Blue Team Fundamentals Module 06
Blue Team Fundamentals Module 06
Blue Team
Fundamentals
Module : 06 | UNVEILING THE SECRETS OF DIGITAL INVESTIGATIONS
UNVEILING THE SECRETS OF
DIGITAL INVESTIGATIONS
UNVEILING THE SECRETS OF DIGITAL INVESTIGATIONS
https://www.exterro.com/digital-forensics-
software/ftk-imager
Shortly after the Volatile Data Collection procedure begins, the FTK
imager begins capturing RAM memory. The procedure takes time,
depending on the amount of RAM used.
Step:06
Soon after the procedure is completely completed, transfer the file
to the the investigation machine, for additional examination.
Disk Imaging
General Working of Disk Imaging
Disc imaging is the process of transferring data/imaging bit-by-bit or bitstream to another hard disc,
resulting in an unchanged copy of the copied medium. Disk imaging has the potential to either copy the
entire disc or the logical partition present in it.
This imaging process are been more different than a traditional copy pasting method, imaging generally
not only copy entire file which typically include data like the master boot record and table allocation
information.
Step:01
The initial step is to logon to the
relevant infected machine,
RAW dd: Raw: commonly produce raw disk images with extensions
such as .dd or .raw. These files contain the raw binary data of the
storage media.
EnCase Image Format: EnCase Forensic software often creates forensic images with the .E01 extension. If an image is split
into multiple segments, you may see extensions like .E02, .E03, etc.
Step:07
Its recommend to fill all sort of information related to the
investigation for better visibility and maintaining
Step:06
Shortly after the disk imaging data begins, depending on the
amount of disk size the process will consume lot more time.
Post incident analysis
Demo
Thank You
For Professional Red Team / Blue Team / Purple Team / Cloud Cyber Range labs / Trainings, please contact
[email protected]
To know more about our offerings, please visit: https://cyberwarfare.live