SlideShare a Scribd company logo
1 of 6
Download to read offline
iam giving you entire process of forensc duplication;
the response strategy for forensc duplication is
Decision of when to perform a forensic duplication based is based, in part, on existing response
strategy for the instant situation
For example, many organizations have a policy of creating forensic HD duplicates of all PCs
used by executives that leave the organization.
Forensic Duplicates as Admissible Evidence;
Existing legal standards define minimum criteria for an item to be admitted into evidence
Collection process usually under scrutiny as well
Federal Rules of Evidence ;
Federal Rules of Evidence (FRE) 1002 state that the item or information presented in court must
be the original.
Exceptions: Definitions and Duplicates
If data are stored by computer or similar device, any printout or other output readable by sight,
shown to reflect the data accurately, is an original. Admissibility of Duplicates
A duplicate is admissible to the same extent as an original unless: • A genuine question is raised
as to the authenticity of the original, or • In the circumstances it would be unfair to admit the
duplicate in lieu of the original
first of all what is forensics duplication
A file that contains every bit of information from the source in a raw bitstream format.
Tools that create forensic duplicates:
1. dd
2. FTK Imager, Access Data
3. Dfcldd, US DOD Computer Forensics Lab version of the dd comand
Qualified Forensic Duplicate?
A file that contains every bit of information from the source, but may be stored in a altered form.
Tools that create qualified forensic duplicate output files:
1. SafeBack
2. EnCase
3. FTK Imager
Restored Image;
A restored image is what you get when you restore a forensic duplicate or a qualified forensic
duplicate to another storage medium.
Mismatched drive geometries can cause problems.
HD Development;
When hard drives grew beyond 512MB, the PC-BIOS needed to be updated (to recognize larger
drives). …software emulated a modern BIOS. Software pushed all of the real data on the drive
down one sector and stored its program and information in sector 2.
The real partition table would be at cylinder 0, head 0, sector2. Safeback, EnCase, FTK Imager,
and dd will create a restored image from the qualified forensic duplicate. EnCase and dd images
may not need to be restored. Treat images as virtual disks, eliminating the need for restoration.
Note, FTK Imager can create images in the EnCase Format
Mirror Image ;
Created from hardware that does at bit for bit copy from one hard drive to another.
Requires two identical hard drives
Doesn’t happen very often.
Tool Requirements: Forensic Duplication ;
Tool must: Create a forensic duplicate or mirror image of the original.
Handle read errors in a robust and graceful manner.
Not make any changes to source medium.
Capable of scientific and peer review.
Results must be third party repeatable and verifiable.
Legal Issues
Tools used for forensic duplication must pass the legal tests for reliability.
Note, when tool is generally accepted by others in the field, it is easier to prove that information
was gathered in a reliable, accurate manner.
Creating a Forensic Duplicate of a Hard Drive;
dd, part of the GNU software suite.
dcfldd, from the DOD
dd utility the most reliable tool for creating a true forensic duplicate image.
Dd a tool that you should be intimately familiar with before you need to use it on a real
investigation.
Process by step by step;
1.Creating Linux boot media
2.Start with a precompiled version of Linux.
3. Once you have the basic package up and running, disassemble the packages and add your own
binaries, such as dcfldd.
4, In certain situations, duplications will be stored in a series of files that are sized to fit on a
particular media type (such as CDs or DVDs) or file system type (such as files under 2.1 GB).
Called a segmented image.
Most commercial forensic packages have the ability to process segmented images.
Creating A Qualified Forensic Duplicate
Never boot from evidence drive.
In preparation, create a bootable disk
To prevent compressed disks from loading and changing time stamps, disable the
DRVSPACE.BIN driver file
Hack IO.SYS
instances need to be changed
SafeBack;
SafeBack, a small application that is designed to run from a DOS boot floppy Requires a clean
DOS environment ready on a boot floppy. Offered by New Technologies Inc. (NTI)
Four operating modes
Backup function Produces a forensically sound image file for the source media.
Restore function Restores forensically sound image files.
Verify function Verifies the checksum values within an image file.
Copy function Performs the Backup and Restore operations in one action
Text authors prefer to use the Backup function to create an image file for creating a qualified
forensic duplicate. SafeBack includes a logging function that records options used for each
session.
What happens if any steps are skipped or not performed;
Do not skip a step in the forensic duplication for the sake of expedincy
