www.digitalforensics.com Open in urlscan Pro
2606:4700:10::6814:2d1d  Public Scan

URL: https://www.digitalforensics.com/blog/how-to-make-the-forensic-image-of-the-hard-drive/
Submission: On March 16 via manual from CA — Scanned from DE

Form analysis 5 forms found in the DOM

GET https://www.digitalforensics.com/blog/

<form role="search" method="get" class="searchform" action="https://www.digitalforensics.com/blog/">
  <input type="text" value="" name="s" placeholder="Type to search">
</form>

POST https://www.digitalforensics.com/blog/wp-comments-post.php

<form action="https://www.digitalforensics.com/blog/wp-comments-post.php" method="post" id="commentform" class="comment-form">
  <style type="text/css">
    .wp-social-login-connect-with {}

    .wp-social-login-provider-list {}

    .wp-social-login-provider-list a {}

    .wp-social-login-provider-list img {}

    .wsl_connect_with_provider {}
  </style>
  <div class="wp-social-login-widget">
    <div class="wp-social-login-connect-with">Connect with:</div>
    <div class="wp-social-login-provider-list">
      <a rel="nofollow" href="https://www.digitalforensics.com/blog/login/?action=wordpress_social_authenticate&amp;mode=login&amp;provider=LinkedIn&amp;redirect_to=https%3A%2F%2Fwww.digitalforensics.com%2Fblog%2Fhow-to-make-the-forensic-image-of-the-hard-drive%2F" title="Connect with LinkedIn" class="wp-social-login-provider wp-social-login-provider-linkedin" data-provider="LinkedIn" role="button">
<img alt="LinkedIn" src="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%200%200'%3E%3C/svg%3E" aria-hidden="true" data-lazy-src="https://www.digitalforensics.com/blog/wp-content/plugins/wordpress-social-login/assets/img/32x32/wpzoom/linkedin.png"><noscript><img alt="LinkedIn" src="https://www.digitalforensics.com/blog/wp-content/plugins/wordpress-social-login/assets/img/32x32/wpzoom/linkedin.png" aria-hidden="true"></noscript>
</a>
    </div>
    <div class="wp-social-login-widget-clearing"></div>
  </div>
  <div class="comment-fields-container full">
    <div class="comment-fields-inner"><textarea id="comment" class="form-control" name="comment" aria-required="true" rows="8" placeholder="Additional Comments (optional)"></textarea><input id="author" class="form-control" name="author" type="text"
        value="" placeholder="Name">
      <input id="email" class="form-control" name="email" type="text" value="" placeholder="E-mail">
      <input id="url" class="form-control" name="url" type="text" value="" placeholder="Website (optional)">
      <p class="comment-form-cookies-consent"><input id="wp-comment-cookies-consent" name="wp-comment-cookies-consent" type="checkbox" value="yes"> <label for="wp-comment-cookies-consent">Save my name, email, and website in this browser for the next
          time I comment.</label></p>
      <div class="anr_captcha_field">
        <div id="anr_captcha_field_1" class="anr_captcha_field_div"><input type="hidden" name="g-recaptcha-response" value=""></div>
      </div>
      <p class="form-submit"><input name="submit" type="submit" id="submit" class="submit" value="Post"> <input type="hidden" name="comment_post_ID" value="2628" id="comment_post_ID">
        <input type="hidden" name="comment_parent" id="comment_parent" value="0">
      </p>
      <p style="display: none;"><input type="hidden" id="akismet_comment_nonce" name="akismet_comment_nonce" value="dbce7f2190"></p>
    </div>
  </div>
  <p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js" name="ak_js" value="236">
    <script type="rocketlazyloadscript">document.getElementById( "ak_js" ).setAttribute( "value", ( new Date() ).getTime() );</script>
  </p>
</form>

