Unit 04
Unit 04
Unit 04
ISM09204
Dr. Nicodemus M. M.
Data Acquisition
• The following are used storage formats to preserve and analyze evidence
obtained from storage devices such as hard disk drives (HDDs), solid-state
drives (SSDs), USB drives, memory cards, and network-attached storage
(NAS) devices.
1. Forensic Disk Image (DD/RAW)
2. Advanced Forensic Format (AFF)
3. Expert Witness Compression Format (E01)
4. Raw Disk Image (IMG)
5. Virtual Disk Image (VMDK, VHD, VDI)
6. Partition Image (PFI)
Storage Formats for Digital Forensics
Forensic Disk Image (DD/RAW)
• A bit-by-bit copy of the entire storage device, including all data, le system
structures, and unallocated space.
• Preserves the original state of the storage device and allows o ine analysis
without altering the original evidence.
• Enables e cient storage and analysis of disk images with large capacities.
• Common le extensions: .aff, .afm
ffi
fi
Storage Formats for Digital Forensics
Expert Witness Compression Format (E01)
• Disk images of virtual machine (VM) disks, used for analyzing virtualized
environments.
• Static acquisition and logical acquisition are two common methods used in
digital forensics for acquiring digital evidence from storage devices.
• While both methods serve the purpose of collecting data for forensic analysis,
they di er in their approach and the type of data they capture.
ff
Acquisition Methods
Static Acquisition
• Process
• During static acquisition, the forensic investigator creates a sector-by-sector copy
of the storage device using specialized forensic imaging tools.
• The forensic image captures every bit of data on the storage device, regardless of
whether it is allocated or deleted.
• This process preserves the original state of the storage device, ensuring that the
integrity of the evidence is maintained.
fi
Acquisition Methods
Static Acquisition
• Advantages
• Preserves the original state of the storage device, allowing for a
comprehensive analysis of all data.
• Disadvantages
• Time-consuming process, especially for large storage devices.
• Requires su cient storage space to store the forensic image.
• May not be feasible in certain scenarios, such as when the storage device
is physically damaged or inaccessible.
ffi
Acquisition Methods
Logical Acquisition
• Logical acquisition involves extracting speci c les, folders, and metadata from a
storage device at the le system level.
• Process
• During logical acquisition, the forensic investigator extracts relevant data from the
storage device based on prede ned criteria, such as le types, timestamps, or
user-de ned search parameters.
• This process does not create a bit-by-bit copy of the entire storage device but
focuses on extracting speci c data relevant to the investigation.
• Advantages
• Faster and more targeted compared to static acquisition, as it only extracts
speci c data of interest.
• Requires less storage space, as it does not capture the entire storage
device.
• Disadvantages
• May overlook deleted or hidden data that is not explicitly targeted during
the acquisition process.
• Both methods have their advantages and limitations, and the choice between
them depends on factors such as the nature of the investigation, the type of
evidence required, and the available resources.
Contingency Planning for Image Acquisition
Create Redundant Copies of Evidence Images
ff
fi
Contingency Planning for Image Acquisition
Include Host Protected Area (HPA) in Disk Imaging
• Copy the host protected area of a disk drive in addition to the standard imaging
process.
• A Host Protected Area (HPA) is a section of a hard drive or solid-state drive that
is not normally visible to an operating system. It is a reserved area for data
storage outside the normal operating system le system.
• Compare the checksums to ensure they match, indicating that the acquired
image is an exact copy of the original source data.
fi
Checksum Verification
Tools