Preview

Forensic Acquisition Tools

Satisfactory Essays
Open Document
Open Document
607 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Forensic Acquisition Tools
Sebastian

NET 182 W01

September 16, 2012

Chapter 4 Project Summary

Project 4-1 In this project I’ve research current acquisition tools.
The acquisition tool is a program or hardware device used to read digital source and then create either an image file or a clone of a digital source. There are many tools available today to use for computer forensics. They include both open source and proprietary software. Some of the more common software is ProDiscover, SnapBack DatArrest, NTI SafeBack, DIBS USA Raid, ILOOK Investigator IXimager, Vogon International SDi32, ASRData SMART and Australian Department of Defence PyFlag.
Case 4-2 In this case project I need made a fast disk image of the suspect hard drive.
For this purpose I can use Live Linux Cd and USB drive (USB 3.0 with transfer of 625 MB/s) :
1. Boot the target computer to Linux using boot Linux CD (even if the computer is a windows computer you can boot it to Linux)
2. After booting to Linux insert USB thumb drive and I mount USB drive mkdir /mnt/usbdrive mount /dev/sda1 /mnt/usbdrive
3. Then I will execute dd command by typing dd if=/dev/hda6 of=/mnt/usbdrive/murder.img bs=4096

This tells Linux to make a bit stream copy from the input "file" ("if") /dev/hda6 (which is the E partition of the hard drive), to the output "file" ("of") /mnt/usbdrive/murder.img (which is a file called murder.img on the usb drive disk). The "bs" sets the block size to approximately 4K, which is a good size for many moderate sized copying jobs.
4. Now I can unmount the USB drive by typing
Umount /mnt/usbdrive This allow Linux to complete writing to USB drive
5. Now I have bit a bit copy of 10 GB partition E made on USB drive in file called murder.img

Hands on Project 4-3 In this project I’ve create a FAT32 disk partition with usage of Linux. This is the steps to create FAT 32 partition in Linux :
1. I boot computer with Linux Ubuntu
2. Then I connect a

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    MNP231

    • 1327 Words
    • 4 Pages

    2. What two basic methods capture an image of a Windows Server 2008 computer by using the tools you installed in this lab?…

    • 1327 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3

    • 3151 Words
    • 13 Pages

    while talking to the disk controller.Usually S = S', C' = C/N and H' = H*N,…

    • 3151 Words
    • 13 Pages
    Good Essays
  • Satisfactory Essays

    MGS 351 FINAL TIPS

    • 313 Words
    • 2 Pages

    digital forensics: acquire the evidence without changing) authenticate your recovered evidence is the same as original…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It-260 Worksheet

    • 1070 Words
    • 5 Pages

    Exercise 1.1Exercise 1.2Exercise 1.3Exercise 1.4Lab ReviewLab Challenge|Performing Initial Configuration TasksWorking with DisksUsing Server ManagerAdding the File Services RoleQuestionsUsing Diskpart.exe|…

    • 1070 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    As a support technician for a small company, your job is to support the PCs and their users, the employees. Ben, a coworker, comes to you with a problem. For some reason, Windows XP is not booting correctly on his computer. Ben is worried, because he has many important data files in several locations on the hard drive. He does not know which files are located in which folders. Ben is also worried about losing his saved e-mail addresses, individual e-mails, and his favorite links on Microsoft Internet Explorer®. You try everything you know to recover Ben’s computer, but nothing works. Ben’s system is corrupted beyond repair.…

    • 1382 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Unit 1 Assignment Q A

    • 592 Words
    • 2 Pages

    3). What application and tools can be use to perform this initial reconnaissance and probing step?…

    • 592 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    drive. You prepared the contents of the seized hard drive using a variety of forensic tools as…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Sql Triggers

    • 357 Words
    • 2 Pages

    In Exercise 4.4, you boot your workstation with the Windows PE disk you created and use the Image.exe program to capture an image of the workstation’s drive.…

    • 357 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Guide to Unix Chapter 2

    • 999 Words
    • 4 Pages

    c. Linux supports both the UDF and iso9660 file systems for CD and DVD use.…

    • 999 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    An inventory specialist in the Manufacturing and Operations Department needs to determine what file systems are mounted on his Linux computer because he is not sure that the DVD/CD-ROM drive is properly mounted. Explain the steps he should use to determine the mounted file systems, and also note which file system should be mounted for the DVD/CD-ROM.…

    • 739 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Forensic science has various influences on crime, investigation and the people that are involved. Forensic science has a connection with the courts to ensure crimes are getting solved and justice is being served to those that commit crimes. With the help of forensic science, crimes are being solved from a human and technological aspect. This paper highlights numerous discussions on how forensic science plays a role in criminal justices system, security, media and the law.…

    • 1454 Words
    • 6 Pages
    Powerful Essays