<form id="jp-carousel-comment-form">
  <label for="jp-carousel-comment-form-comment-field" class="screen-reader-text">Write a Comment...</label>
  <textarea name="comment" class="jp-carousel-comment-form-field jp-carousel-comment-form-textarea" id="jp-carousel-comment-form-comment-field" placeholder="Write a Comment..."></textarea>
  <div id="jp-carousel-comment-form-submit-and-info-wrapper">
    <div id="jp-carousel-comment-form-commenting-as">
      <fieldset>
        <label for="jp-carousel-comment-form-email-field">Email (Required)</label>
        <input type="text" name="email" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-email-field">
      </fieldset>
      <fieldset>
        <label for="jp-carousel-comment-form-author-field">Name (Required)</label>
        <input type="text" name="author" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-author-field">
      </fieldset>
      <fieldset>
        <label for="jp-carousel-comment-form-url-field">Website</label>
        <input type="text" name="url" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-url-field">
      </fieldset>
    </div>
    <input type="submit" name="submit" class="jp-carousel-comment-form-button" id="jp-carousel-comment-form-button-submit" value="Post Comment">
  </div>
</form>

POST

<form id="rfq-step0-form-new" action="" method="post">
  <div>
    <input name="option" value="com_requestforhelp" type="hidden">
    <input name="task" value="step0_submit_ajax_ci" type="hidden">
    <input name="return" value="https://www.digitalforensics.com/" type="hidden">
    <input type="hidden" id="rh_customer_service_code" name="customer_service_code" value="">
  </div>
  <div class="request-help-inputs">
    <div class="row">
      <div class="col-xs-6 first-name">
        <input id="txt_first_name_zero_new" name="txt_first_name" placeholder="First Name" data-validate-actions="required" data-error-message="First name" type="text">
        <i class="fa fa-asterisk" aria-hidden="true"></i>
      </div>
      <div class="col-xs-6 last-name">
        <input id="txt_last_name_zero_new" name="txt_last_name" placeholder="Last Name" type="text">
      </div>
    </div>
    <div class="row">
      <div class="col-xs-6 phone-number">
        <input id="txt_phone_zero_new" name="txt_phone" placeholder="Phone" value="" data-validate-actions="phonefilter,required" data-error-message="Phone number" type="text">
        <i class="fa fa-asterisk" aria-hidden="true"></i>
      </div>
      <div class="col-xs-6 zip-code">
        <input id="txt_zip_zero_new" name="txt_zip" placeholder="ZIP Code" value="" data-validate-actions="required" data-error-message="Zip Code" type="text">
        <i class="fa fa-asterisk" aria-hidden="true"></i>
      </div>
    </div>
    <div class="row">
      <div class="col-xs-12">
        <input id="txt_email_zero_new" name="txt_email" placeholder="Email" value="" data-validate-actions="required,email" data-error-message="Email" type="text">
        <i class="fa fa-asterisk" aria-hidden="true"></i>
      </div>
    </div>
    <div class="row" id="row-big">
      <div class="col-xs-12">
        <textarea id="txt_details_zero_new" name="txt_details" placeholder="Tell us how we can help in detail"></textarea>
      </div>
    </div>
  </div>
  <div class="request-help-send"><a id="main_send_request_new" class="main_send_request_new" title="Request Help" href="/" rel="nofollow">REQUEST HELP</a></div>
</form>

<form id="zip-search-office-form" class="form-inline">
  <div class="form-group">
    <label for="your-location">Office Locator</label>
    <div class="input-group">
      <input id="input-zip" placeholder="ZIP Code" class="form-control" value="" data-validate-actions="checkZip,required" data-error-message="ZIP code" type="text">
      <button class="input-group-addon" type="submit" id="submit-zip" onclick="searchLocalOffice(this.id);">
        <i class="fa fa-search"></i>
      </button>
    </div>
  </div>
</form>

