SlideShare a Scribd company logo
Digital forensics with Kali Linux
Marco Alamanni
Section 2
Acquiring forensic images
www.packtpub.com
In this Section, we are going to take a look at…

Introduction to the forensic image acquisition process.

Acquiring images with dcfldd and dc3dd.

Acquiring images with a GUI tool: Guymager
Digital forensics with Kali Linux
Marco Alamanni
Video 2.1
Introduction to forensic imaging
In this Video, we are going to take a look at…
• Introduction to the basic concepts of forensic imaging.
• Hardware and software write-blocking techniques.
• Forensic image formats.
• Hard disks geometry and ATA features: DCO and HPA
Introduction to forensic imaging
• Forensic image acquisition is the process of acquiring a forensically sound copy
or image of the device or media to analyze.
• Forensically sound means that the we shall be able to verify that the image is an
exact copy of the original and the procedure used to acquire it shall be
documented.
• The image file is the basis on which the examiner works to find the evidence.
Introduction to forensic imaging
• A forensic image is a bit by bit copy of the media to analyze.
• It’s not simply cloning the file system, it’s a copy of all the raw disk (or partition)
sectors.
• The original media must not be altered in any way!
• The integrity of the image file shall be verified and I/O errors logged. (see NIST
CFTT: Testing Disk Imaging Tools)
Introduction to forensic imaging
• Two scenarios when acquiring a forensic image: the hard drive is removed or
not removed from the suspect computer.
• In the first case, we use a forensic live cd, like Kali Linux.
Forensic live cds shall be booted in forensic mode.
• In the second case, we must attach the drive to a forensic workstation using a
write blocking mechanism.
Hardware and software write blocking
• Write blocking mechanisms can be implemented in hardware or software.
• Hardware write blockers are devices that protect the drive from writes and could
have different type of connectors.
• Are quite expensive but their use is preferable.
Hardware write blocker
Software write blocking
• Software write blocking is quite a controversial topic.
• Simply mounting a drive as read-only doesn’t fully guarantee that it is not
written!
• Various techniques have been developed.
Software write blocking
• Linux write blocker kernel patch written by M.Suhanov.
• It blocks the write commands at the device driver level.
• But requires the kernel to be recompiled.
Forensic image formats
• A raw image is a duplicate of all the sectors of a disk or partition.
• It contains no additional metadata.
• Can be obtained by tools like dd (Data Dump). Variants of dd have been
developed for forensics.
Forensic image formats
• Another open forensic format is the Advanced Forensic Format (AFF) (S.
Garfinkel).
• It supports compression and encryption of images.
• AFFlib package to convert and manage AFF images.
Forensic image formats
• Proprietary formats: Expert Witness Format (EWF) and SMART
• Both supports compression and encryption of images.
• libewf package to convert and manage ewf images.
Hard disk geometry
Hard disk addressing: CHS and LBA
• CHS (Cylinder-Head-Sector) is the traditional physical block addressing
scheme.
• Outdated but still used.
• LBA (Logical Block Addressing) is a linear addressing scheme that
replaced CHS addressing.
• Sectors are located by a 48 bits integer index.
Hard disk addressing: CHS and LBA
Hard disk forensics: DCO and HPA
• Two features introduced in the ATA standard that are relevant to digital forensics:
DCO (Device configuration overlay) and HPA (Host protected area).
• DCO allows to configure reported disk capacity and features.
• HPA hides disk areas to the OS and reserves them to store data.
• Both features have been abused to hide illicit data.
Hard disk forensics: DCO and HPA
• Both DCO and HPA can be revealed and removed with a command line tool:
hdparm.
• We are going to show its usage next.
Summary
• Introduction to the basic concepts of forensic imaging.
• Hardware and software write-blocking techniques.
• Forensic image formats.
• Hard disks geometry and ATA features: DCO and HPA
Next Video
Introduction to dcfldd and dc3dd

More Related Content

PPTX
Module 02 ftk imager
PPTX
Memory forensics.pptx
PPTX
Digital Forensics best practices with the use of open source tools and admiss...
PPT
Windowsforensics
PPTX
Network Forensics
PPTX
Memory forensics
PPT
Linux forensics
PPTX
Mobile Forensics
Module 02 ftk imager
Memory forensics.pptx
Digital Forensics best practices with the use of open source tools and admiss...
Windowsforensics
Network Forensics
Memory forensics
Linux forensics
Mobile Forensics

