SlideShare a Scribd company logo
Digital forensics with Kali Linux
Marco Alamanni
Section 2
Acquiring forensic images
www.packtpub.com
In this Section, we are going to take a look at…

Introduction to the forensic image acquisition process.

Acquiring images with dcfldd and dc3dd.

Acquiring images with a GUI tool: Guymager
Digital forensics with Kali Linux
Marco Alamanni
Video 2.1
Introduction to forensic imaging
In this Video, we are going to take a look at…
• Introduction to the basic concepts of forensic imaging.
• Hardware and software write-blocking techniques.
• Forensic image formats.
• Hard disks geometry and ATA features: DCO and HPA
Introduction to forensic imaging
• Forensic image acquisition is the process of acquiring a forensically sound copy
or image of the device or media to analyze.
• Forensically sound means that the we shall be able to verify that the image is an
exact copy of the original and the procedure used to acquire it shall be
documented.
• The image file is the basis on which the examiner works to find the evidence.
Introduction to forensic imaging
• A forensic image is a bit by bit copy of the media to analyze.
• It’s not simply cloning the file system, it’s a copy of all the raw disk (or partition)
sectors.
• The original media must not be altered in any way!
• The integrity of the image file shall be verified and I/O errors logged. (see NIST
CFTT: Testing Disk Imaging Tools)
Introduction to forensic imaging
• Two scenarios when acquiring a forensic image: the hard drive is removed or
not removed from the suspect computer.
• In the first case, we use a forensic live cd, like Kali Linux.
Forensic live cds shall be booted in forensic mode.
• In the second case, we must attach the drive to a forensic workstation using a
write blocking mechanism.
Hardware and software write blocking
• Write blocking mechanisms can be implemented in hardware or software.
• Hardware write blockers are devices that protect the drive from writes and could
have different type of connectors.
• Are quite expensive but their use is preferable.
Hardware write blocker
Software write blocking
• Software write blocking is quite a controversial topic.
• Simply mounting a drive as read-only doesn’t fully guarantee that it is not
written!
• Various techniques have been developed.
Software write blocking
• Linux write blocker kernel patch written by M.Suhanov.
• It blocks the write commands at the device driver level.
• But requires the kernel to be recompiled.
Forensic image formats
• A raw image is a duplicate of all the sectors of a disk or partition.
• It contains no additional metadata.
• Can be obtained by tools like dd (Data Dump). Variants of dd have been
developed for forensics.
Forensic image formats
• Another open forensic format is the Advanced Forensic Format (AFF) (S.
Garfinkel).
• It supports compression and encryption of images.
• AFFlib package to convert and manage AFF images.
Forensic image formats
• Proprietary formats: Expert Witness Format (EWF) and SMART
• Both supports compression and encryption of images.
• libewf package to convert and manage ewf images.
Hard disk geometry
Hard disk addressing: CHS and LBA
• CHS (Cylinder-Head-Sector) is the traditional physical block addressing
scheme.
• Outdated but still used.
• LBA (Logical Block Addressing) is a linear addressing scheme that
replaced CHS addressing.
• Sectors are located by a 48 bits integer index.
Hard disk addressing: CHS and LBA
Hard disk forensics: DCO and HPA
• Two features introduced in the ATA standard that are relevant to digital forensics:
DCO (Device configuration overlay) and HPA (Host protected area).
• DCO allows to configure reported disk capacity and features.
• HPA hides disk areas to the OS and reserves them to store data.
• Both features have been abused to hide illicit data.
Hard disk forensics: DCO and HPA
• Both DCO and HPA can be revealed and removed with a command line tool:
hdparm.
• We are going to show its usage next.
Summary
• Introduction to the basic concepts of forensic imaging.
• Hardware and software write-blocking techniques.
• Forensic image formats.
• Hard disks geometry and ATA features: DCO and HPA
Next Video
Introduction to dcfldd and dc3dd

More Related Content

PPTX
Autopsy Digital forensics tool
PPTX
Computer forensic ppt
PDF
CNIT 121: 8 Forensic Duplication
PPTX
Forensic imaging
PDF
04 Evidence Collection and Data Seizure - Notes
ODT
Operating System Forensics
PPTX
Network Forensics
PPTX
computer forensic tools-Hardware & Software tools
Autopsy Digital forensics tool
Computer forensic ppt
CNIT 121: 8 Forensic Duplication
Forensic imaging
04 Evidence Collection and Data Seizure - Notes
Operating System Forensics
Network Forensics
computer forensic tools-Hardware & Software tools

