Contrasting tampered and untampered disk images
As a cybersecurity professional, you may be given the task of capturing an image of a disk in a forensic manner. Imagine a security incident has occurred on a system and you are required to perform some forensic investigation to determine who and what caused the attack. Additionally, you want to ensure the data that was captured is not tampered with or modified during the creation of a disk image process.
In this section, you will learn how to use various tools on both Microsoft Windows and the Linux operating system to capture a disk image of a local drive and determine whether the image was tampered with or not.
Lab – capturing a disk image on Linux
For this lab exercise, we'll be using the dd
tool that is already built into the Linux operating system. In this lab exercise, you will learn how to create a disk image from one drive to another and verify whether the image is the same before and after creating the...