Command for detailed disk information?
hdparm -I /dev/sda | less
Command for detailed USB drive information?
usb-devices | less
How to hash a block device?
How does the basic dd command looks like? What other options are possible?
# dd if=/dev/sdc of=evidence.raw bs=512
Other options include:
How can you split a large image into smaller pieces?
# split -d -a3 -b4G case1.disk1.raw case1.disk1.split.
How can you split image on-the-fly with dd?
# dd if=/dev/sdd | split -d -a3 -b4G - case1.disk1.split.
How can you reassemble the image?
# cat case1.disk1.split* > case1.disk1.new.raw
How can you hash every single split file?
# sha1sum case1.disk1.split.*
How can you hash the complete file?
# cat case1.disk1.split*| sha1sum
What are the basics steps to acquire a block device?
Name a few alternative acquisition tools?
How does a standard dc3dd command looks like with:
# dc3dd if=/dev/sdb hofs=thumb.dc3dd.000 ofsz=512M hash=sha1 hash=md5 log=thumb.dc3dd.log
Other options are:
How can you create multiple duplicate images with dc3dd?
# dc3dd if=/dev/sdb hof=thumbcopy.dc3dd hof=duplicate.dc3dd hash=md5
Name the six tools of the tools from the libewf project?
How does a simple ewfacquire command looks like?
ewfaquire /dev/sdb
How does a complex ewfacquire command looks like?
# ewfacquire -C “2019-001” -d sha1 -D “Thumb drive seized from bad guy” -e “Barry J. Grundy” -E “2019-001-002” -m removable -M physical -S 512M -t case1.disk2 -u /dev/sdb
Options are:
-C : the case number is specified with -C
-D : the evidence description is given with -D
-e : the examiner given with -e
-E : evidence number with -E
-f encase6 : encase6 format is specified with -f encase6
-m : the media type, options: fixed (default), removable, optical, memory
-M : the media flags, options: logical, physical (default)
-N : notes are provided with -N
-t /path/file : the target path and file name is specified with -t /path/file
-d : Calculate additional digest (hash) types besides md4. Options: sha1, sha256
-S : Segment file size in bytes (default is 1.4 GiB)
How can you convert an EWF file into a raw bitstream image?
# ewfexport -t NTFS_Pract_2l017 -f raw -u NTFS_Pract_2017.E01
-t: target to write to a file; -f: file format we are writing to; -u: to accept remaining defaults and prevent interaction
How does ddrescue works?
# ddrescue /dev/sdc sdcrescue.img.raw sdcrescue.map
More options:
Map File:
How can you image over the network? Explain Listener and suspect.
Listener:
root@forensic:~# nc -l -p 2525 | dd of=/mnt/evid/netimg.raw
Suspect:
root@bootdisk:~# dd if=/dev/sda | nc 192.168.0.1 2525
How can you image over the network with dc3dd?
Listening Host:
# nc-l -p 2525 | dc3dd ofs=/mnt/evidence/net_dc3dd.000 ofsz=4G log=/mnt/evidence/dc3dd.log
Suspect Host:
# dd if=/dev/sda | nc 192.168.0.1 2525
How can you image over the network with ewfacquirestream?
Listening host:
# nc -l -p 2524 | ewfacquirestream -c 2019-001 -D”Subject Disk” -e “BGrundy” -E ’1’ -f encase6 -m fixed -M physical-N “Imaged via network connection” -t mnt/evidence/net_ewfstream
Suspect host:
# dd if=/dev/sda | nc 192.168.0.1 2525
Explain the following compresssions with dd using gzip:
# dd if=/dev/sdc | gzip -c > sdc_img.raw.gz
How can you image compressed over the network with dd?
Listening Host:
# nc -l -p 2525 | gzip -cd | dc3dd hash=sha1 hof=netCompress.raw log=netCompress.log
Suspect Host:
# dd if=/dev/sda | gzip -c | nc 192.168.0.1 2525
How can you wipe the media with: