SlideShare a Scribd company logo
2
Most read
3
Most read
14
Most read
Lecture #32: Forensic Duplication
Dr.Ramchandra Mangrulkar
October 8, 2020
Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 1 / 19
Forensic Duplication
1 During an incident, a significant amount of data is gathered,
preserved, cataloged, and analyzed.
2 The most comprehensive sources of information is a forensic
image of an affected or suspect computer system.
3 Processes, formats, and tools that are used by the forensic
community to properly duplicate data.
4 A court may find that the best available duplication acceptable
and render it admissible.
Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 2 / 19
Types of Forensic Duplication
A simple duplication consists of making a copy of specific data.
The data may consist of a single file, a group of files, a partition
on a hard drive, an entire hard drive, or other elements of data
storage devices and the information stored on them.
A forensic duplication is an accurate copy of data that is created
with the goal of being admissible as evidence in legal
proceedings. Furthermore, we define forensic duplication as an
image of every accessible bit from the source medium.
Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 3 / 19
Characteristics of Forensic Duplication Tools
ability to image or account for every bit of accessible. data on
the storage medium.
must create a forensic duplicate of the original storage medium.
must handle read errors in a robust and graceful manner.
the process must not make any changes to the original storage
medium.
must generate results that are repeatable and verifiable by a
third party.
must generate logs that detail the actions requested and any
errors encountered.
Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 4 / 19
Forensics Image Format
IR teams will create and process three primary types of forensic
images
Complete Disk Image
Partition Image
Logical Image
Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 5 / 19
Complete Disk Image
A “complete disk image” is intended to duplicate every
addressable allocation unit on the storage medium.
includes Host Protected Areas (HPAs) and Drive Configuration
Overlays (DCOs).
complete disk image, the output file contains every allocation
unit, or sector, accessible to the imaging software.
Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 6 / 19
Overview of the Disk Areas
A service area is a logical area on the hard-drive (residing on the
platters) set aside by hard-drive vendors for internally managing the
drive. These areas are outside the hard-drive’s Logical Block Address
(LBA) space and as such are non-addressable and inaccessible via the
standard ATA commands. The service area contains both code and
data modules, such as defect management modules, SMART data
modules, self-test modules and much more.
Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 7 / 19
Disk Areas
Disk Firmware Area (DPA)
The firmware is composed of a series of modules. Examples are:
SECU (Security System Module), P-List, G-List, T-List, SMART
Attributes, and U-List (Firmware Zone Translator).
The Host Protected Area (HPA)
is used for holding diagnostics and other utilities required by the
manufacturer such as the boot sector, the user addressable
sectors, start of the reserved area, and the code for the boot.
A Device Configuration Overlay (DCO) is similar to the HPA,
but is used by manufacturers to configure drive sizes,
to enable and disable features on the disk.
Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 8 / 19
Case Study
Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 9 / 19
Case Study
Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 10 / 19
Partition Image
Tools allow you specify an individual partition, or volume, as the
source for an image.
A partition image is a subset of a complete disk image and
contains all of the allocation units from an individual partition
on a drive.
A partition image still affords you the opportunity to perform
low-level analysis and attempt to undelete files and examine
slack space from that partition.
Because a partition image does not capture all the data on a
drive, it is taken only under special circumstances.
Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 11 / 19
Logical Image
A logical image is less of an “image” and more of a simple copy,
and it’s the type of duplication we referred to previously as a
“simple duplication.”
Both FTK Imager and EnCase have the ability to create
evidence containers for logical files.
Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 12 / 19
Image Integrity
When a forensic image is created, cryptographic checksums are
generated for two reasons.
First, when the image is taken from a drive that is offline
(static) and preserved, the hash is used to verify and
demonstrate that the forensic image is a true and accurate
representation of the original.
Second, the hash is used to detect if the data was modified since
the point of time at which the image was created.
The hash is simply used to ensure that the integrity has been
maintained throughout the life of the image.
Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 13 / 19
Traditional Duplication
1
Traditional imaging is performed on static drives (that is, hard
drives that are not part of an active, running system
Hardware Write Blockers
The best way to ensure that the source media is not modified in
any way is to use specialized hardware that prohibits write
commands from reaching the drive controller. A set of these
write blockers should be in every IR team’s kit.
The write blockers are typically protocol bridges that contain
modified firmware or an ASIC designed to intercept a subset of
the protocol’s commands.
1
Incident Response Computer Forensics, Third Edition
Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 14 / 19
Case Study
Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 15 / 19
Case Study
Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 16 / 19
Image Creation Tools
The most common method to create a forensic duplicate is via
software. The three main tools we use are DC3dd, AccessData’s
FTK Imager, and Guidance Software’s EnCase
dd, DCFLdd, and DC3dd
Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 17 / 19
Live System Duplication
A live system duplication is defined as the creation of an image of
media in a system that is actively running.
the system may be an extremely business-critical system that
cannot be taken down.
Performing a live image will make minor modifications to the
system, but you will be able to get an image.
Be sure to document exactly what you did, including the tool
you used, the procedure you followed, what services may be
running, and the exact dates and times.
If “challenged” , the fact that you modified the system. Such
challenges are more easily refuted if you have the proper
documentation.
Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 18 / 19
Duplication of Enterprise Asset
the evidence that is part of an investigation resides on a very
large RAID, SAN, NAS, or other massive central storage system.
it’s infeasible to make a complete duplicate of the entire original
source due to the sheer volume of data or the complexity of the
storage configuration.
formulate an appropriate plan to create a logical copy of only the
relevant data
Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 19 / 19

