Become Computer Forensics Expert & Start your career!
Last updated
Last updated
Udemy course: by EH Academy approx. 1.5hrs long
Things you will learn:
Understand the process to handle a crime scene
Conduct computer forensics analysis to find the evidence
Maintain the integrity of the data and will able to perform hashing
Learn the process to acquire disk images and the process to analyze disks
Collection - plan for acquiring the data and what are the sources of data
Examination - sift and extract data of interest for evidence
Analysis - analyse data gathered and draw conclusions
Reporting - present information
Disk imaging - exact copies of storage media and protect the original data storage.
Evidence: evidence is hidden
Destination image types:
(a) Raw (disk dump)
(b) E01 (encase file format)
(c) SMART (metadata is on another file)
(d) AFF (data and meta are all in a file)
Create image and note hash values. If hash values are altered, data integrity is lost.
Important to validate hash value before and after copy to ensure nothing is altered.
Analyse disk image on Windows:
FTK Imager extracts evidence
Overview shows a summary of all the data files on the disk image (includes deleted files)
2. ProDiscover Basic analyses the connected disk e.g. USB drive, shows content and cluster view depending on preferences
Create disk image on Linux:
DD command line
Dcfldd - advanced version of DD
Process for Creating Disk Image on Linux
Identify partition fdisk -l
Check the system file and space parted -l
Create a folder and mount it on Linux file system sudo mkdir /mnt/example
Mount the drive on the created folder sudo mount /dev/sdb /mnt/example
Create another folder for case analysis mkdir /mnt/example/case
Note the details in output file fdisk fdisk -l >/mnt/example/case/fdisk.txt
Create the image, store md5 and sha256 in the selected folder dcfldd if=/dev/sdb hash=md5,sha256 hashwindow=1G md5log=/root/md5.txt sha256log=/root/sha256.txt hashcon=after conv=noerror,syncof=/root/diskimage.dd
Analyse disk image on Linux:
Autopsy analyses the disk image by showing system information, metadata information, file information.
Examine disk image on Linux:
Digital Forensics Framework in Linux uses open-source technologies. It can find hidden data, recover deleted files, analyse files and examine metadata.
First up, with 1.5hrs of learning, you can't become a professional like what they say. The content is an overview of the forensic processes and introduction to some commonly used tools. Good stepping stone to explore in-depth into Forensics!