Text Content

MENU

×
Forensics Services
Computer ForensicsCell Phone ForensicsAutomotive ForensicsAudio Video
ForensicsForensics AccountingDeceased Person’s DataE-DiscoveryBusiness
ValuationFind Missing PersonVerify child communications
Cyber Security
Cyber Security ServicesData Breach ResponseWire fraudMedical Data BreachSpyware
DetectionElectronic Risk ControlOnline Identity TheftPenetration Testing
ServiceRansomware Attack
IP Theft
IP theftBusiness Partner TheftDisgruntled EmployeeSocial Media Monitoring
Litigation Support
Civil LitigationChild CustodyCriminal LitigationExpert Witness
TestimonyDivorceSubpoenasCrimes Against MinorsESI Discovery
About Us
Why Choose UsCertificationsCareers and EmploymentVideosContact us
Resource center

Career center
Request Help 800-849-6515
 * Digital Forensics
 * Forensics
   Services
    * Computer Forensics
      Computer Forensics Services
      
      Making complex data simple and compelling
      
       * Digital Investigation
       * E-Discovery
       * Forensic Analysis
       * Expert Testimony
       * Forensics Reporting
      
      
      
    * Cell Phone Forensics
      Mobile Devices Investigations
      
      From digital device to digital evidence
      
       * Calls, web, chats history
       * Contacts, text messages
       * GPS Data
       * Deleted Data
       * Photos & Videos
      
      
      
    * Automotive Forensics
      Automotive Forensics Services
      
      Unlock your vehicle's digital evidence potential
      
       * Vehicle navigation info
       * Cell phone usage or texting
       * Onboard computer data
       * Telematics Systems
      
      
      
    * Audio Video Forensics
      Audio Video Forensics
      
      Forensic Analysis and Enhancement
      
       * Audio, Video Authenticity
       * Video Enhancement
       * Image Analysis
       * Photogrammetry
       * Voice Identification
      
      
      
    * Forensics Accounting
      Forensic and Investigative Accounting
      
      Investigating and analyzing financial records
      
       * Damages quantification
       * Identifying discrepancies
       * Business valuation
       * Insurance claim, cybercrime
      
      
      
    * Deceased Person’s Data
      Get Access to Data of Deceased
      
      Gain access to the online accounts of deceased loved ones
      
       * Establishing cause of death
       * Civil or criminal litigation
       * Insurance investigations
       * Archiving the legacy of a loved one
      
      
      
    * E-Discovery
      E-Discovery You Can Rely On
      
      Clear, precise evidence for a messy world
      
       * Expert Consulting
       * Cost Efficient
       * Quality acquisition
       * Emergency 24/7 Services
       * Professionally documented
      
      
      
    * Business Valuation
      Business Valuation
      
      Expert reports to suit your specific needs
      
       * Cost-Effective
       * Estimated Fair Market Value
       * Near-term Cash Analysis3
       * Risk Assessment
      
      
      
    * Find Missing Person
      Find Missing Person
      
      We can locate people anywhere
      
       * Work Across Jurisdictions
       * Unlock Digital Evidence
       * Wide-Ranging Online Searches
      
      
      
    * Verify child communications
      Verify Child Communications
      
      Stop worrying and learn the truth
      
       * See Communications
       * Uncover Deleted Messages
       * Check Browser History
       * Background Checks on Suspects
      
      
      

 * Cyber
   Security
    * Cyber Security Services
      Cyber Security Service
      
      Prevent, Detect, Respond To Cyberattacks
      
       * Advisory
       * Assessment
       * Incident Response
       * Penetration Testing
      
      
      
    * Data Breach Response
      Experiencing a Data Breach Incident?
      
      First response is crucial. Every minute counts.
      
       * Incident Analysis
       * Investigate and Respond
       * Prepare and Prevent
       * Remediate and Restore
      
      
      
    * Wire fraud
      
    * Medical Data Breach
      Suspect a PHI Data Breach?
      
      The first response is critical to reduce liability
      
       * Stop the active breach
       * Investigate incident
       * Reduce liability
       * Report violations
      
      
      
    * Spyware Detection
      Is somebody spying on you?
      
