National Cyber Warfare Foundation (NCWF) Forums


DD image


0 user ratings
2020-09-10 22:37:55
blscott
Forensic Tools
Steps for a forensic operation
---------------------------------------------------
  • pull the compromised drive from the system it is in
  • add it as another drive on a Linux desktop system or use the cheap USB forensics dongle ($20)
  • Use DD image to make a forensic master copy
  • Then remove the compromised drive from your desktop system
  • Make a second copy from your master forensic copy
  • Then mount the secondary copy
  • try the fix/recovery

Reference Links
---------------------------------------------------


DD over SSH

Full metal backup

How to Clone Disks




Comments
new comment
Nobody has commented yet. Will you be the first?
 
return to home



Copyright 2012 through 2020 - National Cyber Warfare Foundation - All rights reserved worldwide.