+ All Categories
Home > Technology > Capturing forensics image

Capturing forensics image

Date post: 12-Jan-2015
Category:
Upload: chris-harrington
View: 103 times
Download: 1 times
Share this document with a friend
Description:
Guide on forensic image captures. Two tools are shown here, dd and FTK Imager.
11
Capturing forensics image Data acquisition for forensics investigation User guide By Chris Harrington
Transcript
Page 1: Capturing forensics image

Capturing forensics image

Data acquisition for forensics investigationUser guide

By Chris Harrington

Page 2: Capturing forensics image

Linux or Windows OS Hard drive larger than the one being

captured◦ Hard drive must be forensically wiped so no old

data can be found from previous cases Windows Applications

◦ FTK Imager Linux Applications

◦ dd

Note: There are other capturing tools available

Requirements

Page 3: Capturing forensics image

Conduct a forensic wipe on the external drive before capturing

In Windows OS many tools exist FreeShred Shred Etc…

In Linux dd is used to write 0’s to all sectors◦ Command:dd if=/dev/zero of=/dev/sdX bs=4K conv=noerror,sync

Forensic wipe

Page 4: Capturing forensics image

Run FTK Imager and create a disk image

Windows capture

Page 5: Capturing forensics image

Check that Physical Drive is selected for source and the correct physical drive

Click Add in Create Image window

Creating the image

Page 6: Capturing forensics image

Raw dd format is accepted by so many tools for further processing. Enter evidence information and saving location.

Image fragment size will split the image file into smaller sizes

Finalizing creation

Page 7: Capturing forensics image

It can take time for the image to finish writing depending on the size of the disk

A log file is produced with md5 & sha1 checksums and other drive details

Notes

Page 8: Capturing forensics image

Start up the suspect’s computer and boot up with a Linux live CD. The live CD should avoid writing to local drives. Many options available:◦ Knoppix◦ Kali◦ Deft◦ Etc…

Linux capture

Page 9: Capturing forensics image

Start capturing Open a terminal Command:dd if=/dev/sdX of=yourimage.img bs=512

If drive is unknown, fdisk –l command will show connected devices

Create checksum hash

Page 10: Capturing forensics image

Multiple OS available to capture images for different scenarios

Toolkits Backup toolkits Document every move taken Avoid changes to suspect’s data Is a forensic capture really necessary for

this scenario?

Notes

Page 11: Capturing forensics image

My contact details

[email protected]

Questions?


Recommended