What's hot (20)

PPTX
Digital Forensic ppt
PPTX
Introduction to filesystems and computer forensics
PPT
Preserving and recovering digital evidence
PPTX
Network forensic
PDF
A brief Intro to Digital Forensics
PPT
Introduction to computer forensic
PPTX
Difference between Cyber and digital Forensic.pptx
PPTX
Module 02 ftk imager
PPTX
E-mail Investigation
PPTX
Anti forensic
PPTX
Encase Forensic
PPTX
Digital forensic tools
PPTX
Digital Forensics by William C. Barker (NIST)
PPTX
Computer forensics powerpoint presentation
PPTX
Data recovery
PPT
Windows forensic artifacts
PPTX
Digital forensics
PPTX
Digital Evidence by Raghu Khimani
PPTX
Data Acquisition
PPT
Data recovery
Digital Forensic ppt
Introduction to filesystems and computer forensics
Preserving and recovering digital evidence
Network forensic
A brief Intro to Digital Forensics
Introduction to computer forensic
Difference between Cyber and digital Forensic.pptx
Module 02 ftk imager
E-mail Investigation
Anti forensic
Encase Forensic
Digital forensic tools
Digital Forensics by William C. Barker (NIST)
Computer forensics powerpoint presentation
Data recovery
Windows forensic artifacts
Digital forensics
Digital Evidence by Raghu Khimani
Data Acquisition
Data recovery
Ad

Similar to Introduction to forensic imaging (20)

PPTX
Lecture 4 - Data Acquisition1234_MH.pptx
PPTX
Intro to digital forensic imaging
PPT
Guide to computer forensics and investigation.ppt
PPT
Ch 04 Data Acquisition for Digital Forensics.ppt
PDF
CNIT 152 8. Forensic Duplication
PPT
data acquisition in computer forensics and
PDF
kbrgwillis.pdf
PDF
Accessing Forensic Images
PDF
Debian Linux as a Forensic Workstation
PDF
dataacquisition.pdf
PPTX
Capturing forensics image
PPTX
First Responder Course - Session 10 - Static Evidence Collection [2004]
PPTX
Computer Forensics and investigation module 3
PPT
Codebits 2010
PDF
Foundation of Digital Forensics
PDF
Digital Forensics
PDF
Workshop 2 revised
PPTX
Beauty of open source in cyber forensics
DOCX
Computer Forensics chap 3+4.DS_Store__MACOSXComputer Foren.docx
Lecture 4 - Data Acquisition1234_MH.pptx
Intro to digital forensic imaging
Guide to computer forensics and investigation.ppt
Ch 04 Data Acquisition for Digital Forensics.ppt
CNIT 152 8. Forensic Duplication
data acquisition in computer forensics and
kbrgwillis.pdf
Accessing Forensic Images
Debian Linux as a Forensic Workstation
dataacquisition.pdf
Capturing forensics image
First Responder Course - Session 10 - Static Evidence Collection [2004]
Computer Forensics and investigation module 3
Codebits 2010
Foundation of Digital Forensics
Digital Forensics
Workshop 2 revised
Beauty of open source in cyber forensics
Computer Forensics chap 3+4.DS_Store__MACOSXComputer Foren.docx
Ad

More from Marco Alamanni (7)

ODP
Introduction to memory forensics
ODP
File carving tools
ODP
File carving overview
ODP
Extracting and analyzing browser,email and IM artifacts
ODP
Brief introduction to digital forensics
PPT
Oracle Database Vault
PDF
Trust:concetti generali e teoria formale
Introduction to memory forensics
File carving tools
File carving overview
Extracting and analyzing browser,email and IM artifacts
Brief introduction to digital forensics
Oracle Database Vault
Trust:concetti generali e teoria formale

Recently uploaded (20)

PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
Computer Software and OS of computer science of grade 11.pptx
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
history of c programming in notes for students .pptx
PDF
Nekopoi APK 2025 free lastest update
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PPTX
Monitoring Stack: Grafana, Loki & Promtail
PDF
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
PPTX
Oracle Fusion HCM Cloud Demo for Beginners
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
iTop VPN Crack Latest Version Full Key 2025
PPTX
assetexplorer- product-overview - presentation
DOCX
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Computer Software and OS of computer science of grade 11.pptx
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
history of c programming in notes for students .pptx
Nekopoi APK 2025 free lastest update
Design an Analysis of Algorithms I-SECS-1021-03
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
Advanced SystemCare Ultimate Crack + Portable (2025)
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
Reimagine Home Health with the Power of Agentic AI​
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Monitoring Stack: Grafana, Loki & Promtail
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
Oracle Fusion HCM Cloud Demo for Beginners
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
Operating system designcfffgfgggggggvggggggggg
iTop VPN Crack Latest Version Full Key 2025
assetexplorer- product-overview - presentation
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps

