Bios Password

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, March 1, 2009

Partition and Disk Management: Part III – Pesky Dell Partitions

Posted on 3:07 PM by Unknown

Previously posted here at Grand Stream Dreams:

  • Partition and Disk Management: Part I – Dancing with Diskpart

  • Partition and Disk Management: Part II – Free and Useful Tools

In “Part I – Dancing with Diskpart” I was working with some Dell systems and in using GParted noted some strange things with the drives that I hadn’t picked up before in using the CLI DiskPart tool.

Note: these were captured pre “clean all” which would have removed the MBR information as well as zeroed out the drives.

I captured a few screenshots for posterity from two different systems.

First there was this dual-partitioned system.

gparted

And on this other example system…

gparted3

Notice in both that “unallocated” 7.84 MiB space at the front?

Yeah, I did as well.

I also had a third laptop system from Dell that also contained that same leader section of unallocated space, the primary partition space, then an additional trailing section of unallocated space about 1 MiB in size.

What I want to see on our desktop and laptop systems is this before I create a single partition on the drive.

gparted2

Dangerous Space

There are a number of reasons why I don’t like unallocated space.  First and foremost it could be a potential hiding place for sophisticated baddies or data.

While the Hartland processor fallout is still being reviewed and understood, these are great posts to familiarize yourself with the danger of unallocated space on a system.

  • Don’t let what Happened to Heartland Happen to You– Part One – Ascension Blog
  • Don’t let what Happened to Heartland Happen to You - Part Two  – Ascension Blog
  • Heartland Sniffer Hid In Unallocated Portion Of Disk – StorefrontBacktalk Blog

It’s a sophisticated threat but still one that system administrators (and forensics folks) still need to be aware of.  If space is unallocated on a system, stuff can be hidden there.  You need to identify it, assess it, and if not required, remove it.  It’s not the most common threat or hiding-hole, but still, old-school is becoming popular again in threat vectoring.

Also, we are paying for use of the whole drive, and while it is tiny, that space can’t be used by the user/system.  Every bit counts!

Finally, it could conceivably through disk partitioning activity out of whack a bit. So having it all allocated is a good thing.

If someone brings me a (non-whole-disk encrypted) system and I find such unallocated space sitting around, I have a number of techniques to use.

If it is a new system with fast hardware, I will just use GParted to merge the space into the existing partition. Easy and fairly fast.

If it is an older system with slow hardware, I will take an ImageX image of the partition(s) and dump the WIM file to a USB disk.  Then I will do a full DiskPart series of commands to blow out the entire drive settings and re-create a single (or two) partition using all the space on the drive.  Then after formatting, I will restore the image WIM back to the system.

But what about that “unallocated space” on those Dells?

Yes, what about them.

Dell seems to prep its drives with one or both of these spaces.  These really aren’t “unallocated” but specially allocated by Dell for system recovery and diagnostic tool partitions, not normally accessible except from the BIOS.

Here are some posts that might help clear things up with this.

Inside the Dell PC Restore Partition - Dan Goodell’s awesomely detailed exploration and exposition of all things Dell partitions.  Turns out there could be up to three separate and distinct Dell specialized partitions you might encounter.  The first is the Dell Utility partition which contains diagnostic tools accessible from BIOS.  The second could be the “Dell PC Restore by Symantec" utility--colloquially referred to as DSR ("Dell System Restore")” partition.  The third might be the Dell MediaDirect Partition which allows some Dell notebooks to boot for some media-enjoyment routines without needing to bring up the full XP OS system.  Dan has all the information needed to understand and work with all things Dell partition.  It is THE resource on this area.

Delete and Remove to Unlock EISA Hidden Recovery or Diagnostic Partition in Vista - My Digital Life. Being a DiskPart guy, this was good information to know:

  1. Open a command prompt as administrator.
  2. Run Diskpart application by typing Diskpart in the command prompt.
  3. In the “Diskpart” prompt, enter rescan command and press Enter key to re-scan all partitions, volumes and drives available.
  4. Then type in list disk and press Enter key to show all hard disk drive available.
  5. Select the disk that contains the partition you want to remove. Normally, with just 1 hard disk, it will be disk 0. So the command will be:

    select disk 0

    Finish by Enter key.

  6. Type list partition and press Enter key to show all available and created partition in the disk selected.
  7. Select the partition that wanted to be deleted by using the following command, followed by Enter key:

    select partition x

    where x is the number of the EISA based recovery partition to be removed and unlocked its space. Be careful with the number of this partition, as wrong number may get data wipes off.

  8. Finally, type in delete partition override and press Enter key.

Once the partition has been deleted, exit from Diskpart, and now users can use the much familiar and much easier Disk Management tool in Windows (diskmgmt.msc) to manipulate the freed unallocated partition. Users can create a new volume (partition) with this space, or simply merge it to existing partition by extending the size of the existing partition.

Sometimes you will have to use the “override” argument when you delete a partition so it doesn’t error out due to special flagging.

Partitioning problems - [H]ard|Forum – More DiskPart tips and helps.

