"><strong data-start=\"586\" data-end=\"613\">Del 2 - GPT-overskriften<\/strong><\/a>som definerer disklayouten og sikrer integriteten.<\/p>\n<p data-start=\"702\" data-end=\"856\">Vil du g\u00e5 dypere? Abonner p\u00e5 nyhetsbrevet v\u00e5rt for \u00e5 f\u00e5 kommende innhold om partisjonsgjenoppretting, hashing p\u00e5 diskniv\u00e5 og CTF-utfordringer basert p\u00e5 virkelige kriminaltekniske scenarier.<\/p>\n<p><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>F\u00e5 en dypere forst\u00e5else av GPT Partition Entry Array og dets betydning i digital kriminalteknisk analyse. Denne veiledningen tar for seg viktige teknikker og innsikt som kan forbedre de kriminaltekniske unders\u00f8kelsene dine.<\/p>","protected":false},"author":1,"featured_media":580,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[19],"tags":[],"class_list":["post-922","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-forensics"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Navigating the GPT Partition Entry Array for Forensic Analysis. Part 3. - Elusive Data<\/title>\n<meta name=\"description\" content=\"Learn how to navigate the GPT Partition Entry Array during forensic disk analysis. Understanding partition structures helps investigators locate and recover disk-level evidence.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/elusivedata.io\/nb\/3-2\/\" \/>\n<meta property=\"og:locale\" content=\"nb_NO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Navigating the GPT Partition Entry Array for Forensic Analysis. Part 3.\" \/>\n<meta property=\"og:description\" content=\"Learn how to navigate the GPT Partition Entry Array during forensic disk analysis. Understanding partition structures helps investigators locate and recover disk-level evidence.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/elusivedata.io\/nb\/3-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Elusive Data\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-22T16:07:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-18T18:04:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/HDD3-1-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"James Eichbaum\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet av\" \/>\n\t<meta name=\"twitter:data1\" content=\"James Eichbaum\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ansl. lesetid\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/\"},\"author\":{\"name\":\"James Eichbaum\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#\\\/schema\\\/person\\\/2c00b8313d6aef321fd69bf82e2aa436\"},\"headline\":\"Navigating the GPT Partition Entry Array for Forensic Analysis. Part 3.\",\"datePublished\":\"2024-11-22T16:07:40+00:00\",\"dateModified\":\"2025-07-18T18:04:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/\"},\"wordCount\":919,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/HDD3-1-scaled.jpg\",\"articleSection\":[\"Digital Forensics\"],\"inLanguage\":\"nb-NO\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/\",\"url\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/\",\"name\":\"Navigating the GPT Partition Entry Array for Forensic Analysis. Part 3. - Elusive Data\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/HDD3-1-scaled.jpg\",\"datePublished\":\"2024-11-22T16:07:40+00:00\",\"dateModified\":\"2025-07-18T18:04:35+00:00\",\"description\":\"Learn how to navigate the GPT Partition Entry Array during forensic disk analysis. Understanding partition structures helps investigators locate and recover disk-level evidence.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/#breadcrumb\"},\"inLanguage\":\"nb-NO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nb-NO\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/HDD3-1-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/HDD3-1-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Hard disk drive \u2014 digital forensics evidence storage device analysis\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/3-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/elusivedata.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Navigating the GPT Partition Entry Array for Forensic Analysis. Part 3.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#website\",\"url\":\"https:\\\/\\\/elusivedata.io\\\/\",\"name\":\"ElusiveData\",\"description\":\"Excellence in Digital Forensics Training and Consulting\",\"publisher\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/elusivedata.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nb-NO\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#organization\",\"name\":\"ElusiveData\",\"url\":\"https:\\\/\\\/elusivedata.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nb-NO\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Asset-3_2x-scaled.png\",\"contentUrl\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Asset-3_2x-scaled.png\",\"width\":2560,\"height\":370,\"caption\":\"ElusiveData\"},\"image\":{\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.youtube.com\\\/@elusivedata\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/#\\\/schema\\\/person\\\/2c00b8313d6aef321fd69bf82e2aa436\",\"name\":\"James Eichbaum\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nb-NO\",\"@id\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/plugins\\\/ld-dashboard\\\/public\\\/img\\\/img_avatar.png\",\"url\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/plugins\\\/ld-dashboard\\\/public\\\/img\\\/img_avatar.png\",\"contentUrl\":\"https:\\\/\\\/elusivedata.io\\\/wp-content\\\/plugins\\\/ld-dashboard\\\/public\\\/img\\\/img_avatar.png\",\"caption\":\"James Eichbaum\"},\"sameAs\":[\"http:\\\/\\\/elusivedata.io\"],\"url\":\"https:\\\/\\\/elusivedata.io\\\/nb\\\/author\\\/eichbaumjamesgmail-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Navigere i GPT-partisjonsoppf\u00f8ringsmatrisen for kriminalteknisk analyse. Del 3. - Unnvikende data","description":"Learn how to navigate the GPT Partition Entry Array during forensic disk analysis. Understanding partition structures helps investigators locate and recover disk-level evidence.