Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
84 views

Data Dump (DD) To Create A Forensic Image With Linux

data

Uploaded by

uilig
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views

Data Dump (DD) To Create A Forensic Image With Linux

data

Uploaded by

uilig
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

8/17/2019 Data Dump(dd) to Create a Forensic Image with Linux

Home Diary’s Services Professional Contact Linkedin About

Data Dump(dd) to Create a Forensic Image with Linux

Data Dump(dd) to Create a Forensic Your IP/System Info


Image with Linux    Your IP is 190.148.209.88

There are a few Linux distributions designed speci cally for Country is Guatemala
digital forensics. These avors contain examiner tools, and are
con gured not to mount (or mount as read only) a connected Region is Departamento de
storage media. The Data Dump(dd) command is available on all Guatemala
Linux distributions and is able to read and write to an unmounted City is Guatemala City
drive because it is not bound by a logical le system. The dd
Browser is Chrome
command captures all les, slack space, and unallocated
data. Windows automatically mounts connected storage devices System is Windows 10
so a write-blocking hardware device must be used. The problem
Powered by Find-IP.net
with this is le meta-data can be altered when a drive is mounted,
changing potential important evidence.

On a device where the hard drive is not easily accessible, if you Featured Technotopics
can boot the device from a Linux Live ISO CD/USB, you can use
the dd command to perform an acquisition. It is important to Emotet Malware PowerShell
mention that your target drive needs to be of equal or greater Obfuscation & Evasion Review
size than the drive you are imaging. Take advantage of USB 3.0 Reverse Engineering A
speeds when possible. DOSFuscated Document

Emotet Malware Delivery BotnetPrivacidad - Condiciones

vcodispot.com/index.php/forensics/data-dump-dd-create-forensic-image-linux/ 1/3
8/17/2019 Data Dump(dd) to Create a Forensic Image with Linux

These Linux Distributions are Forensics Malicious PHP Upload Attempts


friendly: Exploits in the Wild 8/12/2018

Penguins Sleuth Maltego Disinformation Campaigns


F.I.R.E
CAINE Accessing Windows Workstations
Deft (Updated 6/4/2018)
Kali
Snort .VS. Suricata

In a terminal window type: dd if=/dev/sda of=capture.img Data Dump(dd) to Create a Forensic


conv=noerror, sync Image with Linux

Extract GPS Coordinates from


* Where /dev/sda is the drive you are acquiring the image of and
capture.img is the chosen name and extension of the acquisition Digital Photos
le. The conv=noerror, sync switch ensures dd will not skip over
any sectors and will be an exact copy. Also, when I do this I prefer
to be in the directory of where the image le will be stored. In the
CNET Tech Industry:
following example I used dd to make an acquisition of my swap News
le.
Tips and tricks for using Gmail video

Apple to ght $14 billion tax battle


in European court next month
Data Dump(dd)
Memo criticizes Google over
diversity, 'burden' of being a black
*If you only need to acquire an image of one partion on the drive
employee
then specify the partition number with the disk.
Google adds friends and family
dd if=/dev/sda1 reminders, Sega Genesis Mini is
dd if=/dev/sda2
coming video
dd if=/dev/sda3
First look inside Virgin Galactic's
space passenger terminal video
Validation
Government of cials blocked his
One of the most critical aspects of forensics is validating digital website, so he went over their heads
evidence. To maintain the integrity of the data collected, hashing
algorithms are used to create a unique xed length hexadecimal Google, Facebook, Amazon will
number base on the data set. The output is referred to as the testify against France's digital tax
message digest or the digital ngerprint. Within Linux, md5sum next week

and sha1sum can be used to validate your work. I prefer to use Microsoft warns of Windows 10
sha1 over md5 because sha1 uses 160 bit encryption as opposed vulnerabilities, scammers target
TikTok video Privacidad - Condiciones

vcodispot.com/index.php/forensics/data-dump-dd-create-forensic-image-linux/ 2/3
8/17/2019 Data Dump(dd) to Create a Forensic Image with Linux

to 128 bit, and has a higher resistance to collisions. Collisions Pixel 4 may have been spotted in
occur when two different les produce the same hash. public video

In a terminal window type: sha1sum /dev/sda > Hash.txt Google workers demand company
not work with ICE, CBP
In a terminal window type: sha1sum capture.img >> Hash.txt

*The >> appends the hash of the image le to Hast.txt

Hash Swap Partition

Hash Image File

Hash.txt

July 4, 2017

← Extract GPS Coordinates from Digital Photos

Snort .VS. Suricata →

vcodispot.com | Technotopics Copyright © 2019

Privacidad - Condiciones

vcodispot.com/index.php/forensics/data-dump-dd-create-forensic-image-linux/ 3/3

You might also like