Assignment 2
Assignment 2
Imaging is the process of taking an exact copy of a flash drives and is the very foundation of digital
forensics, data recovery and electronic discovery processing. It takes every single 0 and 1 on one
hard drive and puts it on another
The imaging process, for most tools, takes an exact copy of each sector, starting at the first sector,
Sector 0, then continues until the last sector.
Once a sector is read by the imaging tool it is then written down again onto another media.
Depending on the tool, the settings, and the users requirements, will depend on the storage pattern of
data. It is an easy and convenient to use sector by sector data carver for phone dumps or cell phone
image files. Different Image Format
Hex
DD
Bin
RAW
DMG
XRY
Forensic Acquisition
System Requirements :
Hardware:
Processor: Pentium 4 and above, 1.5 GHz and above.
RAM: 512 MB RAM.
Hard Disk: At least 10 GB HDD.
Monitor: Any size from 15” or above.
Keyboard And Mouse: Any Keyboard and OS supporting pointing device.
Software:
Operating System: Microsoft Windows XP and above, Macintosh.
Software: Access Data FTK Imager ( 3.4.X ), Access Data FTK Imager Lite.
Forensic Imaging :
FTK Imager is a data preview and imaging tool that lets you quickly assess electronic evidence to
determine if further analysis with a forensic tool such as Access Data Forensic Toolkit (FTK) is
warranted. FTK Imager can also create perfect copies (forensic images) of computer data without
making changes to the original evidence. With FTK Imager, you can:
Create forensic images of local hard drives, floppy diskettes, Zip disks, CDs, and DVDs, entire
folders, or individual files from various places within the media.
Preview files and folders on local hard drives, network drives, floppy diskettes, Zip disks, CDs,
and DVDs
Preview the contents of forensic images stored on the local machine or on a network drive
Mount an image for a read-only view that leverages Windows Explorer to see the content of the
image exactly as the user saw it on the original drive
Export files and folders from forensic images.
See and recover files that have been deleted from the Recycle Bin, but have not yet been
overwritten on the drive.
Create hashes of files using either of the two hash functions available in FTK Imager: Message
Digest 5 (MD5) and Secure Hash Algorithm (SHA-1)
FTK Imager is a Windows acquisition tool included in various forensics toolkit. Its a free ware,
downloaded directly from the AccessData web site (FTK Imager version 3.1.5.0).
Click Add... to add the image destination. Check Verify images after they are created soFTK Imager
will calculate MD5 and SHA1 hashes of the acquired image.
Next, select the image type. The type you choose will usually depend on what tools you plan to use
on the image. The dd format will work with more open source tools, but E01 if you will primarily be
working with EnCase, respectively.
If your version of FTK requests evidence information, you can provide it. If you select raw (dd)
format, the image meta data will not be stored in the image file itself.
Select the Image Destination folder and file
name. You can also set the maximum
fragment size of image split files. Click
Finishto complete the wizard.