This document discusses using the DC3DD tool and Guymager to acquire disk images in a forensically-sound manner. It explains running DC3DD with options like "if" to specify the input device, "hash" for hashing algorithms, and "of" for the output file. It also shows verifying hashes of the original device with tools like md5sum and using Guymager to view acquired disk images.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
84 views2 pages
Lab 4 Cyber Forensics
This document discusses using the DC3DD tool and Guymager to acquire disk images in a forensically-sound manner. It explains running DC3DD with options like "if" to specify the input device, "hash" for hashing algorithms, and "of" for the output file. It also shows verifying hashes of the original device with tools like md5sum and using Guymager to view acquired disk images.