      Detection & Removing Spyware Services
      
       * Cyber spying
       * Employee monitoring
       * Industrial espionage
       * Malware
       * Spy-phishing
      
      
      
    * Electronic Risk Control
      Protect Your Company
      
      Reduce your electronic risk from digital transmittals
      
       * E-Mails
       * Internet
       * Newsgroups
       * Social media
      
      
      
    * Online Identity Theft
      Online Identity Verification
      
      Find out who you are really talking to
      
       * Avoid Scams
       * Prevent Exposure
       * Track Geolocations
       * Identify Service Providers
       * Learn the Truth
      
      
      
    * Penetration Testing Service
      Penetration Testing
      
      Experienced, Confidential Services
      
       * Internal and External Network Tests
       * Web Application Tests
       * OWASP Standards
       * Vulnerabilities Identified
       * Remediation Recommendations
      
      
      
    * Ransomware Attack
      Ransomware Attack
      
      Swift, professional incident response
      
       * Diagnose Ransomware
       * Assess Damage
       * Discover Vulnerabilities
       * Secure Against Future Attackst
      
      
      

 * IP
   Theft
    * IP theft
      Intellectual Property Theft
      
      Complicated cases require compelling digital facts
      
       * Selling company data
       * Theft of business data
       * Concept or design theft
       * Trade secret theft
      
      
      
    * Business Partner Theft
      FRAUD AND PARTNERSHIP DISPUTES
      
      Find, recover and document digital evidence
      
       * Partnership breakups
       * Financial disputes
       * Breach of a fiduciary duty
       * Business dissolutions
      
      
      
    * Disgruntled Employee
      Issues with Disgruntled Employees?
      
      Bring solid evidence before a judge
      
       * Identify Persons Involved
       * Identify Scope of the Theft
       * Identify Relevant Devices
       * Collect and Preserve Devices
      
      
      
    * Social Media Monitoring
      SOCIAL MEDIA AND BRAND MONITORING
      
      Cases can be investigated using Social Media
      
       * Personal Injuries Claims
       * "Unused" Vacation Payouts
       * Over-expenditure
       * Brand Protection
      
      
      

 * Litigation
   Support
    * Civil Litigation
      Civil Litigation Services
      
      Divorce, custody battles, and other
      
       * Financial Information
       * Establish Lifestyle
       * Proof of infidelity
       * Court-accepted report
      
      
      
    * Child Custody
      Child Custody
      
      Win the most important battle of your life
      
       * Obtain Powerful Evidence
       * Show the Real Truth
       * Reveal Character
      
      
      
    * Criminal Litigation
      Criminal Litigation
      
      Everything you need
      
       * Complete chain of custody
       * Complete de-NISTing
       * Unlock encrypted files
       * Recover deleted files
       * Court-accepted report
      
      
      
    * Expert Witness Testimony
      Expert Witness Services
      
      Effective Expert Witness in Court
      
       * Certified Experts
       * Court-accepted reports
       * Experience in federal, state, county courts, among others
      
      
      
    * Divorce
      Divorce
      
      Evidence shows who is telling the truth
      
       * Obtain Powerful Evidence
       * Show the Real Truth
       * Reveal Character
       * Divide Assets Fairly
      
      
      
    * Subpoenas
      Subpoenas
      
      Subpoena power yields strong evidence
      
       * Find Evidence
       * Unmask Anonymous Harassers
       * Track Digital Footprints
      
      
      
    * Crimes Against Minors
      Crimes Against Minors
      
      Digital evidence can build a strong defense
      
       * Identify Exculpatory Evidence
       * Build Case Strategy
       * Review Metadata
      
      
      
    * ESI Discovery
      Discovery, Preservation & Imaging
      
      Go to court with compelling digital evidence
      
       * Court-ordered forensic imaging
       * Metadata review
       * Cloud account extraction
       * Strategic case consultations
      
      
      