What's hot (20)

PPTX
Data Acquisition
PDF
Digital Forensic: Brief Intro & Research Challenge
PPTX
Introduction to filesystems and computer forensics
PPTX
Digital forensic tools
PDF
LTEC 2013 - EnCase v7.08.01 presentation
PPTX
Cyber Forensics Overview
PPTX
Digital Forensic ppt
PPTX
Windows Forensic 101
PPTX
Computer forensics toolkit
PDF
Email Forensics
PPTX
Autopsy Digital forensics tool
PPTX
Memory Forensics
PPT
Windows forensic artifacts
PPTX
Computer forensic ppt
PPT
Introduction to computer forensic
PDF
Database forensics
PPTX
Incident response process
PPTX
Virtual Machine Forensics
Data Acquisition
Digital Forensic: Brief Intro & Research Challenge
Introduction to filesystems and computer forensics
Digital forensic tools
LTEC 2013 - EnCase v7.08.01 presentation
Cyber Forensics Overview
Digital Forensic ppt
Windows Forensic 101
Computer forensics toolkit
Email Forensics
Autopsy Digital forensics tool
Memory Forensics
Windows forensic artifacts
Computer forensic ppt
Introduction to computer forensic
Database forensics
Incident response process
Virtual Machine Forensics
Ad

Similar to Introduction to forensic imaging (20)

PPTX
Intro to digital forensic imaging
PDF
kbrgwillis.pdf
PDF
CNIT 152 8. Forensic Duplication
PDF
CNIT 121: 8 Forensic Duplication
PPT
Guide to computer forensics and investigation.ppt
PDF
File000127
PPTX
Lecture 4 - Data Acquisition1234_MH.pptx
PDF
cyber forensics and digitalforensics.pdf
PPT
data acquisition in computer forensics and
PPT
Ch 04 Data Acquisition for Digital Forensics.ppt
PPTX
Computer Forensics and investigation module 3
PPTX
computer forensic tools-Hardware & Software tools
PDF
You suck at Memory Analysis
PPT
Preserving and recovering digital evidence
PPTX
Clape n
PDF
Kernel Recipes 2015: Solving the Linux storage scalability bottlenecks
PPTX
Android forensics an Custom Recovery Image
PDF
LST Toolkit: Exfiltration Over Sound, Light, Touch
PPTX
Hard Disk Data Acquisition
DOCX
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Intro to digital forensic imaging
kbrgwillis.pdf
CNIT 152 8. Forensic Duplication
CNIT 121: 8 Forensic Duplication
Guide to computer forensics and investigation.ppt
File000127
Lecture 4 - Data Acquisition1234_MH.pptx
cyber forensics and digitalforensics.pdf
data acquisition in computer forensics and
Ch 04 Data Acquisition for Digital Forensics.ppt
Computer Forensics and investigation module 3
computer forensic tools-Hardware & Software tools
You suck at Memory Analysis
Preserving and recovering digital evidence
Clape n
Kernel Recipes 2015: Solving the Linux storage scalability bottlenecks
Android forensics an Custom Recovery Image
LST Toolkit: Exfiltration Over Sound, Light, Touch
Hard Disk Data Acquisition
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Ad

More from Marco Alamanni (7)

ODP
Introduction to memory forensics
ODP
File carving tools
ODP
File carving overview
ODP
Extracting and analyzing browser,email and IM artifacts
ODP
Brief introduction to digital forensics
PPT
Oracle Database Vault
PDF
Trust:concetti generali e teoria formale
Introduction to memory forensics
File carving tools
File carving overview
Extracting and analyzing browser,email and IM artifacts
Brief introduction to digital forensics
Oracle Database Vault
Trust:concetti generali e teoria formale

Recently uploaded (20)

PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
System and Network Administraation Chapter 3
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
top salesforce developer skills in 2025.pdf
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PPTX
Reimagine Home Health with the Power of Agentic AI​
PPTX
Introduction to Artificial Intelligence
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
iTop VPN Free 5.6.0.5262 Crack latest version 2025
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
System and Network Administraation Chapter 3
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Wondershare Filmora 15 Crack With Activation Key [2025
Odoo POS Development Services by CandidRoot Solutions
Softaken Excel to vCard Converter Software.pdf
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
top salesforce developer skills in 2025.pdf
Which alternative to Crystal Reports is best for small or large businesses.pdf
How to Choose the Right IT Partner for Your Business in Malaysia
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Reimagine Home Health with the Power of Agentic AI​
Introduction to Artificial Intelligence
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PTS Company Brochure 2025 (1).pdf.......
iTop VPN Free 5.6.0.5262 Crack latest version 2025

