• We just launched and are currently in beta. Join us as we build and grow the community.

Forensic Imaging through Encase Imager

EverSayz

Governance Specialist
E Rep
0
0
0
Rep
0
E Vouches
0
0
0
Vouches
0
Posts
141
Likes
118
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 200 XP
Scenario: Mr. X is suspected to be involved in selling his company’s confidential data to the competitors, but without any evidence, no action could be taken against him. To get into reality and proof Mr. X guilty, the company has requested the forensic services and have come to know all the relevant data is present inside the desktop provided to him.

This article is about getting the forensic image of the digital evidence and restoring it to any other drive.

Since it is never advised to work with the original evidence because we may lose some relevant data accidentally, so we will create an image of the original evidence and work on it further. This way the original evidence is safe and the integrity and authenticity of the evidence could be proved through hash values.

This article is also very helpful if we need to back up the data safely.

To image the desktop we will use Encase Imager. First, download the Encase Imager from here

1.PNG


Open Encase Imager and Select Add local device option.

2.png


From the menu select all the options and uncheck “only show write blocked” as shown in the image and click next.

3.png


We can see all the physical drives, logical partitions, Cd Rom, RAM and process running on the system. We need to select what we need to image as our evidence, ideally, it is a good practice to select the physical drives which contains the logical partitions as we get the complete disk image through the physical drive. In certain case, we may select only a logical drive or RAM as required.

Select / Check the number of the evidence you want to image and click on finish.

4.png


The evidence you have selected will get listed in case more than one evidence is selected we will could have seen multiple evidence listed here.

5.png


Double Click on the evidence, we can see the contents present inside it and if we wish we can skip any part, file or folder from getting imaged at this stage.

6.png


Click on Acquire to proceed for the imaging. Now we need to enter the case related information, ie case number, output path, file format in which we want to generate the image

File format selected here is E01 as this is supported by multiple tools and is suitable for further analysis.

If we want to password protect/encrypt our image we can do this at this stage.

Note: It is ideal to store the image on any other external storage drive so that the storage space is not a constraint but for the sake of practical we are saving the image on the desktop at the following path “C:\Users\…..\Desktop\Evidence Image\1.E01”.

7.png


8.png


Click ok and image acquisition will start, you can check the status of image acquisition on the same window at the lower right corner along with the time remaining (refer below image).

9.png


Once the acquisition is complete the image will get saved to the output folder (refer below image).

10.png


To prove the authenticity of the evidence we can generate the Hash value of the evidence

To generate the hash value of the image click on the evidence and select hash as shown in the image below.

11.png


Once the hashing process is complete click on the report section on the lower pane

12.png


Right, Click and select Copy to copy the report and paste in a word /text document.

13.png


Save the report along with the Image (E01) files. This report contains all the relevant details along with the detailed report containing the hash values.

14.png


The Evidence acquisition is complete

Restoring the Evidence Image

We are done with imaging of the disk/evidence. Now we will restore this acquired image to the drive. To start with open Encase Imager and add the evidence to Encase imager

15.png


Browse to the image (.E01) file and add it to the case. The evidence added will get listed

16.png


Double click on the image, select he files to be restored and select the restore option located under Device option.

17.png


When we click on restore, connect the drive where we want to restore the image and click next

18.png


All the drives will be read

19.png


All the drives will be displayed, select the drive where the image is to be restored. Use the blank drive for restoring the image as the existing data will be wiped.

20.png


If required we can verify the Hash values and click on finish.

21.png


Type “Yes” in the text box and click on OK this will wipe the existing data on the drive and start with the image restoration.

22.png


Image Restoration will start, we can check the progress on the lower right corner of the window.

23.png


Once the restoration is complete, we can see the data in the drive we have selected.

24.png


To ensure the integrity of the data, we can see the report section on the bottom pane and check the hash values. The hash values should be the same as of the image (we can check the original hash value in the image report.)

25.png


If required we can copy and save the report in any text / word file for any future reference.

Author: Ankit Gupta, the author and co-founder of this website, an ethical hacker, forensics investigator , penetration testing researcher and telecom expert. He has found his deepest passion to be around the world of telecom, cyber security and digital forensics. Contact Here
 

451,993

323,299

323,308

Top