Solution
iam giving you entire process of forensc duplication;
the response strategy for forensc duplication is
Decision of when to perform a forensic duplication based is based, in part, on existing response
strategy for the instant situation
For example, many organizations have a policy of creating forensic HD duplicates of all PCs
used by executives that leave the organization.
Forensic Duplicates as Admissible Evidence;
Existing legal standards define minimum criteria for an item to be admitted into evidence
Collection process usually under scrutiny as well
Federal Rules of Evidence ;
Federal Rules of Evidence (FRE) 1002 state that the item or information presented in court must
be the original.
Exceptions: Definitions and Duplicates
If data are stored by computer or similar device, any printout or other output readable by sight,
shown to reflect the data accurately, is an original. Admissibility of Duplicates
A duplicate is admissible to the same extent as an original unless: • A genuine question is raised
as to the authenticity of the original, or • In the circumstances it would be unfair to admit the
duplicate in lieu of the original
first of all what is forensics duplication
A file that contains every bit of information from the source in a raw bitstream format.
Tools that create forensic duplicates:
1. dd
2. FTK Imager, Access Data
3. Dfcldd, US DOD Computer Forensics Lab version of the dd comand
Qualified Forensic Duplicate?
A file that contains every bit of information from the source, but may be stored in a altered form.
Tools that create qualified forensic duplicate output files:
1. SafeBack
2. EnCase
3. FTK Imager
Restored Image;
A restored image is what you get when you restore a forensic duplicate or a qualified forensic
duplicate to another storage medium.
Mismatched drive geometries can cause problems.
HD Development;
When hard drives grew beyond 512MB, the PC-BIOS needed to be updated (to recognize larger
drives). …software emulated a modern BIOS. Software pushed all of the real data on the drive
down one sector and stored its program and information in sector 2.
The real partition table would be at cylinder 0, head 0, sector2. Safeback, EnCase, FTK Imager,
and dd will create a restored image from the qualified forensic duplicate. EnCase and dd images
may not need to be restored. Treat images as virtual disks, eliminating the need for restoration.
Note, FTK Imager can create images in the EnCase Format
Mirror Image ;
Created from hardware that does at bit for bit copy from one hard drive to another.
Requires two identical hard drives
Doesn’t happen very often.
Tool Requirements: Forensic Duplication ;
Tool must: Create a forensic duplicate or mirror image of the original.
Handle read errors in a robust and graceful manner.
Not make any changes to source medium.
Capable of scientific and peer review.
Results must be third party repeatable and verifiable.
Legal Issues
Tools used for forensic duplication must pass the legal tests for reliability.
Note, when tool is generally accepted by others in the field, it is easier to prove that information
was gathered in a reliable, accurate manner.
Creating a Forensic Duplicate of a Hard Drive;
dd, part of the GNU software suite.
dcfldd, from the DOD
dd utility the most reliable tool for creating a true forensic duplicate image.
Dd a tool that you should be intimately familiar with before you need to use it on a real
investigation.
Process by step by step;
1.Creating Linux boot media
2.Start with a precompiled version of Linux.
3. Once you have the basic package up and running, disassemble the packages and add your own
binaries, such as dcfldd.
4, In certain situations, duplications will be stored in a series of files that are sized to fit on a
particular media type (such as CDs or DVDs) or file system type (such as files under 2.1 GB).
Called a segmented image.
Most commercial forensic packages have the ability to process segmented images.
Creating A Qualified Forensic Duplicate
Never boot from evidence drive.
In preparation, create a bootable disk
To prevent compressed disks from loading and changing time stamps, disable the
DRVSPACE.BIN driver file
Hack IO.SYS
instances need to be changed
SafeBack;
SafeBack, a small application that is designed to run from a DOS boot floppy Requires a clean
DOS environment ready on a boot floppy. Offered by New Technologies Inc. (NTI)
Four operating modes
Backup function Produces a forensically sound image file for the source media.
Restore function Restores forensically sound image files.
Verify function Verifies the checksum values within an image file.
Copy function Performs the Backup and Restore operations in one action
Text authors prefer to use the Backup function to create an image file for creating a qualified
forensic duplicate. SafeBack includes a logging function that records options used for each
session.
What happens if any steps are skipped or not performed;
Do not skip a step in the forensic duplication for the sake of expedincy