Guide: How to Delete Hidden Recovery Partition on Vista - Notebook Forums and Laptop Discussion – Picks up and expands the tip offered by “My Digital Life” noted above  Forum threads are usually informative and this one really is.

How to delete Dell Service Partition - UBCD4Win Forums –and  HAL: "ACPI Uniprocessor PC" vs. "Advanced Configuration and Power Interface PC"? - arsTechnica Forum.  Users come to realize they needed to update the boot.ini file after removing a Dell Service Partition as it changed the volumes listed and used by the boot.ini file. Be aware of this.

Dell Utility Partition Restoration – Great Grand Stream Dreams post (IMHO) that explains how to rebuild the Dell Utility Partition if you regret dumping it (not for the feint of heart), as well as just using a Dell Diagnostics boot CD to accomplish the same thing (much better IMHO).

Removing Dell partition - NotebookForums.com – After all this, I come to find out that some Dell systems have a file under the directory Dell\Utilities\DSR on some hard drives called DSRIRRemv2.exe.  Double click on this and then click the OK button to remove the Dell PC Restore partition.  However, despite looking on all our Dell systems, CD’s, and the Googles, I have been unable to find and obtain a copy of this file (or DSR folder) to test and find if it is fast or effective.

Important Considerations

A few things to keep in mind before you start whacking away these Dell partitions.

  1. If you are a PC system noobie or average home user, you probably don’t want to mess with them.  They don’t take up that much drive space and may contain critical files needed to restore your system to an operational state if it hard-crashes and you have to OEM system-restore it.  If key files there are gone and you don’t have your OEM system restore disks, you are out of luck.

  2. Advanced or pc-building enthusiasts are probably sophisticated and knowledgeable enough to strike out on their own and dump these “unallocated” spaces.  Be careful and know what you are doing.

  3. Many other OEM laptop and system builders also seem to use similar partitions and structures as Dell does.  You might want to take a look to see what is there.

  4. As a system administrator, we have a lot more tools, resources, and knowledge at our disposal and having these spaces actually presents more of a problem and issue with security and service of systems than it provides benefit for system recovery and diagnostics.  We want them cleared and gone.  That is probably not a very common scenario for most users.

You have been warned.

Bonus Tip: Taking and Saving a Screenshot in GParted

I’m a screenshot pro.

I’m also pretty good about mounting portable drives in Linux and copying files back and forth.

For some reason this was giving me fits to get those GParted screenshots over to my USB stick.

GPARTED DOCUMENTATION - SAVE_DETAILS – One method

and

GParted forum / Gparted GUI disappears  From “cmdr”

1. Run "GPartedLive CD"
2. Take screenshot of "GParted" window
3. Start "Terminal" (by Desktop icon)
4. Attach USB stick, wait until LED flickered.
5. Type (first parameter is a lowercase L)

fdisk –l

6. Note device name of logical USB drive, e. g. /dev/sda1
7. Type (replace "sda1" with your USB stick's device name !) and confirm one line after the other.

    mkdir /mnt/usb
    mount /dev/sda1 /mnt/usb
    mkdir /mnt/usb/gpdebug
    cp /root/gparted.jpeg /mnt/usb/gpdebug/shot1.jpeg

8. Repeat last line as often as you need, giving the target file (shot1.jpeg) a different name, if you want to take more than one screenshot.
9. Unmounting is not necessary, if you shut down "GParted" afterwards (nothing stays from your session).

Only in my case, every time I tried the copy action it failed, even though the USB stick was seen and I could browse the folder structure just fine.

Turns out my USB stick was NTFS formatted and GParted couldn’t natively mount and read to that disk format using the regular commands.

In my case, I had to just switch over to a FAT32 formatted USB stick and I could copy to my heart’s content.

I doubt most folks use NTFS on their primary USB drives but I need to due to the size of files that I work with, particularly with imaging, as well as it improves copy performance a bit under WinPE boot work.

Cheers.

--Claus V.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in boot-cd's, hardware, Linux, security, troubleshooting, tutorials, utilities | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Finally! Time to Post! New material list
    After a recent text from my bro reminding me it has been since March since I’ve done a blog post, I was finally able to clear the schedule a...
  • Oscar watch Linkpost
    Alvis and Lavie are watching the Oscars tonight and I’m along for the ride. I wasn’t able to come even close to getting out some of the pos...
  • New Year’s Day - First Post 2011
    Same day I came out with my first post after a long drought, I fell upon this article Blogging Seems To Have Peaked, Says Pew Report over a...
  • Utility Gumbo
    There’s a lot in this pot.  Probably something everyone can find to enjoy. I’m serving it up tonight out of the back of the truck on the s...
  • iodd : Multi-boot madness!
    Like many computer technicians and responders, I seem to always have at hand a collection of bootable media; CD’s, DVD’s, USB-HDD’s, flash m...
  • Ubuntu 13.10 Upgrade - Lessons Learned & VIDMA utility found
    A few weeks ago a new release of Ubuntu came out. Naturally that meant it was update time! I have been getting pretty good at this now so ...
  • Interesting Malware in Email Attempt - URL Scanner Links
    Last weekend I spent some time with extended family helping confirm for them that their on-line email account got hacked and had been used t...
  • Windows 8 Linkage: A Bit Behind the Ball
    CC attribution: behind the eight ball by Ed Schipul on flickr . OK. Confession time. I’m more than a bit exhausted this weekend. Besides a...
  • Lego MiniFig Extravaganza
    picture clipped from Wired’s clip from Gizmodo clip… Thanks in no small part to the Windows 7 RC release, XPM mode research, and a big “l...
  • This Week in Security and Forensics: Beware the cake!
    Cube Party! image used with permission from John Walker at "rockpapershotgun.com" Yeah, the cake is a Portal thing.  Let’s d...

