1. dd,
resource : http://www.forensicswiki.org/wiki/Dd
Forensic tools to analysis data image format, keep data no change propertis like time and other
Usage: dd [OPERAND]...
or: dd OPTION
The basic dd syntax is as follows:
# dd if= of= bs=("if" being "input file" and "of" meaning "output file").
wiped and formatted drive, like this:
# dd if=/dev/ of=/dev/ bs=512 conv=noerror,syncYou can write the output to a file:
# dd if=/dev/ of=/home/user/linux_image.dd bs=512 conv=noerror,syncroot@bt:~/evid# dd if=/dev/fd0 of=image.disk1 bs=512
In linux, the blocksize value can have a multiplicative suffix:
c =1 w =2 b =512 kB =1000, K =1024 MB =1000*1000, M =1024*1024 GB =1000*1000*1000, G =1024*1024*1024 and so on for T, P, E, Z, Y.
2. libewf
resource : http://code.google.com/p/libewf/wiki/Mounting
libewf is a library to access the Expert Witness Compression Format (EWF).
- mkdir /mnt/ewfimage
- mounting
This will create the following device file:ewfmount image.E01 /mnt/ewfimage/
Unmount :/mnt/ewfimage/ewf1
Or fusermount:umount /mnt/ewfimage/
fusermount -u /mnt/ewfimage/
3. sleuthkit
resource : http://www.sleuthkit.org/
A library, framework, and set of command line tools to analyze disk images.
- Its comand line forensic tools can be used to analyze disk images and perform in-depth analysis of file systems (such as NTFS, FAT, HFS+, Ext3, and UFS) and several volume system types. for graphical interface can use Autopsy
root@bt:~# icat -h
Missing image name and/or address
usage: icat [-hrRsvV] [-f fstype] [-i imgtype] [-b dev_sector_size] [-o imgoffset] image [images] inum[-typ[-id]]
-h: Do not display holes in sparse files
-r: Recover deleted file
-R: Recover deleted file and suppress recovery errors
-s: Display slack space at end of file
-i imgtype: The format of the image file (use '-i list' for supported types)
-b dev_sector_size: The size (in bytes) of the device sectors
-f fstype: File system type (use '-f list' for supported types)
-o imgoffset: The offset of the file system in the image (in sectors)
-v: verbose to stderr
-V: Print version
http://wiki.sleuthkit.org/index.php?title=TSK_Tool_Overview
http://wiki.sleuthkit.org/index.php?title=FS_Analysis
4. Autopsy
A graphical interface to the Sleuth Kit and other digital forensics tools.
Tidak ada komentar:
Posting Komentar