More Related Content

Similar to iam giving you entire process of  forensc duplication;the response.pdf

External storage-transfer-2
External storage-transfer-2External storage-transfer-2
External storage-transfer-2ssuser1eca7d
 
First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]Phil Huggins FBCS CITP
 
logical volume manager.ppt
logical volume manager.pptlogical volume manager.ppt
logical volume manager.pptPandiya Rajan
 
Administering windows xp
Administering windows xpAdministering windows xp
Administering windows xpSamaja
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newKatherineJack1
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newEmmaJack2018
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newmarysherman2018
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newsweetsour2017
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newLillieDickey
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newsarahlazeto
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newlizabonilla
 
Hpe data protector deduplication
Hpe data protector deduplicationHpe data protector deduplication
Hpe data protector deduplicationAndrey Karpov
 
Pc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshootingPc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshootingTech Day Camp
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic InvestigatorAgape Inc
 
2022 fixed cant read from source file or disk error
2022 fixed cant read from source file or disk error2022 fixed cant read from source file or disk error
2022 fixed cant read from source file or disk errorZoey Chen
 

Similar to iam giving you entire process of  forensc duplication;the response.pdf (20)

Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Capturing forensics image
Capturing forensics imageCapturing forensics image
Capturing forensics image
 
External storage-transfer-2
External storage-transfer-2External storage-transfer-2
External storage-transfer-2
 
Deft
DeftDeft
Deft
 
First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]
 
logical volume manager.ppt
logical volume manager.pptlogical volume manager.ppt
logical volume manager.ppt
 
Administering windows xp
Administering windows xpAdministering windows xp
Administering windows xp
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Hpe data protector deduplication
Hpe data protector deduplicationHpe data protector deduplication
Hpe data protector deduplication
 
Pc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshootingPc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshooting
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
File000127
File000127File000127
File000127
 
2022 fixed cant read from source file or disk error
2022 fixed cant read from source file or disk error2022 fixed cant read from source file or disk error
2022 fixed cant read from source file or disk error
 

More from mukhtaransarcloth

S monoclinic is most stable since entropy is the .pdf
                     S monoclinic is most stable since entropy is the .pdf                     S monoclinic is most stable since entropy is the .pdf
S monoclinic is most stable since entropy is the .pdfmukhtaransarcloth
 
Option D is correct. B is limiting reagent .pdf
                     Option D is correct.  B is limiting reagent      .pdf                     Option D is correct.  B is limiting reagent      .pdf
Option D is correct. B is limiting reagent .pdfmukhtaransarcloth
 
Let us assume the conc of Ba(OH)2 is known to us .pdf
                     Let us assume the conc of Ba(OH)2 is known to us .pdf                     Let us assume the conc of Ba(OH)2 is known to us .pdf
Let us assume the conc of Ba(OH)2 is known to us .pdfmukhtaransarcloth
 
london dispersion forces .pdf
                     london dispersion forces                         .pdf                     london dispersion forces                         .pdf
london dispersion forces .pdfmukhtaransarcloth
 
Methods a, b, c, and e are formal additions of H2.pdf
                     Methods a, b, c, and e are formal additions of H2.pdf                     Methods a, b, c, and e are formal additions of H2.pdf
Methods a, b, c, and e are formal additions of H2.pdfmukhtaransarcloth
 
h2s4 structure is H-S-S-S-S-H there for two middl.pdf
                     h2s4 structure is H-S-S-S-S-H there for two middl.pdf                     h2s4 structure is H-S-S-S-S-H there for two middl.pdf
h2s4 structure is H-S-S-S-S-H there for two middl.pdfmukhtaransarcloth
 
freezing point decreases with increase in imp.pdf
                     freezing point decreases   with  increase  in imp.pdf                     freezing point decreases   with  increase  in imp.pdf
freezing point decreases with increase in imp.pdfmukhtaransarcloth
 
We are currently living in the so-called information age which can b.pdf
We are currently living in the so-called information age which can b.pdfWe are currently living in the so-called information age which can b.pdf
We are currently living in the so-called information age which can b.pdfmukhtaransarcloth
 