 * About
   Us
    * Why Choose Us
      
    * Certifications
      
    * Careers and Employment
      
    * Videos
      
    * Contact us
      

 * Resource center
 * Career center

 * Articles
   * 
    
   
   Read More
   Penetration Testing – A Crucial Step to Protect Your Business
    
   
   Read More
   5 Industries at High-Risk for Cyberattacks
    
   
   Read More
   What is Ransomware
   Editor's Pick
    
   Internet threats and children
    
   Forensic analysis of instant messenger desktop applications
    
   SIM cards Forensic Analysis with Oxygen Software
    
   Mobile Forensics: Device Firmware Upgrade
    
   Extracting data from damaged iTunes backups
   Popular Now
    
   Decrypting encrypted WhatsApp databases without the key
    
   How to Make the Forensic Image of the Hard Drive
    
   Extracting data from SmartSwitch backups
    
   An Overview of Web Browser Forensics
    
   Android forensic analysis with Autopsy
   More
 * News
   * 
    
   
   Read More
   DFC looking to hire an accountant
    
   
   Read More
   Digital Forensics Corp. Helps ‘Dr. Phil’ Solve A Mystery
    
   
   Read More
   What is Ryuk?
   Editor's Pick
    
   How to protect your smartphone from malware
    
   Unlocking Locked LG Smartphones
    
   Mobile forensic video portal
    
   Oxygen Forensic® Detective 8.3.1 released
    
   Replace your Mobile Forensic Tool with Oxygen Forensic® Detective
   Popular Now
    
   Unlock or decrypt an APFS drive
    
   Digital Forensics Corp. Helps ‘Dr. Phil’ Solve A Mystery
    
   Forensic Analysis of Telegram Messenger
    
   New Windows artifacts: Background Activity Moderator (BAM)
    
   What is Ryuk?
   More
 * How to
   * 
    
   
   Read More
   Get The Most From Your Security Cameras
    
   
   Read More
   How to update MacOS by Terminal
    
   
   Read More
   How to install Splunk Enterprise
   Editor's Pick
   Try a different filter
   Popular Now
    
   How to detect Mimikatz
    
   Windows 10 Registry forensics
    
   How to recover deleted SQLite records with Undark
    
   How to capture memory dumps with Live RAM Capturer
    
   Free Course: Incident Response and Advanced Forensics
   More
 * Books
   * 
    
   
   Read More
   Advanced Threat Analytics Playbook
    
   
   Read More
   Intelligence – Driven Incident Response
    
   
   Read More
   Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
   Editor's Pick
   Try a different filter
   Popular Now
    
   Advanced Threat Analytics Playbook
    
   Windows Management Instrumentation (WMI) Offense, Defense, and Forensic
    
   Intelligence – Driven Incident Response
    
   Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
    
   Data Hiding Techniques in Windows OS
   More
 * Software
   * 
    
   
   Read More
   ReversingLabs plugin for Autopsy
    
   
   Read More
   How to use sandboxes without technical skills
    
   
   Read More
   VMRay Analyzer
   Editor's Pick
    
   Forensic Software Updates
    
   Oxygen Forensic® Detective v.8.4.1 released
    
   Oxygen Forensic® Detective v.8.4 released
    
   Oxygen Forensic introduces physical extraction from Android Spreadtrum
   devices
   Popular Now
    
   UFED Phone Detective
    
   Paladin 7 is online
    
   OSXCollector – free Mac OS X forensics toolkit
    
   Volatility plugin to extract BitLocker Full Volume Encryption Keys
    
   Lists of memory forensics tools
   More
 * Webinars
   * 
    
   
   Read More
   Extracting Malware from an Office Document
    
   
   Read More
   Cellebrite Analytics
    
   
   Read More
   Elcomsoft Mobile Forensic
   Editor's Pick
   Try a different filter
   Popular Now
    
   Analyzing Extracted Mobile Data with UFED Reader
    
   iPhone 6 Data Recovery From Dead Logic Board
    
   Wireshark Advanced Malware Traffic Analysis
    
   Using Python in Forensics
    
   Free Windows 10 forensics online training
   More
 * Tips and Tricks
   * 
    
   
   Read More
   Has Your Computer Been Hacked? Know the Signs
    
   
   Read More
   Are Your Routers and Switchers Opening the Way for Hackers?
    
