DIgital Forensics DA 3
DIgital Forensics DA 3
Exercise No: 3
21BCI0383
Register Number
Yashita Mittal
Name
19 Sept, 2024
Submission Date
SJT 317
Exercise No: 3 FTK Images | Forensic Analysis using ProDiscover Basic
Problem Statement
You are asked to install both FTK Imager and ProDiscover Basic for carrying out this
exercise.
Create RAW images (Logical | Drives | USB) using FTK Imager and utilize the created RAW image
in the ProDiscover Basic for the Investigative Analysis.
Create the RAW image (minimum of 100MB of multimedia files) to work with ProDiscover Basic.
Analyze the respective data and generate a detailed report and its interpretation.
Aim
To capture and examine a RAW image of a logical drive or USB using FTK Imager, focusing on
multimedia files. This image will be imported into ProDiscover Basic for further investigation.
The goal is to explore the image's contents, extract important data, and produce a
comprehensive report interpreting the findings through forensic techniques.
Procedure / Steps
1. Insert the USB Drive:
• Attach the USB drive to your computer via a write blocker to safeguard the data from being
modified during the process. A write blocker ensures the device is accessed in read-only
mode, preventing any unintentional or deliberate alterations to the drive's contents.
2. Launch FTK Imager:
• Open FTK Imager, a forensic software used to capture images of storage devices.
• Click on “File” > “Create Disk Image”.
3. Select Source:
• In the dialog box, choose “Physical Drive” if you are imaging the entire USB drive or “Logical
Drive” for specific partitions.
4. Choose Image Type:
• FTK Imager will ask you to choose the image format. Select from options like Raw (dd),
SMART, E01, or AFF, depending on the analysis software you'll be using. Various forensic
tools support different formats, whether standard or proprietary.
Interpretation / Conclusion
The RAW image created from the USB drive with FTK Imager provided an unaltered copy of the data.
After importing it into ProDiscover Basic, analysis uncovered multimedia files and metadata.
Techniques like file carving and keyword search revealed hidden or deleted files, offering key
evidence.
Metadata analysis showed file creation and modification dates, helping trace activity on the drive.
Suspicious files, altered headers, and tampered timestamps were also identified.
The ProDiscover Basic report consolidates all extracted data, including file details and metadata,
offering a clear view of the USB's contents. This method ensured data integrity and provided valuable
insights for further investigation or legal action.