The balanced equation is2 H2O2 = 2 H2O + O2SolutionThe bal.pdf
The balanced equation is2 H2O2 = 2 H2O + O2SolutionThe bal.pdfThe balanced equation is2 H2O2 = 2 H2O + O2SolutionThe bal.pdf
The balanced equation is2 H2O2 = 2 H2O + O2SolutionThe bal.pdfmukhtaransarcloth
 
Tay-Sachs disease is caused by a mutation (abnormal change) in the g.pdf
Tay-Sachs disease is caused by a mutation (abnormal change) in the g.pdfTay-Sachs disease is caused by a mutation (abnormal change) in the g.pdf
Tay-Sachs disease is caused by a mutation (abnormal change) in the g.pdfmukhtaransarcloth
 
E.) is less acidic in other A ,B triple bond an.pdf
                     E.) is less acidic   in other A ,B triple bond an.pdf                     E.) is less acidic   in other A ,B triple bond an.pdf
E.) is less acidic in other A ,B triple bond an.pdfmukhtaransarcloth
 
Solution when user sending the email, then user should select eithe.pdf
Solution when user sending the email, then user should select eithe.pdfSolution when user sending the email, then user should select eithe.pdf
Solution when user sending the email, then user should select eithe.pdfmukhtaransarcloth
 
publicclass Date {privatestatic String DATE_SEPARATOR = ;pr.pdf
publicclass Date {privatestatic String DATE_SEPARATOR = ;pr.pdfpublicclass Date {privatestatic String DATE_SEPARATOR = ;pr.pdf
publicclass Date {privatestatic String DATE_SEPARATOR = ;pr.pdfmukhtaransarcloth
 
please give me points as nobody ecen noticed the qusetion as it is u.pdf
please give me points as nobody ecen noticed the qusetion as it is u.pdfplease give me points as nobody ecen noticed the qusetion as it is u.pdf
please give me points as nobody ecen noticed the qusetion as it is u.pdfmukhtaransarcloth
 
Part-IQuestion 1. What is Dr. Warren’s hypothesis regarding the ba.pdf
Part-IQuestion 1. What is Dr. Warren’s hypothesis regarding the ba.pdfPart-IQuestion 1. What is Dr. Warren’s hypothesis regarding the ba.pdf
Part-IQuestion 1. What is Dr. Warren’s hypothesis regarding the ba.pdfmukhtaransarcloth
 
Peru is not a part of the Southern South America.SolutionPeru .pdf
Peru is not a part of the Southern South America.SolutionPeru .pdfPeru is not a part of the Southern South America.SolutionPeru .pdf
Peru is not a part of the Southern South America.SolutionPeru .pdfmukhtaransarcloth
 
Combustion of glucose is respiration. The equatio.pdf
                     Combustion of glucose is respiration. The equatio.pdf                     Combustion of glucose is respiration. The equatio.pdf
Combustion of glucose is respiration. The equatio.pdfmukhtaransarcloth
 
in truss one...the forces in the member BC and DE have zero.in tru.pdf
in truss one...the forces in the member BC and DE have zero.in tru.pdfin truss one...the forces in the member BC and DE have zero.in tru.pdf
in truss one...the forces in the member BC and DE have zero.in tru.pdfmukhtaransarcloth
 
How does traffic analysis work Internet data packets have two parts.pdf
How does traffic analysis work Internet data packets have two parts.pdfHow does traffic analysis work Internet data packets have two parts.pdf
How does traffic analysis work Internet data packets have two parts.pdfmukhtaransarcloth
 

More from mukhtaransarcloth (20)

S monoclinic is most stable since entropy is the .pdf
                     S monoclinic is most stable since entropy is the .pdf                     S monoclinic is most stable since entropy is the .pdf
S monoclinic is most stable since entropy is the .pdf
 
Option D is correct. B is limiting reagent .pdf
                     Option D is correct.  B is limiting reagent      .pdf                     Option D is correct.  B is limiting reagent      .pdf
Option D is correct. B is limiting reagent .pdf
 
Let us assume the conc of Ba(OH)2 is known to us .pdf
                     Let us assume the conc of Ba(OH)2 is known to us .pdf                     Let us assume the conc of Ba(OH)2 is known to us .pdf
Let us assume the conc of Ba(OH)2 is known to us .pdf
 
london dispersion forces .pdf
                     london dispersion forces                         .pdf                     london dispersion forces                         .pdf
london dispersion forces .pdf
 