   
   Read More
   FBI Says Online Blackmail is on the Rise
   Editor's Pick
   Try a different filter
   Popular Now
    
   Forensic tools for your Mac
    
   Extracting data from a locked Android device
    
   How to recover deleted images from any iOS device
    
   Forensic Analysis of Windows Event Logs (Windows Files Activities Audit)
    
   PowerShell Cheat Sheet
   More

Sections
 * Articles
 * News
 * How to
 * Books
 * Software
 * Webinars
 * Tips and Tricks

Articles
Now Reading
How to Make the Forensic Image of the Hard Drive
Next
Prev

Contents
 * Rating
 * Full Article
 * Comments

1
2


HOW TO MAKE THE FORENSIC IMAGE OF THE HARD DRIVE



Digital devices are an integral part of our lives. Therefore, digital evidence,
namely, evidence obtained from various digital devices, is increasingly used in
investigations in the corporation or law enforcement.

 



A feature of digital evidence is that it can be easily damaged or destroyed.
Often, this happens unintentionally. For example, when technical staff try to
restore the computer after an incident. A typical carrier of digital evidence is
a hard drive. Today we will consider: how to make the forensic image of the hard
drive by example of making a copy of the hard drive of the laptop.

 

 

Types of forensic copies:

There are two main types of forensic copies.

 * Copy ‘drive to drive’ – when acquiring like this, the data from the hard
   drive (digital source) is transferred to another one. If the destination
   drive has a larger size, then the unused drive space is filled with zeros.
 * Copy ‘drive to file’ – when acquiring like this, the data from the hard drive
   (digital source) is transferred to a file located on another drive. This
   creates a sector-by-sector copy of the hard drive under study. Usually, this
   image has the format DD (RAW) or Encase (E01). The DD format is a file
   containing a copy of the data of the examined hard drive and has a size
   corresponding to the size of the hard drive. However, often the hard drive is
   not full of files, even half. Therefore, the use of DD files results in the
   purchase of a large number of hard drives to store the created files, which
   leads to additional financial costs. Most often, when creating forensic
   copies of hard drives, an Encase file is used. In this case, the acquired
   data from the source drive is compressed (for example, in the case of
   forensic accounting, the file size – forensic image of the hard drive of the
   accounting computer can be 9 times smaller than the size of the source
   drive). Forensic copies in the Encase format can significantly save disk
   space on the computer of an incident investigation specialist or a computer
   forensics expert. In addition to all of the above, the data in the Encase
   image is protected from change. This is achieved in the following way: for
   the first data block of this file, 64 KB in size, a hash is calculated, which
   is used to encrypt the next 64 KB block. After that, for the last data block
   of 64 KB size, a new hash is calculated which is used to encrypt the next
   data block, etc. This method of data coding allows, in the subsequent, to
   confirm the integrity of data extracted from the source drive or to reveal
   the fact of making changes in the forensic image. In case of detection of the
   fact of making changes, the compromised part of the data can be localized and
   excluded from the study. At the same time, other parts of the forensic image
   will be available for research and will not lose its evidentiary value.

 

Extracting the hard drive.

For our example, we will consider creating a forensic image of the FUJITSU
SIEMENS Amilo M3438G hard drive.



Fig. 1. Appearance of the laptop.

Extracting the hard drive from the laptop can present certain difficulties.
That’s why we recommend that you first find in the “Internet” network a video
that shows how to disassemble a particular laptop model so as not to damage it.
Usually, such a video can be found on request: “How to disassemble ‘laptop
model’ “.



Fig. 2. The results of the search query “How to disassemble M3438G”.

Typically, the laptop model is indicated on the label located on the bottom of
the laptop or in the battery compartment. When you remove the hard drive from
the laptop, remember that there can be more than one hard drive in the laptop.
There are models in which 4 hard drives are installed. Furthermore, an
additional hard drive may be installed into the compartment DVD-drive. We are
lucky. Only one hard drive is installed in our laptop.



Fig. 3. Ejected hard drive.