More Related Content

PPTX
Introduction to filesystems and computer forensics
PPTX
Anti forensic
PPTX
Digital forensic tools
PPTX
Digital Forensics
PPTX
Digital forensics
PPTX
Memory forensics
Introduction to filesystems and computer forensics
Anti forensic
Digital forensic tools
Digital Forensics
Digital forensics
Memory forensics

What's hot (20)

PDF
03 Data Recovery - Notes
PPTX
Digital forensics
PDF
Data security and Integrity
PPT
Ch 04 Data Acquisition for Digital Forensics.ppt
PPTX
Cryptography.ppt
PPTX
Module 02 ftk imager
PDF
Lecture #31 : Windows Forensics
PPT
Introduction to computer forensic
PPT
SECURITY PROTOCOLS.ppt
PDF
Email Forensics
PPTX
cyber security and forensic tools
PDF
Digital forensic principles and procedure
PDF
02 Types of Computer Forensics Technology - Notes
PPTX
mobile forensic.pptx
PPTX
Random Oracle Model & Hashing - Cryptography & Network Security
PDF
01 Computer Forensics Fundamentals - Notes
PDF
Cyber Forensics Module 1
PPTX
CISSP - Chapter 1 - Security Concepts
PPTX
Mitre Attack - Credential Dumping - updated.pptx
PDF
Overview on data privacy
03 Data Recovery - Notes
Digital forensics
Data security and Integrity
Ch 04 Data Acquisition for Digital Forensics.ppt
Cryptography.ppt
Module 02 ftk imager
Lecture #31 : Windows Forensics
Introduction to computer forensic
SECURITY PROTOCOLS.ppt
Email Forensics
cyber security and forensic tools
Digital forensic principles and procedure
02 Types of Computer Forensics Technology - Notes
mobile forensic.pptx
Random Oracle Model & Hashing - Cryptography & Network Security
01 Computer Forensics Fundamentals - Notes
Cyber Forensics Module 1
CISSP - Chapter 1 - Security Concepts
Mitre Attack - Credential Dumping - updated.pptx
Overview on data privacy
Ad

Similar to Lecture #32: Forensic Duplication (20)

