Using dc3dd in Kali Linux
Before we get started using dc3dd, I need to again draw your attention to one of the features of DD: being able to wipe data, partitions, and drives. Hence, you may find that DD is sometimes also fondly referred to as the Data Destroyer. Be sure to always first identify your devices, partitions, input and output files, and parameters when using DD and dc3dd.
These are the features of DD:
- Bitstream (raw) disk acquisition and cloning
- Copying disk partitions
- Copying folders and files
- Hard disk drive error checking
- Forensic wiping of all data on hard disk drives
dc3dd was developed by the Department of Defense Cyber Crime Center and is updated whenever DD updates. dc3dd offers the best of DD with more features, including the following:
- On-the-fly hashing using more algorithm choices (MD5, SHA-1, SHA-256, and SHA-512)
- Hash verification
- A meter to monitor progress and acquisition time
- Writing of errors to...