Introduction to forensic imaging

  • 1. Digital forensics with Kali Linux Marco Alamanni Section 2 Acquiring forensic images www.packtpub.com
  • 2. In this Section, we are going to take a look at…  Introduction to the forensic image acquisition process.  Acquiring images with dcfldd and dc3dd.  Acquiring images with a GUI tool: Guymager
  • 3. Digital forensics with Kali Linux Marco Alamanni Video 2.1 Introduction to forensic imaging
  • 4. In this Video, we are going to take a look at… • Introduction to the basic concepts of forensic imaging. • Hardware and software write-blocking techniques. • Forensic image formats. • Hard disks geometry and ATA features: DCO and HPA
  • 5. Introduction to forensic imaging • Forensic image acquisition is the process of acquiring a forensically sound copy or image of the device or media to analyze. • Forensically sound means that the we shall be able to verify that the image is an exact copy of the original and the procedure used to acquire it shall be documented. • The image file is the basis on which the examiner works to find the evidence.
  • 6. Introduction to forensic imaging • A forensic image is a bit by bit copy of the media to analyze. • It’s not simply cloning the file system, it’s a copy of all the raw disk (or partition) sectors. • The original media must not be altered in any way! • The integrity of the image file shall be verified and I/O errors logged. (see NIST CFTT: Testing Disk Imaging Tools)
  • 7. Introduction to forensic imaging • Two scenarios when acquiring a forensic image: the hard drive is removed or not removed from the suspect computer. • In the first case, we use a forensic live cd, like Kali Linux. Forensic live cds shall be booted in forensic mode. • In the second case, we must attach the drive to a forensic workstation using a write blocking mechanism.
  • 8. Hardware and software write blocking • Write blocking mechanisms can be implemented in hardware or software. • Hardware write blockers are devices that protect the drive from writes and could have different type of connectors. • Are quite expensive but their use is preferable.
  • 10. Software write blocking • Software write blocking is quite a controversial topic. • Simply mounting a drive as read-only doesn’t fully guarantee that it is not written! • Various techniques have been developed.
  • 11. Software write blocking • Linux write blocker kernel patch written by M.Suhanov. • It blocks the write commands at the device driver level. • But requires the kernel to be recompiled.
  • 12. Forensic image formats • A raw image is a duplicate of all the sectors of a disk or partition. • It contains no additional metadata. • Can be obtained by tools like dd (Data Dump). Variants of dd have been developed for forensics.
  • 13. Forensic image formats • Another open forensic format is the Advanced Forensic Format (AFF) (S. Garfinkel). • It supports compression and encryption of images. • AFFlib package to convert and manage AFF images.
  • 14. Forensic image formats • Proprietary formats: Expert Witness Format (EWF) and SMART • Both supports compression and encryption of images. • libewf package to convert and manage ewf images.
  • 16. Hard disk addressing: CHS and LBA • CHS (Cylinder-Head-Sector) is the traditional physical block addressing scheme. • Outdated but still used. • LBA (Logical Block Addressing) is a linear addressing scheme that replaced CHS addressing. • Sectors are located by a 48 bits integer index.
  • 17. Hard disk addressing: CHS and LBA
  • 18. Hard disk forensics: DCO and HPA • Two features introduced in the ATA standard that are relevant to digital forensics: DCO (Device configuration overlay) and HPA (Host protected area). • DCO allows to configure reported disk capacity and features. • HPA hides disk areas to the OS and reserves them to store data. • Both features have been abused to hide illicit data.
  • 19. Hard disk forensics: DCO and HPA • Both DCO and HPA can be revealed and removed with a command line tool: hdparm. • We are going to show its usage next.
  • 20. Summary • Introduction to the basic concepts of forensic imaging. • Hardware and software write-blocking techniques. • Forensic image formats. • Hard disks geometry and ATA features: DCO and HPA
  • 21. Next Video Introduction to dcfldd and dc3dd