PPTX
Latest presentation
PPT
Fs Ch 18
PPTX
Analysis of digital evidence
PDF
508_Test Report_NIST_DI_FTK_Imager_2_5_3_14_June 2008_Final.pdf
PPTX
Forensic imaging
PDF
05 Duplication and Preservation of Digital evidence - Notes
PDF
the Cyber - Forensics - Lab - Manual . pdf
PPTX
Forensic Investigation of Android Operating System
PDF
Computer Forensic
PPTX
Computer forensics toolkit
DOCX
Cyber&digital forensics report
DOCX
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
PDF
Techniques in Computer Forensics: A Recovery Perspective
PDF
Forensic drive correlation
PDF
Comparative Analysis of Digital Forensic Extraction Tools
PPTX
S4. MCE UNIT 4 COMPUTER SCIENCE.pptx
PDF
A Literature Review On Cyber Forensic And Its Analysis Tools
PPT
Role of a Forensic Investigator
PPTX
The design of forensic computer workstations
PPT
Digital Forensics in the Archive
Latest presentation
Fs Ch 18
Analysis of digital evidence
508_Test Report_NIST_DI_FTK_Imager_2_5_3_14_June 2008_Final.pdf
Forensic imaging
05 Duplication and Preservation of Digital evidence - Notes
the Cyber - Forensics - Lab - Manual . pdf
Forensic Investigation of Android Operating System
Computer Forensic
Computer forensics toolkit
Cyber&digital forensics report
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Techniques in Computer Forensics: A Recovery Perspective
Forensic drive correlation
Comparative Analysis of Digital Forensic Extraction Tools
S4. MCE UNIT 4 COMPUTER SCIENCE.pptx
A Literature Review On Cyber Forensic And Its Analysis Tools
Role of a Forensic Investigator
The design of forensic computer workstations
Digital Forensics in the Archive
Ad

More from Dr. Ramchandra Mangrulkar (20)

PDF
Gibbs sampling is a Markov Chain Monte Carlo (MCMC)
PDF
Introduction to Research and Publications Tools.pdf
PDF
Blockchain#2.pdf
PDF
Blockchain#1.pdf
PDF
Blockchain#3.pdf
PDF
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
PDF
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
PDF
LEcture #28-#30
PDF
Lecture #25 : Oauth 2.0
PDF
Lecture #24 : Cross Site Request Forgery (CSRF)
PDF
Lecture #22: Web Privacy & Security Breach
PDF
Lecture #22 : Web Privacy & Security Breach
PDF
Lecture #21: HTTPS , SSL & TLS
PDF
Lecture #18 - #20: Web Browser and Web Application Security
PDF
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
PDF
Lecture # 14: Salami and Linearization Attacks
PDF
Lecture #12,#13 : Program and OS Security -Part I
PDF
Lecture #9 : Single Sign on and Federation Identity Management
PDF
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
PDF
Lecture #6: Multilevel Security Models
Gibbs sampling is a Markov Chain Monte Carlo (MCMC)
Introduction to Research and Publications Tools.pdf
Blockchain#2.pdf
Blockchain#1.pdf
Blockchain#3.pdf
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
LEcture #28-#30
Lecture #25 : Oauth 2.0
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #22: Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
Lecture #21: HTTPS , SSL & TLS
Lecture #18 - #20: Web Browser and Web Application Security
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture # 14: Salami and Linearization Attacks
Lecture #12,#13 : Program and OS Security -Part I
Lecture #9 : Single Sign on and Federation Identity Management
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #6: Multilevel Security Models

Recently uploaded (20)

PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Geodesy 1.pptx...............................................
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Welding lecture in detail for understanding
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Geodesy 1.pptx...............................................
Operating System & Kernel Study Guide-1 - converted.pdf
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
CH1 Production IntroductoryConcepts.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
bas. eng. economics group 4 presentation 1.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
UNIT-1 - COAL BASED THERMAL POWER PLANTS
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Internet of Things (IOT) - A guide to understanding
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Welding lecture in detail for understanding