Methods a, b, c, and e are formal additions of H2.pdf
                     Methods a, b, c, and e are formal additions of H2.pdf                     Methods a, b, c, and e are formal additions of H2.pdf
Methods a, b, c, and e are formal additions of H2.pdf
 
h2s4 structure is H-S-S-S-S-H there for two middl.pdf
                     h2s4 structure is H-S-S-S-S-H there for two middl.pdf                     h2s4 structure is H-S-S-S-S-H there for two middl.pdf
h2s4 structure is H-S-S-S-S-H there for two middl.pdf
 
freezing point decreases with increase in imp.pdf
                     freezing point decreases   with  increase  in imp.pdf                     freezing point decreases   with  increase  in imp.pdf
freezing point decreases with increase in imp.pdf
 
We are currently living in the so-called information age which can b.pdf
We are currently living in the so-called information age which can b.pdfWe are currently living in the so-called information age which can b.pdf
We are currently living in the so-called information age which can b.pdf
 
The balanced equation is2 H2O2 = 2 H2O + O2SolutionThe bal.pdf
The balanced equation is2 H2O2 = 2 H2O + O2SolutionThe bal.pdfThe balanced equation is2 H2O2 = 2 H2O + O2SolutionThe bal.pdf
The balanced equation is2 H2O2 = 2 H2O + O2SolutionThe bal.pdf
 
Tay-Sachs disease is caused by a mutation (abnormal change) in the g.pdf
Tay-Sachs disease is caused by a mutation (abnormal change) in the g.pdfTay-Sachs disease is caused by a mutation (abnormal change) in the g.pdf
Tay-Sachs disease is caused by a mutation (abnormal change) in the g.pdf
 
E.) is less acidic in other A ,B triple bond an.pdf
                     E.) is less acidic   in other A ,B triple bond an.pdf                     E.) is less acidic   in other A ,B triple bond an.pdf
E.) is less acidic in other A ,B triple bond an.pdf
 
Solution when user sending the email, then user should select eithe.pdf
Solution when user sending the email, then user should select eithe.pdfSolution when user sending the email, then user should select eithe.pdf
Solution when user sending the email, then user should select eithe.pdf
 
publicclass Date {privatestatic String DATE_SEPARATOR = ;pr.pdf
publicclass Date {privatestatic String DATE_SEPARATOR = ;pr.pdfpublicclass Date {privatestatic String DATE_SEPARATOR = ;pr.pdf
publicclass Date {privatestatic String DATE_SEPARATOR = ;pr.pdf
 
please give me points as nobody ecen noticed the qusetion as it is u.pdf
please give me points as nobody ecen noticed the qusetion as it is u.pdfplease give me points as nobody ecen noticed the qusetion as it is u.pdf
please give me points as nobody ecen noticed the qusetion as it is u.pdf
 
covalent bond .pdf
                     covalent bond                                    .pdf                     covalent bond                                    .pdf
covalent bond .pdf
 
Part-IQuestion 1. What is Dr. Warren’s hypothesis regarding the ba.pdf
Part-IQuestion 1. What is Dr. Warren’s hypothesis regarding the ba.pdfPart-IQuestion 1. What is Dr. Warren’s hypothesis regarding the ba.pdf
Part-IQuestion 1. What is Dr. Warren’s hypothesis regarding the ba.pdf
 
Peru is not a part of the Southern South America.SolutionPeru .pdf
Peru is not a part of the Southern South America.SolutionPeru .pdfPeru is not a part of the Southern South America.SolutionPeru .pdf
Peru is not a part of the Southern South America.SolutionPeru .pdf
 
Combustion of glucose is respiration. The equatio.pdf
                     Combustion of glucose is respiration. The equatio.pdf                     Combustion of glucose is respiration. The equatio.pdf
Combustion of glucose is respiration. The equatio.pdf
 
in truss one...the forces in the member BC and DE have zero.in tru.pdf
in truss one...the forces in the member BC and DE have zero.in tru.pdfin truss one...the forces in the member BC and DE have zero.in tru.pdf
in truss one...the forces in the member BC and DE have zero.in tru.pdf
 