Introduction to forensic imaging

  • 1. Digital forensics with Kali Linux Marco Alamanni Section 2 Acquiring forensic images www.packtpub.com
  • 2. In this Section, we are going to take a look at…  Introduction to the forensic image acquisition process.  Acquiring images with dcfldd and dc3dd.  Acquiring images with a GUI tool: Guymager
  • 3. Digital forensics with Kali Linux Marco Alamanni Video 2.1 Introduction to forensic imaging
  • 4. In this Video, we are going to take a look at… • Introduction to the basic concepts of forensic imaging. • Hardware and software write-blocking techniques. • Forensic image formats. • Hard disks geometry and ATA features: DCO and HPA
  • 5. Introduction to forensic imaging • Forensic image acquisition is the process of acquiring a forensically sound copy or image of the device or media to analyze. • Forensically sound means that the we shall be able to verify that the image is an exact copy of the original and the procedure used to acquire it shall be documented. • The image file is the basis on which the examiner works to find the evidence.
  • 6. Introduction to forensic imaging • A forensic image is a bit by bit copy of the media to analyze. • It’s not simply cloning the file system, it’s a copy of all the raw disk (or partition) sectors. • The original media must not be altered in any way! • The integrity of the image file shall be verified and I/O errors logged. (see NIST CFTT: Testing Disk Imaging Tools)
  • 7. Introduction to forensic imaging • Two scenarios when acquiring a forensic image: the hard drive is removed or not removed from the suspect computer. • In the first case, we use a forensic live cd, like Kali Linux. Forensic live cds shall be booted in forensic mode. • In the second case, we must attach the drive to a forensic workstation using a write blocking mechanism.
  • 8. Hardware and software write blocking • Write blocking mechanisms can be implemented in hardware or software. • Hardware write blockers are devices that protect the drive from writes and could have different type of connectors. • Are quite expensive but their use is preferable.
  • 10. Software write blocking • Software write blocking is quite a controversial topic. • Simply mounting a drive as read-only doesn’t fully guarantee that it is not written! • Various techniques have been developed.
  • 11. Software write blocking • Linux write blocker kernel patch written by M.Suhanov. • It blocks the write commands at the device driver level. • But requires the kernel to be recompiled.
  • 12. Forensic image formats • A raw image is a duplicate of all the sectors of a disk or partition. • It contains no additional metadata. • Can be obtained by tools like dd (Data Dump). Variants of dd have been developed for forensics.
  • 13. Forensic image formats • Another open forensic format is the Advanced Forensic Format (AFF) (S. Garfinkel). • It supports compression and encryption of images. • AFFlib package to convert and manage AFF images.
  • 14. Forensic image formats • Proprietary formats: Expert Witness Format (EWF) and SMART • Both supports compression and encryption of images. • libewf package to convert and manage ewf images.
  • 16. Hard disk addressing: CHS and LBA • CHS (Cylinder-Head-Sector) is the traditional physical block addressing scheme. • Outdated but still used. • LBA (Logical Block Addressing) is a linear addressing scheme that replaced CHS addressing. • Sectors are located by a 48 bits integer index.
  • 17. Hard disk addressing: CHS and LBA
  • 18. Hard disk forensics: DCO and HPA • Two features introduced in the ATA standard that are relevant to digital forensics: DCO (Device configuration overlay) and HPA (Host protected area). • DCO allows to configure reported disk capacity and features. • HPA hides disk areas to the OS and reserves them to store data. • Both features have been abused to hide illicit data.
  • 19. Hard disk forensics: DCO and HPA • Both DCO and HPA can be revealed and removed with a command line tool: hdparm. • We are going to show its usage next.
  • 20. Summary • Introduction to the basic concepts of forensic imaging. • Hardware and software write-blocking techniques. • Forensic image formats. • Hard disks geometry and ATA features: DCO and HPA
  • 21. Next Video Introduction to dcfldd and dc3dd