Creating the forensic image of the hard drive.

When creating forensic images of media, used hardware or software recording
blockers. This is done in order to exclude the possibility of accidental
modification of data on them. We will use the hardware lock WiebeTECH Forensic
UltraDock V5. This blocker emulates the functions of writing, moving, deleting
files on a connected hard drive for proper operation in a Windows environment.
In this case, in fact, no data on the source drive is changed.



Fig. 4. Appearance of the write blocker.



This blocker has the following advantages over others:

 1. It automatically detects and unlocks hard drive areas such as ‘Device
    Configuration Overlay’ (DCO) and ‘Host Protected Area’ (HPA).
 2. If access to hard drive data is blocked by an ATA password, it displays
    relevant information on its display.

To this blocker, you can connect hard drives with SATA and IDE interfaces. If
your laptop uses SSD hard drives, you will need an appropriate adapter to
connect its.



Fig. 5. Adapters for SSD drives.

 

We will use the program “Belkasoft Acquisition Tool” to create a forensic image.
This program is free. It is necessary to go to the address:
http://belkasoft.com/get and fill in a short form for its receipt. “Belkasoft
Acquisition Tool” is a universal utility that allows you to create forensic
images of hard drives, mobile devices, extract data from cloud storages. We
connect the extracted hard drive, using the write blocker to our computer and
run the “Belkasoft Acquisition Tool”. We will see the main window of the program
where we will be asked to choose the data source: hard drive, mobile device or
cloud storage.



Fig. 6. The main window of Belkasoft Acquisition Tool.

 

Click on the ‘Drive’. After that, a window will open, in which we will be asked
to choose: the device to be copied; specify the place where the forensic image
will be created; specify file name and format, etc.



Fig. 7.  A window for selecting a drive to create its forensic image and setting
its parameters (location, name, format, etc.).

 

As you can see on Fig. 7, the hard drive, the forensic image of which we will
create, is connected as ‘PHYSICALDRIVE2’. We will create a file named
‘image.E01’, for which we calculate checksum SHA-1 and MD5. Calculation checksum
is necessary in order to confirm the authenticity of the forensic image from the
time it was created to the time of using evidence obtained from it. After that,
you need to click on the ‘Next’, which will start the process of creating a
forensic image of the hard drive.



Fig. 8. Display the process of creating a forensic image of the hard drive.

 

In the end, we get the file ‘image.E01’, which contains a forensic image of the
hard drive.

 

 

Conclusion.

 

In this article, we looked at the process of creating a forensic image of a hard
drive, using the example of a hard drive extracted from the laptop. They learned
about: what methods are used to extract a hard drive from the laptop; what
hardware devices are used to connect hard drive, when creating forensic images
of hard drives. We thoroughly acquainted with the process of creating a forensic
image of the hard drive.

 

 

Authors:

Igor Mikhaylov & Oleg Skulkin

 

 

Views: 70,486


RELATED


Posted In
Articles
Tags
Belkasoft, Belkasoft Acquisition Tool, computer forensics, DFIR, digital
forensic article, digital forensics, digital forensics article, digital
forensics software, digital image forensics, how to, imaging, windows 10
forensics, windows forensics
Belkasoft, Belkasoft Acquisition Tool, computer forensics, DFIR, digital
forensic article, digital forensics, digital forensics article, digital
forensics software, digital image forensics, how to, imaging, windows 10
forensics, windows forensics
You might also like
BelkasoftBelkasoft Acquisition Toolcomputer forensicsDFIRdigital forensic
articledigital forensicsdigital forensics articledigital forensics
softwareArticles
MORE

 
Read More

847
How to protect your smartphone from malware
 
Read More

438
Internet threats and children
 
Read More

870
MagiCube complex is used to extract data from smartphones

2 Comments
Leave a response
 * Martin
   2017-04-14 at 7:06 AM
   
   
   E01 is just one subtype in Expert Witness Disk Image Format. And yes, it was
   made popular by EnCase, but it is not EnCase format.
   
