Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Your machine is now ready to house the forensic image. Here, you will create an image and then verify its initial hash for integrity purposes.

Your machine is now ready to house the forensic image. Here, you will create an image and then verify its initial hash for integrity purposes.
Extract the contents Imager_Lite_3.1.1.zip into E:\. This folder contains FTK Imager, which you will use to create the image.
Create a new folder in the E:\ drive titled image_investigation. This folder will receive everything related to your image investigation.
Next, open FTK Imager from the folder in the E:\ drive, and create an image of the C:\ drive. Be sure to select the Encase image file format, name the image c_drive, and save the image to E:\image_investigation\.
Note: When configuring preferences for the image, follow the following guidelines: do not encrypt the AD, use the fastest compression possible, and avoid segmenting the image.
Creating an image with FTK should automatically generate a text file containing a hash value for the hard disk, but not for the .E01 file. Use md5deep64 from the command prompt to find the hash of the .E01 file.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Refactoring Databases Evolutionary Database Design

Authors: Scott Ambler, Pramod Sadalage

1st Edition

0321774515, 978-0321774514

More Books

Students also viewed these Databases questions

Question

How does this compare with the Fog Index for your written message?

Answered: 1 week ago