Disk Imaging and Acquisition
Disk Imaging and Acquisition
Creating forensic images preserves the entire disk state for analysis:
Imaging Methods:
Physical Imaging: Bit-for-bit copy of entire disk
- Captures deleted files and slack space
- Includes hidden partitions
- Requires more storage space
- Tools: dd, dcfldd, FTK Imager, EnCase
Logical Imaging: Copies active file system
- Faster than physical imaging
- Smaller storage requirements
- Misses deleted data
- Suitable for targeted collection
Write Blocking: Hardware or software write blockers prevent accidental modification:
- Hardware blockers: Tableau, WiebeTech
- Software blockers: Windows Registry modification, Linux mounting options
Imaging Process:
- Document source media (model, serial, capacity)
- Connect through write blocker
- Calculate source hash
- Create forensic image
- Verify image hash matches source
- Create working copy for analysis