Disk Imaging and Analysis
(OBJ 4.8)
Walkthrough of creating a disk image from a USB using DD
- Connect your USB thumb stick through a write blocker
- Use
fdisk -lto list the devices that you have available.- The USB device should look something like this
... Disk /dev/sdb: 1.9 GiB, 2003828736 bytes, 3913728 sectors Units: sectors of 1 * 512 = 512 bytes ... - Enter
DD bs-64k if-/dev/sdb of-usb2gb.ddto start copying a drivebs-64is setting block size of 64 kilobytesif-/dev/sdbsets the input file to whatever the disk you want to select- Here is where you decide to either copy the entire disk or just one partition
- For the entire disk use
/dev/sdb(the whole name of the disk)
of-usb2gb.dddefines the output file- After it finished, you will see in the current working directory the output file listed
- Create a hash using
md5sum usb2gb.dd- It will calculate it and output it
- Consider also using a SHA-1 or a SHA-256 hash because remember MD5 is considered a little bit weak
- Download and install the FTK Imager on Windows, run it, give it administrative permission.
- Inside FTK Imager, go to 'Files' and then go down to Create Disk Image.
- Select whether a physical image or a logical drive, an image file, contents of a folder, or multiple CDs and DVDs.
- Click 'Next'
- Select available drives and click 'Finish'
- Select where to save the file to be created
- Raw (dd), SMART, E01, AFF
- Any forensic tool can use dd format
- Give it any information you want
- Case Number
- Evidence Number
- Unique Description Examiner
- Notes
- Click 'Next'
- Select place to be stored
- Set the Image Filename
- See the drive results including MD5 hash, SHA1 hash
- Hit 'Close'
- You will notice a couple new files on the folder you selected the image to be stored
- USB2GB.dd.001 (1.5GB) is where the software by default is going to break these into chunks.
- Chunks it into a separate file so you will be able to read it.
- USB2GB.dd.001 (Text Document) having the summary contents for us.
- Tells us it was created by FTK, and this is part of our chain of custody now.
- Tell us what the drive looked like
- Shows hashes before and after the image is copied
- USB2GB.dd.001 (1.5GB) is where the software by default is going to break these into chunks.
- To open this dd file we're going to do that inside of FTK and we can analyze it.
- Do 'File' on top left
- Add evidence item, it's gonna be an 'Image file' this time
- Find it and open the 001 dd file.
- As you open it you will see the partitioned and the unpartitioned space
/CAP/Security+/Visual%20Aids/Pasted%20image%2020250723232847.png)
- Any files that may have been hidden will show up in the Unallocated space
- Open up the drive, take a look at the root of the drive, you will see the different types of drives with files on it/
- Notice the ones with Xs, these are deleted files
/CAP/Security+/Visual%20Aids/Pasted%20image%2020250723233055.png)
- Some of these files can be restored using this forensic software
- Notice the ones with Xs, these are deleted files