Lecture #32: Forensic Duplication

  • 1. Lecture #32: Forensic Duplication Dr.Ramchandra Mangrulkar October 8, 2020 Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 1 / 19
  • 2. Forensic Duplication 1 During an incident, a significant amount of data is gathered, preserved, cataloged, and analyzed. 2 The most comprehensive sources of information is a forensic image of an affected or suspect computer system. 3 Processes, formats, and tools that are used by the forensic community to properly duplicate data. 4 A court may find that the best available duplication acceptable and render it admissible. Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 2 / 19
  • 3. Types of Forensic Duplication A simple duplication consists of making a copy of specific data. The data may consist of a single file, a group of files, a partition on a hard drive, an entire hard drive, or other elements of data storage devices and the information stored on them. A forensic duplication is an accurate copy of data that is created with the goal of being admissible as evidence in legal proceedings. Furthermore, we define forensic duplication as an image of every accessible bit from the source medium. Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 3 / 19
  • 4. Characteristics of Forensic Duplication Tools ability to image or account for every bit of accessible. data on the storage medium. must create a forensic duplicate of the original storage medium. must handle read errors in a robust and graceful manner. the process must not make any changes to the original storage medium. must generate results that are repeatable and verifiable by a third party. must generate logs that detail the actions requested and any errors encountered. Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 4 / 19
  • 5. Forensics Image Format IR teams will create and process three primary types of forensic images Complete Disk Image Partition Image Logical Image Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 5 / 19
  • 6. Complete Disk Image A “complete disk image” is intended to duplicate every addressable allocation unit on the storage medium. includes Host Protected Areas (HPAs) and Drive Configuration Overlays (DCOs). complete disk image, the output file contains every allocation unit, or sector, accessible to the imaging software. Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 6 / 19
  • 7. Overview of the Disk Areas A service area is a logical area on the hard-drive (residing on the platters) set aside by hard-drive vendors for internally managing the drive. These areas are outside the hard-drive’s Logical Block Address (LBA) space and as such are non-addressable and inaccessible via the standard ATA commands. The service area contains both code and data modules, such as defect management modules, SMART data modules, self-test modules and much more. Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 7 / 19
  • 8. Disk Areas Disk Firmware Area (DPA) The firmware is composed of a series of modules. Examples are: SECU (Security System Module), P-List, G-List, T-List, SMART Attributes, and U-List (Firmware Zone Translator). The Host Protected Area (HPA) is used for holding diagnostics and other utilities required by the manufacturer such as the boot sector, the user addressable sectors, start of the reserved area, and the code for the boot. A Device Configuration Overlay (DCO) is similar to the HPA, but is used by manufacturers to configure drive sizes, to enable and disable features on the disk. Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 8 / 19
  • 9. Case Study Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 9 / 19
  • 10. Case Study Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 10 / 19
  • 11. Partition Image Tools allow you specify an individual partition, or volume, as the source for an image. A partition image is a subset of a complete disk image and contains all of the allocation units from an individual partition on a drive. A partition image still affords you the opportunity to perform low-level analysis and attempt to undelete files and examine slack space from that partition. Because a partition image does not capture all the data on a drive, it is taken only under special circumstances. Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 11 / 19
  • 12. Logical Image A logical image is less of an “image” and more of a simple copy, and it’s the type of duplication we referred to previously as a “simple duplication.” Both FTK Imager and EnCase have the ability to create evidence containers for logical files. Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 12 / 19
  • 13. Image Integrity When a forensic image is created, cryptographic checksums are generated for two reasons. First, when the image is taken from a drive that is offline (static) and preserved, the hash is used to verify and demonstrate that the forensic image is a true and accurate representation of the original. Second, the hash is used to detect if the data was modified since the point of time at which the image was created. The hash is simply used to ensure that the integrity has been maintained throughout the life of the image. Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 13 / 19
  • 14. Traditional Duplication 1 Traditional imaging is performed on static drives (that is, hard drives that are not part of an active, running system Hardware Write Blockers The best way to ensure that the source media is not modified in any way is to use specialized hardware that prohibits write commands from reaching the drive controller. A set of these write blockers should be in every IR team’s kit. The write blockers are typically protocol bridges that contain modified firmware or an ASIC designed to intercept a subset of the protocol’s commands. 1 Incident Response Computer Forensics, Third Edition Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 14 / 19
  • 15. Case Study Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 15 / 19
  • 16. Case Study Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 16 / 19
  • 17. Image Creation Tools The most common method to create a forensic duplicate is via software. The three main tools we use are DC3dd, AccessData’s FTK Imager, and Guidance Software’s EnCase dd, DCFLdd, and DC3dd Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 17 / 19
  • 18. Live System Duplication A live system duplication is defined as the creation of an image of media in a system that is actively running. the system may be an extremely business-critical system that cannot be taken down. Performing a live image will make minor modifications to the system, but you will be able to get an image. Be sure to document exactly what you did, including the tool you used, the procedure you followed, what services may be running, and the exact dates and times. If “challenged” , the fact that you modified the system. Such challenges are more easily refuted if you have the proper documentation. Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 18 / 19
  • 19. Duplication of Enterprise Asset the evidence that is part of an investigation resides on a very large RAID, SAN, NAS, or other massive central storage system. it’s infeasible to make a complete duplicate of the entire original source due to the sheer volume of data or the complexity of the storage configuration. formulate an appropriate plan to create a logical copy of only the relevant data Dr.Ramchandra Mangrulkar Lecture #32: Forensic Duplication October 8, 2020 19 / 19