{"id":822,"date":"2020-09-29T23:39:59","date_gmt":"2020-09-29T22:39:59","guid":{"rendered":"https:\/\/cybercop-training.ch\/?p=822"},"modified":"2020-09-29T23:39:59","modified_gmt":"2020-09-29T22:39:59","slug":"disk-forensics-p6","status":"publish","type":"post","link":"https:\/\/cybercop-training.ch\/?p=822","title":{"rendered":"Disk Forensics P6"},"content":{"rendered":"<p>This is an alternative approach for dd to create a disk image file for further forensic analysis.<\/p>\n<blockquote><p>dcfldd is a modified version of GNU originally created by Nicholas Harbour from the DoD<br \/>\nComputer Forensics Laboratory (DCFL). It supports hashing, fast disk wiping (through patterns)<br \/>\nand status output<\/p><\/blockquote>\n<p>This command will do the same like in the last exercise, but will also automatically create a md5 hash file<\/p>\n<p><code>dcfldd if=\/dev\/sdc hash=md5,sha256 md5log=md5.log sha256log=sha.log<br \/>\nof=evidence2.img<\/code><\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-825\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd5.png\" alt=\"\" width=\"747\" height=\"233\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd5.png 747w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd5-300x94.png 300w\" sizes=\"auto, (max-width: 747px) 100vw, 747px\" \/><\/a><\/p>\n<p>If we compare the md5 sum with the evidence.img file from the last exercise, I&#8217;ll get the same value<\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-826\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd6.png\" alt=\"\" width=\"392\" height=\"98\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd6.png 392w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd6-300x75.png 300w\" sizes=\"auto, (max-width: 392px) 100vw, 392px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-819\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd4.png\" alt=\"\" width=\"452\" height=\"209\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd4.png 452w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd4-300x139.png 300w\" sizes=\"auto, (max-width: 452px) 100vw, 452px\" \/><\/a><\/p>\n<p>There are some other cool stuff we can do, like splitting the disk image file into different parts<\/p>\n<p><code>dcfldd if=\/dev\/sdc hash=md5,sha256 md5log=md5.log split=64M splitformat=000 sha256log=sha.log of=evidence_3.img<\/code><\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-827\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd7.png\" alt=\"\" width=\"922\" height=\"314\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd7.png 922w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd7-300x102.png 300w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd7-768x262.png 768w\" sizes=\"auto, (max-width: 922px) 100vw, 922px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">As we can see, this give us 4 parts of a 256MB disk file.<\/p>\n<p style=\"text-align: justify;\">This approach can help while imaging a large evidence disk. The smaller parts of the image can be then sent over the internet or carried on relatively smaller portable storage device<\/p>\n<p>If we choose that option, the analyst needs to know how he can set the splittet parts together. Let&#8217;s use the following command<\/p>\n<p><code>cat evidence_3.img.0* &gt; evidence4.img<\/code><\/p>\n<p><a href=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-829\" src=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd8.png\" alt=\"\" width=\"415\" height=\"96\" srcset=\"https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd8.png 415w, https:\/\/cybercop-training.ch\/wp-content\/uploads\/2020\/09\/dd8-300x69.png 300w\" sizes=\"auto, (max-width: 415px) 100vw, 415px\" \/><\/a><\/p>\n<p>As we can see, the checksum is still the same \ud83d\ude0e<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>This is an alternative approach for dd to create a disk image file for further forensic analysis. dcfldd is a modified version of GNU originally <a class=\"mh-excerpt-more\" href=\"https:\/\/cybercop-training.ch\/?p=822\" title=\"Disk Forensics P6\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":2,"featured_media":823,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,16],"tags":[],"class_list":["post-822","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-forensic","category-linux"],"_links":{"self":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=822"}],"version-history":[{"count":3,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/822\/revisions"}],"predecessor-version":[{"id":830,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/posts\/822\/revisions\/830"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=\/wp\/v2\/media\/823"}],"wp:attachment":[{"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybercop-training.ch\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}