How does traffic analysis work Internet data packets have two parts.pdf
How does traffic analysis work Internet data packets have two parts.pdfHow does traffic analysis work Internet data packets have two parts.pdf
How does traffic analysis work Internet data packets have two parts.pdf
 

Recently uploaded

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

iam giving you entire process of  forensc duplication;the response.pdf

  • 1. iam giving you entire process of forensc duplication; the response strategy for forensc duplication is Decision of when to perform a forensic duplication based is based, in part, on existing response strategy for the instant situation For example, many organizations have a policy of creating forensic HD duplicates of all PCs used by executives that leave the organization. Forensic Duplicates as Admissible Evidence; Existing legal standards define minimum criteria for an item to be admitted into evidence Collection process usually under scrutiny as well Federal Rules of Evidence ; Federal Rules of Evidence (FRE) 1002 state that the item or information presented in court must be the original. Exceptions: Definitions and Duplicates If data are stored by computer or similar device, any printout or other output readable by sight, shown to reflect the data accurately, is an original. Admissibility of Duplicates A duplicate is admissible to the same extent as an original unless: • A genuine question is raised as to the authenticity of the original, or • In the circumstances it would be unfair to admit the duplicate in lieu of the original first of all what is forensics duplication A file that contains every bit of information from the source in a raw bitstream format. Tools that create forensic duplicates: 1. dd 2. FTK Imager, Access Data 3. Dfcldd, US DOD Computer Forensics Lab version of the dd comand Qualified Forensic Duplicate? A file that contains every bit of information from the source, but may be stored in a altered form. Tools that create qualified forensic duplicate output files: 1. SafeBack 2. EnCase 3. FTK Imager Restored Image; A restored image is what you get when you restore a forensic duplicate or a qualified forensic duplicate to another storage medium. Mismatched drive geometries can cause problems. HD Development;
  • 2. When hard drives grew beyond 512MB, the PC-BIOS needed to be updated (to recognize larger drives). …software emulated a modern BIOS. Software pushed all of the real data on the drive down one sector and stored its program and information in sector 2. The real partition table would be at cylinder 0, head 0, sector2. Safeback, EnCase, FTK Imager, and dd will create a restored image from the qualified forensic duplicate. EnCase and dd images may not need to be restored. Treat images as virtual disks, eliminating the need for restoration. Note, FTK Imager can create images in the EnCase Format Mirror Image ; Created from hardware that does at bit for bit copy from one hard drive to another. Requires two identical hard drives Doesn’t happen very often. Tool Requirements: Forensic Duplication ; Tool must: Create a forensic duplicate or mirror image of the original. Handle read errors in a robust and graceful manner. Not make any changes to source medium. Capable of scientific and peer review. Results must be third party repeatable and verifiable. Legal Issues Tools used for forensic duplication must pass the legal tests for reliability. Note, when tool is generally accepted by others in the field, it is easier to prove that information was gathered in a reliable, accurate manner. Creating a Forensic Duplicate of a Hard Drive; dd, part of the GNU software suite. dcfldd, from the DOD dd utility the most reliable tool for creating a true forensic duplicate image. Dd a tool that you should be intimately familiar with before you need to use it on a real investigation. Process by step by step; 1.Creating Linux boot media 2.Start with a precompiled version of Linux. 3. Once you have the basic package up and running, disassemble the packages and add your own binaries, such as dcfldd. 4, In certain situations, duplications will be stored in a series of files that are sized to fit on a particular media type (such as CDs or DVDs) or file system type (such as files under 2.1 GB). Called a segmented image. Most commercial forensic packages have the ability to process segmented images.
  • 3. Creating A Qualified Forensic Duplicate Never boot from evidence drive. In preparation, create a bootable disk To prevent compressed disks from loading and changing time stamps, disable the DRVSPACE.BIN driver file Hack IO.SYS instances need to be changed SafeBack; SafeBack, a small application that is designed to run from a DOS boot floppy Requires a clean DOS environment ready on a boot floppy. Offered by New Technologies Inc. (NTI) Four operating modes Backup function Produces a forensically sound image file for the source media. Restore function Restores forensically sound image files. Verify function Verifies the checksum values within an image file. Copy function Performs the Backup and Restore operations in one action Text authors prefer to use the Backup function to create an image file for creating a qualified forensic