So imaging concepts forensic imaging is conducted to preserve the integrity of the original evidence by creating an exact duplicate.
And pretty cool thing about digital forensics separates it from a lot of the other forensics fields
is that when we conduct our investigations, we essentially preserve evidence on we preserved a lot better than some of the other forensic sciences. For instance, if you have someone who is conducting an autopsy of a cadaver and they remove certain
portions of the cadaver and they're doing their scientific test,
they are in fact destroying that evidence that they have. Whereas in the digital forensics realm, we're making an exact copy. And then all of the investigation that we're doing is with that copy, and we believe the original evidence intact.
So therefore, when making these copies, it is important to consider the size of the media being image, number of devices and the access to the media. So obviously, if we're going to image a 500 gigabyte hard drive,
we need to have at least a 500 gigabyte hard drive
to image art attitude.
Also, keep in mind that we're going to want to use some type of forensic right blocker to protect the evidence against alteration during imaging process. And those right blockers can either be software in or hardware based
And then, lastly, the integrity of the images should be validated through action and then matching the hash values from the original evidence to the forensic image that we created
verified that those images are identical. And then when we image this thumb drive that I have during our hands on portion, you'll see that the image that is created on our forensic media is going to be an exact duplicate
of the information that was contained on that
And the way we were able to ascertain that is that the MD five hash is due in fact, match.
Uh, the first thing, however, that we want to do when we,
start to collecting data is to ensure that we have forensically wipe the media. Now. This should be conducted during our preservation face, but we'll go ahead and cover it again here,
so wiping the media ensures every bit of data on that device that we have is his wife with a predetermined are unknown value.
I generally used ze rubs and the the in case imager will let you change whatever Hexi decimal value would like to overwrite that that device with
on. Then you can check it using some type of hex editor to see that that dad isn't has in fact been white.
And then wiping will allow the investigator to sanitize the media to ensure no data is left on the device. Keep in mind, though, it is not leading to death.
Leading the data essentially still leaves the data on the device. Just says that that space is open to be written to
wiping the media eliminates any possibility of cross contamination because it overwrites every bit
of that device with your predetermined values.
Also, keep in mind formatting your device does not delete the data, but there are no links to view the files larger.
So conducting that forensic white is going to be great importance, especially if you're gonna go to court
because on attorney could ask, How do you know that my client did have this bad image on his computer because it could have been on your media when you collected the data from my client's computer system?
And of course, your retort to that would be No, there's no way that it was going to be on my forensically white media because I used this process where I take my media and I wipe it,
uh, with zeros using the in case forensic imager, and that ensures that there are no data left on my forensic meeting.
So again, if you're going to go to court, this process is going to be very important. However, even if you're not going to court having a clean piece of media and then inserting that into forensic viewer, your forensic analyst program just
helps to ensure the integrity of that data
and that you're not cross content.
So we'll talk about your logical versus a physical wife. Logical White completely eliminates files or logical volumes and
may be able to override all the sectors that are considered analogue created space. However, it does not wiped partition space such as partition tables are Valium boot records.
Ah, physical wipe of the system, which is what we generally try to do every single time overwrites the entire physical disc, all drives all petitions, all volumes, files and slack space. Bottom line, everything's gone.
Once wiping is complete. Verify the White by using a disc editor, Hex editor and I will show you again during the handle on portion how to do that and how to look through that device and ensure that it hasn't been wiped with zeros.
After you have that forensically clean media that white media, The next process is to actually conduct the acquisition of death.
acquisition of media will include any type of store electronic storage device capable of retaining that.
So that could include hard drives, tapes, optical media, thumb drives, external hard drive servers, etcetera.
If they can hold data,
uh, then you should be able to figure out how to acquire the data from that media.
However, before we're moving there any interacting with any acquired media, investigators should photograph and document the location
that the media is discovered in and indicate the type of media that you have discovered in your notes. So, like we talked about the very pedantic, very specific way of recording, I have found a too big a bite or a sand s cruiser titanium thumb drive with serial number
and then I have taken a picture of it and it is included in my notes.
And then keep in mind that the media should not be altered in any way and ensure that the media is not altered by using that light blocking device. Once you go, thio, acquire the data from it. So speaking of right blockers, a right blocker
is a piece of software or hardware that prevents data from being written
to your discovered storage media.
So many forensic software providers also make your right blocker to accompany their products. So
I know there's one the taboo right blockers. They are good.
Ah, hardware right blocker that sits in line with any type of discovered media and your
forensically playing media.
There are about 4 $500 on up, depending on which model you select. For the purposes of this,
this course in for our discussion, we're going to be using a free software right locker that you didn't get Source Forge, which is going to be the USB right blocker for all windows, and you can go to the source forge link
Also, keep in mind that you want to have a set of trusted tools as you're going about doing forensic investigation,
and some of the tools that we've talked about are going to talk about are going to be or imaging programs such as the F T K imager or the In Case Imager.
We'll also discuss a little bit of Mandy. It's red line.
However, it's also important to have essentially Cem command line tools that you can run on a system
when you do find system.
You may or may not know what has happened to that system,
who touched the system and what type of investigation that you're doing.
That being said, you'll want to have certain command functions on your trusted Tulis, such as your command prompt
and some of the command such a PS list P s log on. I peek and fig
your net stats P s. And you'll wanna have all of those potential commands loaded onto your trusted tool kit. I love mine onto a removable are portable USB device,
and that way, when you find your victim's system, you can run all of your
commands from your device and not have to rely on,
commands from more victim machine
so those were just a small this
of some of the trusted tools that you're gonna want to create have available. When we get into the hands on portion, I will show you a larger list of trusted tools that I have on my
my thumb drive, and you can download some of tools that you think that you're going to need or want in more forensic investigations.