{"id":809,"date":"2020-09-29T23:02:00","date_gmt":"2020-09-29T22:02:00","guid":{"rendered":"https:\/\/cybercop-training.ch\/?p=809"},"modified":"2020-09-29T23:02:00","modified_gmt":"2020-09-29T22:02:00","slug":"disk-forensics-p5","status":"publish","type":"post","link":"https:\/\/cybercop-training.ch\/?p=809","title":{"rendered":"Disk Forensics P5"},"content":{"rendered":"<blockquote>\n<p dir=\"ltr\" style=\"text-align: justify;\">Image acquisition involves making a copy (or several copies) of the seized hard disk which can be then used to forensics analysis. This allows the investigators to analyze this image while ensuring the integrity and present condition of the real evidence disk.<\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">In this lab, the evidence hard disk is mounted on \u2018\/dev\/sdc\u2019. The <a href=\"https:\/\/en.wikipedia.org\/wiki\/Dd_(Unix)\" target=\"_blank\" rel=\"noopener noreferrer\"><b>dd tools<\/b><\/a>\u00a0are installed on the lab machine.<\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\"><b>Objective:<\/b>Create a disk image for evidence hard disk using dd tools.<\/p>\n<\/blockquote>\n<p dir=\"ltr\" style=\"text-align: justify;\">Our target disk where we need to do a copy for forensic analysis is mounted on <strong>\/dev\/sdc<\/strong>. Let&#8217;s check that first.<\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\"><code>df -h<\/code><\/p>\n<p dir=\"ltr\"><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-812\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd1.png\" alt=\"\" width=\"411\" height=\"224\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd1.png 411w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd1-300x164.png 300w\" sizes=\"auto, (max-width: 411px) 100vw, 411px\" \/><\/a><\/p>\n<p dir=\"ltr\">It seems that our disk is allready mounted, but is it useful to create a disk image when the disk is mounted?<\/p>\n<blockquote>\n<p dir=\"ltr\">When you&#8217;re reading\/writing to a file on a partition, it should be mounted (obviously, in order to access the file).<br \/>\nWhen you&#8217;re reading\/writing to a raw disk, it should be unmounted to prevent corruption or inconsistency.<\/p>\n<\/blockquote>\n<p dir=\"ltr\">So for preventing any failures it&#8217;s better to unmount the disk first!<\/p>\n<p dir=\"ltr\"><code>umount \/mnt\/evidence<\/code><\/p>\n<p dir=\"ltr\"><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-816\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd2.png\" alt=\"\" width=\"400\" height=\"211\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd2.png 400w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd2-300x158.png 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<p dir=\"ltr\">So now I&#8217;ll use the dd utility to create the image file<\/p>\n<p dir=\"ltr\"><code>dd if=dev\/sdc of=evidence.img<\/code><\/p>\n<p dir=\"ltr\"><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-817\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd3.png\" alt=\"\" width=\"465\" height=\"238\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd3.png 465w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd3-300x154.png 300w\" sizes=\"auto, (max-width: 465px) 100vw, 465px\" \/><\/a><\/p>\n<p dir=\"ltr\">To finalize this task I&#8217;ll create a MD5 Checksum of that evidence.img file<\/p>\n<p dir=\"ltr\"><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-819\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd4.png\" alt=\"\" width=\"452\" height=\"209\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd4.png 452w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd4-300x139.png 300w\" sizes=\"auto, (max-width: 452px) 100vw, 452px\" \/><\/a><\/p>\n<p dir=\"ltr\">\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Image acquisition involves making a copy (or several copies) of the seized hard disk which can be then used to forensics analysis. This allows the <a class=\"mh-excerpt-more\" href=\"https:\/\/cybercop-training.ch\/?p=809\" title=\"Disk Forensics P5\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":2,"featured_media":820,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,16],"tags":[],"class_list":["post-809","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-forensic","category-linux"],"_links":{"self":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=809"}],"version-history":[{"count":6,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/809\/revisions"}],"predecessor-version":[{"id":821,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/809\/revisions\/821"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/media\/820"}],"wp:attachment":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}