Assignment 2
AIM : Forensic Duplication Process – Forensic Backup Procedure
Imaging is the process of taking an exact copy of a flash drives and is the very foundation of digital
forensics, data recovery and electronic discovery processing. It takes every single 0 and 1 on one
hard drive and puts it on another
The imaging process, for most tools, takes an exact copy of each sector, starting at the first sector,
Sector 0, then continues until the last sector.
Once a sector is read by the imaging tool it is then written down again onto another media.
Depending on the tool, the settings, and the users requirements, will depend on the storage pattern of
data. It is an easy and convenient to use sector by sector data carver for phone dumps or cell phone
image files. Different Image Format
Hex
DD
Bin
RAW
DMG
XRY
Forensic Acquisition
System Requirements :
Hardware:
Processor: Pentium 4 and above, 1.5 GHz and above.
RAM: 512 MB RAM.
Hard Disk: At least 10 GB HDD.
Monitor: Any size from 15” or above.
Keyboard And Mouse: Any Keyboard and OS supporting pointing device.
Software:
Operating System: Microsoft Windows XP and above, Macintosh.
Software: Access Data FTK Imager ( 3.4.X ), Access Data FTK Imager Lite.
Forensic Imaging :
FTK Imager is a data preview and imaging tool that lets you quickly assess electronic evidence to
determine if further analysis with a forensic tool such as Access Data Forensic Toolkit (FTK) is
warranted. FTK Imager can also create perfect copies (forensic images) of computer data without
making changes to the original evidence. With FTK Imager, you can:
Create forensic images of local hard drives, floppy diskettes, Zip disks, CDs, and DVDs, entire
folders, or individual files from various places within the media.
Preview files and folders on local hard drives, network drives, floppy diskettes, Zip disks, CDs,
and DVDs
Preview the contents of forensic images stored on the local machine or on a network drive
Mount an image for a read-only view that leverages Windows Explorer to see the content of the
image exactly as the user saw it on the original drive
Export files and folders from forensic images.
See and recover files that have been deleted from the Recycle Bin, but have not yet been
overwritten on the drive.
Create hashes of files using either of the two hash functions available in FTK Imager: Message
Digest 5 (MD5) and Secure Hash Algorithm (SHA-1)
FTK Imager / Imager Lite
FTK Imager is a Windows acquisition tool included in various forensics toolkit. Its a free ware,
downloaded directly from the AccessData web site (FTK Imager version 3.1.5.0).
Run FTK Imager.exe to start the tool.
From the File menu, select Create a Disk Image and choose the source of your image. In the interest
of a quick demo, I am going to select a 512MB SD card, but you can select any attached
drive. NOTE: FTK Imager does not guarantee data is not written to the drive, so it is important to use
a write blocker like the Tableau T35es.
Click Add... to add the image destination. Check Verify images after they are created soFTK Imager
will calculate MD5 and SHA1 hashes of the acquired image.
Next, select the image type. The type you choose will usually depend on what tools you plan to use
on the image. The dd format will work with more open source tools, but E01 if you will primarily be
working with EnCase, respectively.
If your version of FTK requests evidence information, you can provide it. If you select raw (dd)
format, the image meta data will not be stored in the image file itself.
Select the Image Destination folder and file
name. You can also set the maximum
fragment size of image split files. Click
Finishto complete the wizard.
Click Start to begin the acquisition:
A progress window will appear. Once the
acquisiton is complete, you can view an image summary and
the drive will appear in the evidence list in the left hand side
of the main FTK Imager window. You can right-click on the
drive name to Verify the Image:
FTK Imager also creates a log of the acquisition process and
places it in the same directory as the image,image-name.txt.
This file lists the evidence information, details of the drive,
check sums, and times the image acquisition started and
finished.