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/elusivedata.io\/nb\/3-2\/","og_locale":"nb_NO","og_type":"article","og_title":"Navigating the GPT Partition Entry Array for Forensic Analysis. Part 3.","og_description":"Learn how to navigate the GPT Partition Entry Array during forensic disk analysis. Understanding partition structures helps investigators locate and recover disk-level evidence.","og_url":"https:\/\/elusivedata.io\/nb\/3-2\/","og_site_name":"Elusive Data","article_published_time":"2024-11-22T16:07:40+00:00","article_modified_time":"2025-07-18T18:04:35+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/HDD3-1-scaled.jpg","type":"image\/jpeg"}],"author":"James Eichbaum","twitter_card":"summary_large_image","twitter_misc":{"Skrevet av":"James Eichbaum","Ansl. lesetid":"7 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/elusivedata.io\/3-2\/#article","isPartOf":{"@id":"https:\/\/elusivedata.io\/3-2\/"},"author":{"name":"James Eichbaum","@id":"https:\/\/elusivedata.io\/#\/schema\/person\/2c00b8313d6aef321fd69bf82e2aa436"},"headline":"Navigating the GPT Partition Entry Array for Forensic Analysis. Part 3.","datePublished":"2024-11-22T16:07:40+00:00","dateModified":"2025-07-18T18:04:35+00:00","mainEntityOfPage":{"@id":"https:\/\/elusivedata.io\/3-2\/"},"wordCount":919,"commentCount":1,"publisher":{"@id":"https:\/\/elusivedata.io\/#organization"},"image":{"@id":"https:\/\/elusivedata.io\/3-2\/#primaryimage"},"thumbnailUrl":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/HDD3-1-scaled.jpg","articleSection":["Digital Forensics"],"inLanguage":"nb-NO","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/elusivedata.io\/3-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/elusivedata.io\/3-2\/","url":"https:\/\/elusivedata.io\/3-2\/","name":"Navigere i GPT-partisjonsoppf\u00f8ringsmatrisen for kriminalteknisk analyse. Del 3. - Unnvikende data","isPartOf":{"@id":"https:\/\/elusivedata.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/elusivedata.io\/3-2\/#primaryimage"},"image":{"@id":"https:\/\/elusivedata.io\/3-2\/#primaryimage"},"thumbnailUrl":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/HDD3-1-scaled.jpg","datePublished":"2024-11-22T16:07:40+00:00","dateModified":"2025-07-18T18:04:35+00:00","description":"Learn how to navigate the GPT Partition Entry Array during forensic disk analysis. Understanding partition structures helps investigators locate and recover disk-level evidence.","breadcrumb":{"@id":"https:\/\/elusivedata.io\/3-2\/#breadcrumb"},"inLanguage":"nb-NO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/elusivedata.io\/3-2\/"]}]},{"@type":"ImageObject","inLanguage":"nb-NO","@id":"https:\/\/elusivedata.io\/3-2\/#primaryimage","url":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/HDD3-1-scaled.jpg","contentUrl":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/HDD3-1-scaled.jpg","width":2560,"height":1707,"caption":"Hard disk drive \u2014 digital forensics evidence storage device analysis"},{"@type":"BreadcrumbList","@id":"https:\/\/elusivedata.io\/3-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/elusivedata.io\/"},{"@type":"ListItem","position":2,"name":"Navigating the GPT Partition Entry Array for Forensic Analysis. Part 3."}]},{"@type":"WebSite","@id":"https:\/\/elusivedata.io\/#website","url":"https:\/\/elusivedata.io\/","name":"ElusiveData","description":"Fremragende oppl\u00e6ring og r\u00e5dgivning innen digital etterforskning","publisher":{"@id":"https:\/\/elusivedata.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/elusivedata.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nb-NO"},{"@type":"Organization","@id":"https:\/\/elusivedata.io\/#organization","name":"ElusiveData","url":"https:\/\/elusivedata.io\/","logo":{"@type":"ImageObject","inLanguage":"nb-NO","@id":"https:\/\/elusivedata.io\/#\/schema\/logo\/image\/","url":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Asset-3_2x-scaled.png","contentUrl":"https:\/\/elusivedata.io\/wp-content\/uploads\/2024\/11\/Asset-3_2x-scaled.png","width":2560,"height":370,"caption":"ElusiveData"},"image":{"@id":"https:\/\/elusivedata.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.youtube.com\/@elusivedata"]},{"@type":"Person","@id":"https:\/\/elusivedata.io\/#\/schema\/person\/2c00b8313d6aef321fd69bf82e2aa436","name":"James Eichbaum","image":{"@type":"ImageObject","inLanguage":"nb-NO","@id":"https:\/\/elusivedata.io\/wp-content\/plugins\/ld-dashboard\/public\/img\/img_avatar.png","url":"https:\/\/elusivedata.io\/wp-content\/plugins\/ld-dashboard\/public\/img\/img_avatar.png","contentUrl":"https:\/\/elusivedata.io\/wp-content\/plugins\/ld-dashboard\/public\/img\/img_avatar.png","caption":"James Eichbaum"},"sameAs":["http:\/\/elusivedata.io"],"url":"https:\/\/elusivedata.io\/nb\/author\/eichbaumjamesgmail-com\/"}]}},"_links":{"self":[{"href":"https:\/\/elusivedata.io\/nb\/wp-json\/wp\/v2\/posts\/922","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/elusivedata.io\/nb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/elusivedata.io\/nb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/elusivedata.io\/nb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/elusivedata.io\/nb\/wp-json\/wp\/v2\/comments?post=922"}],"version-history":[{"count":9,"href":"https:\/\/elusivedata.io\/nb\/wp-json\/wp\/v2\/posts\/922\/revisions"}],"predecessor-version":[{"id":7455,"href":"https:\/\/elusivedata.io\/nb\/wp-json\/wp\/v2\/posts\/922\/revisions\/7455"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/elusivedata.io\/nb\/wp-json\/wp\/v2\/media\/580"}],"wp:attachment":[{"href":"https:\/\/elusivedata.io\/nb\/wp-json\/wp\/v2\/media?parent=922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/elusivedata.io\/nb\/wp-json\/wp\/v2\/categories?post=922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/elusivedata.io\/nb\/wp-json\/wp\/v2\/tags?post=922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}