Categories

  • Active Directory
  • anti-virus software
  • Apple
  • architecture
  • art
  • AVG
  • Blogger
  • blogging
  • books
  • boot-cd's
  • browsers
  • cars
  • cell-phones
  • cheat sheets
  • Chrome/Chromium
  • command-line interface
  • cooking
  • crafts
  • crazy
  • curmudgeon
  • DHC
  • Dr. Who
  • E-P1
  • Education
  • family
  • Firefox
  • firewalls
  • For the Gentleman
  • forensics
  • Gmail
  • Google
  • graphics
  • hacks
  • hardware
  • humor
  • hurricanes
  • imagex
  • Internet Explorer
  • iOS
  • iPhone
  • iPod
  • iTunes
  • Kindle
  • Learning
  • Link Fest
  • Linux
  • malware tools
  • Microsoft
  • movies
  • music
  • networking
  • NewsFox
  • NFAT
  • Nook
  • Opera
  • organization
  • PDF's
  • photography
  • politics
  • PowerShell
  • recipes
  • Remote Support
  • RSS
  • science
  • Scripting
  • search engines
  • security
  • Shuttle SFF
  • software
  • Texana
  • Thunderbird
  • troubleshooting
  • TrueCrypt
  • tutorials
  • utilities
  • VBscript
  • video
  • Virtual PC
  • virtualization
  • viruses
  • Vista
  • Vista mods
  • wallpapers
  • Win FE
  • Win PE
  • Win RE
  • Windows 7
  • Windows 8
  • Windows Home Server
  • Windows Live Writer
  • Windows Phone
  • writing
  • XP
  • XP mods
  • Xplico

Blog Archive

  • ►  2013 (83)
    • ►  November (8)
    • ►  October (8)
    • ►  September (14)
    • ►  August (6)
    • ►  July (10)
    • ►  June (10)
    • ►  April (11)
    • ►  March (6)
    • ►  February (7)
    • ►  January (3)
  • ►  2012 (96)
    • ►  December (8)
    • ►  November (4)
    • ►  October (9)
    • ►  September (8)
    • ►  August (12)
    • ►  July (4)
    • ►  June (3)
    • ►  May (7)
    • ►  April (13)
    • ►  March (3)
    • ►  February (5)
    • ►  January (20)
  • ►  2011 (41)
    • ►  December (8)
    • ►  November (7)
    • ►  September (4)
    • ►  August (4)
    • ►  July (2)
    • ►  June (6)
    • ►  March (5)
    • ►  February (1)
    • ►  January (4)
  • ►  2010 (69)
    • ►  December (1)
    • ►  October (3)
    • ►  September (2)
    • ►  August (13)
    • ►  July (17)
    • ►  June (3)
    • ►  May (3)
    • ►  April (3)
    • ►  March (11)
    • ►  February (1)
    • ►  January (12)
  • ▼  2009 (177)
    • ►  December (20)
    • ►  November (11)
    • ►  October (7)
    • ►  September (7)
    • ►  August (21)
    • ►  July (17)
    • ►  June (7)
    • ►  May (18)
    • ►  April (9)
    • ▼  March (17)
      • IT Phone Home: PC Auditing to Go
      • Windows FE “Live CD” Posts Followup
      • Blocking IE 8 "InPrivate" Mode – Updated
      • A “Suddenly it’s Sunday” Linkfest
      • Windows FE: Forensically Sound?
      • GSD How To: Dual Boot Windows 7 on Vista via VHD file
      • Custom WinPE Building: Post-Script and PE 3.0
      • GSD’s Weekly Briefs…the clean ones
      • WIM tool enhancements and Fiddling with VHD’s
      • Last Gasp Linkpost: Security/Forensics, Microsoft,...
      • File and Registry Change Watchers
      • System Stress Testing Suites
      • Partition and Disk Management: Part V – HDD Sector...
      • Partition and Disk Management: Part IV – Secure Wi...
      • Partition and Disk Management: Part III – Pesky De...
      • Partition and Disk Management: Part II – Free and ...
      • Partition and Disk Management: Part I – Dancing wi...
    • ►  February (23)
    • ►  January (20)
  • ►  2008 (35)
    • ►  December (23)
    • ►  November (12)
Powered by Blogger.

About Me

Unknown
View my complete profile