National Cyber Warfare Foundation (NCWF) Forums

DD image

0 user ratings
2020-09-10 22:37:55
Forensic Tools
Steps for a forensic operation
  • pull the compromised drive from the system it is in
  • add it as another drive on a Linux desktop system or use the cheap USB forensics dongle ($20)
  • Use DD image to make a forensic master copy
  • Then remove the compromised drive from your desktop system
  • Make a second copy from your master forensic copy
  • Then mount the secondary copy
  • try the fix/recovery

Reference Links

DD over SSH

Full metal backup

How to Clone Disks

new comment
Nobody has commented yet. Will you be the first?
return to home

Copyright 2012 through 2020 - National Cyber Warfare Foundation - All rights reserved worldwide.