Creating Forensically Sound Evidence Copies
Section 2 of 12
Write-blockers prevent any modifications to the original evidence during acquisition. This is critical for maintaining evidence integrity and legal admissibility.
⚠️ Warning:
Without write-blocking, even connecting a drive can alter timestamps, create log files, or trigger file system updates!
Physical devices between drive and computer
OS-level write protection
Bit-by-bit copy of the entire drive. Simple, universal format supported by all forensic tools.
Advantages:
Disadvantages:
Industry-standard format created by Guidance Software (EnCase). Includes compression and metadata.
Advantages:
Disadvantages:
Open-source forensic format designed to overcome limitations of proprietary formats.
Advantages:
Disadvantages:
# Basic DD command for disk imaging sudo dd if=/dev/sdb of=/evidence/case001/suspect_drive.dd bs=4096 conv=noerror,sync status=progress # Using dcfldd (enhanced dd) with hash verification sudo dcfldd if=/dev/sdb of=/evidence/case001/suspect_drive.dd \ hash=md5,sha256 \ hashwindow=1G \ hashlog=/evidence/case001/hash.log \ bs=4096 \ conv=noerror,sync \ status=on # Verify the image integrity md5sum /evidence/case001/suspect_drive.dd sha256sum /evidence/case001/suspect_drive.dd
Free forensic imaging tool from AccessData (now Exterro). Provides a graphical interface for creating forensic images in multiple formats including E01, DD, and AFF.
Select physical drive, logical drive, or image file
Choose format (E01, DD, AFF), compression, and segmentation
Enter case number, examiner name, notes, and evidence details
FTK automatically calculates and verifies MD5 and SHA1 hashes
Cryptographic hash functions create unique "fingerprints" of data. By comparing hash values before and after imaging, we can prove the data hasn't been altered.
128-bit hash (32 hex characters)
d41d8cd98f00b204e9800998ecf8427e
⚠️ Cryptographically broken - use for legacy only
160-bit hash (40 hex characters)
da39a3ee5e6b4b0d3255bfef95601890afd80709
⚠️ Deprecated - vulnerable to collision attacks
256-bit hash (64 hex characters)
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
✓ Current standard - highly secure