duplicate. SafeBack includes a logging function that records options used for each session. What happens if any steps are skipped or not performed; Do not skip a step in the forensic duplication for the sake of expedincy Solution iam giving you entire process of forensc duplication; the response strategy for forensc duplication is Decision of when to perform a forensic duplication based is based, in part, on existing response strategy for the instant situation For example, many organizations have a policy of creating forensic HD duplicates of all PCs used by executives that leave the organization. Forensic Duplicates as Admissible Evidence; Existing legal standards define minimum criteria for an item to be admitted into evidence Collection process usually under scrutiny as well Federal Rules of Evidence ; Federal Rules of Evidence (FRE) 1002 state that the item or information presented in court must be the original.
  • 4. Exceptions: Definitions and Duplicates If data are stored by computer or similar device, any printout or other output readable by sight, shown to reflect the data accurately, is an original. Admissibility of Duplicates A duplicate is admissible to the same extent as an original unless: • A genuine question is raised as to the authenticity of the original, or • In the circumstances it would be unfair to admit the duplicate in lieu of the original first of all what is forensics duplication A file that contains every bit of information from the source in a raw bitstream format. Tools that create forensic duplicates: 1. dd 2. FTK Imager, Access Data 3. Dfcldd, US DOD Computer Forensics Lab version of the dd comand Qualified Forensic Duplicate? A file that contains every bit of information from the source, but may be stored in a altered form. Tools that create qualified forensic duplicate output files: 1. SafeBack 2. EnCase 3. FTK Imager Restored Image; A restored image is what you get when you restore a forensic duplicate or a qualified forensic duplicate to another storage medium. Mismatched drive geometries can cause problems. HD Development; When hard drives grew beyond 512MB, the PC-BIOS needed to be updated (to recognize larger drives). …software emulated a modern BIOS. Software pushed all of the real data on the drive down one sector and stored its program and information in sector 2. The real partition table would be at cylinder 0, head 0, sector2. Safeback, EnCase, FTK Imager, and dd will create a restored image from the qualified forensic duplicate. EnCase and dd images may not need to be restored. Treat images as virtual disks, eliminating the need for restoration. Note, FTK Imager can create images in the EnCase Format Mirror Image ; Created from hardware that does at bit for bit copy from one hard drive to another. Requires two identical hard drives Doesn’t happen very often. Tool Requirements: Forensic Duplication ; Tool must: Create a forensic duplicate or mirror image of the original.
  • 5. Handle read errors in a robust and graceful manner. Not make any changes to source medium. Capable of scientific and peer review. Results must be third party repeatable and verifiable. Legal Issues Tools used for forensic duplication must pass the legal tests for reliability. Note, when tool is generally accepted by others in the field, it is easier to prove that information was gathered in a reliable, accurate manner. Creating a Forensic Duplicate of a Hard Drive; dd, part of the GNU software suite. dcfldd, from the DOD dd utility the most reliable tool for creating a true forensic duplicate image. Dd a tool that you should be intimately familiar with before you need to use it on a real investigation. Process by step by step; 1.Creating Linux boot media 2.Start with a precompiled version of Linux. 3. Once you have the basic package up and running, disassemble the packages and add your own binaries, such as dcfldd. 4, In certain situations, duplications will be stored in a series of files that are sized to fit on a particular media type (such as CDs or DVDs) or file system type (such as files under 2.1 GB). Called a segmented image. Most commercial forensic packages have the ability to process segmented images. Creating A Qualified Forensic Duplicate Never boot from evidence drive. In preparation, create a bootable disk To prevent compressed disks from loading and changing time stamps, disable the DRVSPACE.BIN driver file Hack IO.SYS instances need to be changed SafeBack; SafeBack, a small application that is designed to run from a DOS boot floppy Requires a clean DOS environment ready on a boot floppy. Offered by New Technologies Inc. (NTI) Four operating modes Backup function Produces a forensically sound image file for the source media. Restore function Restores forensically sound image files.
  • 6. Verify function Verifies the checksum values within an image file. Copy function Performs the Backup and Restore operations in one action Text authors prefer to use the Backup function to create an image file for creating a qualified forensic duplicate. SafeBack includes a logging function that records options used for each session. What happens if any steps are skipped or not performed; Do not skip a step in the forensic duplication for the sake of expedincy