   
   * Igor Mikhaylov
     2017-04-14 at 8:15 AM
     
     
     Expert Witness (for Windows) was the original name for EnCase (dating back
     to 1998). The product was renamed because it intruded the Expert Witness
     trademark held by ASR Data. The Encase image file format therefore is also
     referred to as the Expert Witness (Compression) Format.
     
     


LEAVE A RESPONSE CANCEL REPLY

Connect with:



Save my name, email, and website in this browser for the next time I comment.







Δ

Previous
Understanding Mac OS full disk encryption
Next
Acquisition and Forensic Analysis of Apple Devices
Top Stories


 

Penetration Testing – A Crucial Step to Protect Your Business

2

 

5 Industries at High-Risk for Cyberattacks

3

 

What is Ransomware

2

 

Sextortion: How To Deal With This Growing Crime

44

 

DFC looking to hire an accountant

750

 

Digital Forensics Corp. Helps ‘Dr. Phil’ Solve A Mystery

2830

 

What is Ryuk?

2124

 

Governments vs. Hackers

600
Right Now

 

How to protect your smartphone from malware
 
Internet threats and children
 
Forensic analysis of instant messenger desktop applications
 
SIM cards Forensic Analysis with Oxygen Software
 
Mobile Forensics: Device Firmware Upgrade
 

DFRWS 2016 Forensics Challenge
 

DFRWS 2016 EU Agenda
 
Penetration Testing – A Crucial Step to Protect Your Business
 
5 Industries at High-Risk for Cyberattacks
 
What is Ransomware
 
Sextortion: How To Deal With This Growing Crime
 
DFC looking to hire an accountant
 
Digital Forensics Corp. Helps ‘Dr. Phil’ Solve A Mystery
 
What is Ryuk?
Top Five
Heat Index
SORT
      

 
1

Decrypting encrypted WhatsApp databases without the key

 
2

How to Make the Forensic Image of the Hard Drive

 
3

Extracting data from SmartSwitch backups

 
4

Forensic tools for your Mac

 
5

An Overview of Web Browser Forensics

Trending
Heat Index
SORT
      

 

Decrypting encrypted WhatsApp databases without the key
 

How to Make the Forensic Image of the Hard Drive
 

Extracting data from SmartSwitch backups
 

Forensic tools for your Mac
 

An Overview of Web Browser Forensics
 

Android forensic analysis with Autopsy
 

Creating a digital forensic laboratory: Tips and Tricks
 

Chip-off Technique in Mobile Forensics
 

Extracting WhatsApp database and the cipher key from a non-rooted Android device
 

How to use the EnCase Processor
 

Software write blockers overview
 

Extracting data from a locked Android device
Trending
Heat Index
SORT
      
 
Decrypting encrypted WhatsApp databases without the key
99220
 
How to Make the Forensic Image of the Hard Drive
30680
 
Extracting data from SmartSwitch backups
19039
 
Forensic tools for your Mac
16661
 
An Overview of Web Browser Forensics
14043
 
Android forensic analysis with Autopsy
13728
 
Creating a digital forensic laboratory: Tips and Tricks
8865
Sections
Articles
Books
How to
News
Software
Webinars

Books

 
Advanced Threat Analytics Playbook

 
Intelligence – Driven Incident Response

 
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications

 
Second Edition of Learning iOS Forensics is Announced

 
Crypto 101: introductory course on cryptography

 
Windows Management Instrumentation (WMI) Offense, Defense, and Forensic

More
Video

SORT
         
 

Extracting Malware from an Office Document
 

Cellebrite Analytics
1234
1234
Copyright © 2022 Digital Forensics | Computer Forensics | Blog, All Rights
Reserved.
Posting....

 

Loading Comments...

 

Write a Comment...
Email (Required) Name (Required) Website

`

REQUEST HELP

Speak to a Specialist Now




GET HELP NOW

844.620.5044

REQUEST HELP

Thank you for contacting us.
Your Digital Investigator will call you shortly.
Office Locator





Click to Text Us!